Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 8:26 pm

Results for technology

15 results found

Author: Smith, Alison M.

Title: Law Enforcement Use of Global Positioning (GPS) Devices to Monitor Motor Vehicles: Fourth Amendment Considerations

Summary: As technology continues to advance, what was once thought novel, even a luxury, quickly becomes commonplace, even a necessity. Global Positioning System (GPS) technology is one such example. Generally, GPS is a satellite-based technology that discloses the location of a given object. This technology is used in automobiles and cell phones to provide individual drivers with directional assistance. Just as individuals are finding increasing applications for GPS technology, state and federal governments are as well. State and federal law enforcement use various forms of GPS technology to obtain evidence in criminal investigations. For example, federal prosecutors have used information from cellular phone service providers that allows real-time tracking of the locations of customers’ cellular phones. Title III of the Omnibus Crime Control and Safe Streets Act of 1958 (P.L. 90-351) regulates the interception of wire, oral, and electronic communications. As such, it does not regulate the use of GPS technology affixed to vehicles and is beyond the scope of this report. The increased reliance on GPS technology raises important societal and legal considerations. Some contend that law enforcement’s use of such technology to track motor vehicles’ movements provides for a safer society. Conversely, others have voiced concerns that GPS technology could be used to reveal information inherently private. Defendants on both the state and federal levels are raising Fourth Amendment constitutional challenges, asking the courts to require law enforcement to first obtain a warrant before using GPS technology. Subject to a few exceptions, the Fourth Amendment of the U.S. Constitution requires law enforcement to obtain a warrant before conducting a search or making a seizure. Courts continue to grapple with the specific issue of whether law enforcement’s use of GPS technology constitutes a search or seizure, as well as the broader question of how the Constitution should address advancing technology in general. The Supreme Court has not directly addressed the issue of whether law enforcement’s use of GPS technology in connection with motor vehicles falls within the Fourth Amendment’s purview. Lower federal courts have relied on Supreme Court precedent to arrive at arguably varying conclusions. For example, several district and circuit courts of appeals have concluded that law enforcement’s current use of GPS technology does not constitute a search, and is thus permissible, under the Constitution. To date, while the U.S. Supreme Court has not provided a definitive answer regarding law enforcement’s use of GPS technology, state legislatures and courts have approached the issue in various ways. Some states have enacted laws requiring law enforcement to obtain a warrant before using GPS technology. Some state courts have resolved the question under their own constitutions. Although they have reached somewhat differing conclusions, other state courts have relied on Supreme Court precedent, such as United States v. Knotts, 460 U.S. 276 (1983), to derive an answer. This report discusses the basics of GPS technology, society’s reliance on it, and some of the related legal and privacy implications. In addition, the report examines legislative and judicial responses on both federal and state levels.

Details: Washington, DC: Congressional Research Service, 2011. 15p.

Source: Internet Resource: CRS Report R41663: Accessed May 11, 2011 at: http://www.fas.org/sgp/crs/misc/R41663.pdf

Year: 2011

Country: United States

URL: http://www.fas.org/sgp/crs/misc/R41663.pdf

Shelf Number: 121707

Keywords:
Criminal Investigation
Fourth Amendment
Global Positioning Devices
Search and Seizure
Technology

Author: Beck, Adrian

Title: Automatic Product Indentification & Shrinkage: Scoping the Potential

Summary: The purpose of this paper is to explore the possibilities offered by recent developments within the sphere of product Auto Identification (Auto ID) technologies to impact upon the problem of shrinkage in the retail sector and their suppliers (both manufacturers and third-party logistics providers). Its purpose is not to provide specific strategies for its implementation, but to consider the potential to impact upon shrinkage in the short, medium and long term. In this respect, this document aims to generate discussion, debate and above all, raise questions about how this rapidly developing technology might be used, rather than to be overtly prescriptive in suggesting how it should be used. The research was commissioned by Efficient Consumer Response Europe (ECR) and uses as its base a series of in-depth discussions with European retailers and manufacturers, technology providers and developers, standards agencies and academics. In particular, a oneday workshop was organised in February 2002, in Brussels, when invited delegates were offered the opportunity to discuss in detail the prospects, problems and potential of Auto ID. The author is extremely grateful to all those who contributed their time, expertise and knowledge to assist in this research. In particular, the staff at the Auto ID Centre in Boston (US) and Cambridge (UK), and the members of the ECR Europe Shrinkage committee.

Details: Brussels: Efficient Consumer Response (ECR) Europe, 2002.

Source: White Paper for ECR Europe: Internter Resource: Accessed February 29, 2012 at http://www2.le.ac.uk/departments/criminology/people/bna/RFIDandShrinkageWhitePaperpdf

Year: 2002

Country: International

URL: http://www2.le.ac.uk/departments/criminology/people/bna/RFIDandShrinkageWhitePaperpdf

Shelf Number: 124328

Keywords:
Crime Prevention
Retail Crime
Technology

Author: Pretrial Justice Institute

Title: Using Technology to Enhance Pretrial Services: Current Applications and Future Possibilities

Summary: The first pretrial services programs came into existence 50 years ago. The technological tools available to pretrial services staff of that period, and for many years thereafter, were a pen or pencil, paper and index cards, a land-line telephone, and a typewriter. With these tools, pretrial services staff performed their tasks of interviewing defendants, verifying information, checking criminal records, preparing reports for the court, supervising conditions of release imposed by the court, and reminding defendants of upcoming court dates. Today, the pace of technological change is transforming the way pretrial services work is done. And that pace is accelerating at an exponential rate. Computing power has been doubling every 18 months, telecommunications capacity every 34 months, and electronic information storage capacity every 40 months. One author has calculated that, when measured against the 20th Century’s rate of progress, we will experience an astonishing 20,000 years of progress in technological growth in the 21st Century. To what extent are pretrial services programs making use of current technologies? How might the avalanche of technological developments projected to come our way in the next couple of decades aid the work of these programs? This document seeks to explore those questions. It begins with a review of technology to manage information and track program performance. The second section addresses each of the functions of pretrial services programs (e.g., interviewing defendants, verification, and record checks) and describes how technologies can be used to help programs in performing these functions. The third section explores factors that affect the implementation of new technologies, including the maturity of the technology at the time of implementation, the level of staff training required to use the technology, any philosophical issues that should be addressed prior to implementation, and costs. The fourth section discusses how technology affects the diffusion of knowledge about effective pretrial practices.

Details: Washington, DC: Pretrial Justice Institute, 2012. 34p.

Source: Internet Resource: accessed December 1, 2012 at: http://www.pretrial.org/Featured%20Resources%20Documents/PJI%20USING%20TECHNOLOGY%20TO%20ENHANCE%20PRETRIAL%20SERVICES%20(2012).pdf

Year: 2012

Country: United States

URL: http://www.pretrial.org/Featured%20Resources%20Documents/PJI%20USING%20TECHNOLOGY%20TO%20ENHANCE%20PRETRIAL%20SERVICES%20(2012).pdf

Shelf Number: 127042

Keywords:
Bail
Pretrial Release
Pretrial Services (U.S.)
Technology

Author: Kreyling, S.J.

Title: Technology and Research Requirements for Combating Human Trafficking: Enhancing Communication, Analysis, Reporting, and Information Sharing

Summary: The U.S. Department of Energy’s Science & Technology Directorate directed PNNL to conduct an exploratory study on the domain of human trafficking in the Pacific Northwest in order to examine and identify technology and research requirements for enhancing communication, analysis, reporting, and information sharing – activities that directly support efforts to track, identify, deter, and prosecute human trafficking – including identification of potential national threats from smuggling and trafficking networks. This effort was conducted under the Knowledge Management Technologies Portfolio as part of the Integrated Federal, State, and Local/Regional Information Sharing (RISC) and Collaboration Program. The major recommendations of this report are: • Defensible methodologies are needed to estimate the number of victims of human trafficking, both nationally and regionally. Various modeling and expert elicitation techniques can be applied, using the members of each DOJ anti-trafficking task force as the pool of experts, including victim service providers. Separately, there is a need to harmonize and standardize the existing efforts to estimate the scale of human trafficking in the US. • Variations in the definitions of human trafficking employed by law enforcement, service providers, and others pose a significant challenge to accurate measurement. Develop and implement a methodology that helps practitioners clarify and describe their conceptual frameworks/mental models. • Further identification of information-sharing processes and technologies currently in use by both DHS component agencies and partner organizations that participate in each of the federally-funded Anti-Human-Trafficking Task Forces across the county is required. • Research is needed on the applicability of collecting victim data from a wide variety of sources beyond law enforcement, the outreach strategies necessary to increase the breadth of sources from which information is collected, the reduction of the methodological challenges as more data is collected from different sources, and methods for using this data for the regional examination of patterns and trends. • The information collected about human trafficking investigations by local, regional and federal law enforcement is not easily accessible by investigating agents and data is not efficiently compared between agencies or across systems. Identify an emerging industry standard for federated search and begin to move existing and new systems to support it. • Ad-hoc information sharing between investigating officers/agents in different agencies is difficult and not a routine occurrence. Given the difficulties of browsing and searching the systems of other agencies, research is needed into tools that can be accessed and edited by any vetted law enforcement officer, yet with fixed geographic and categorical sections to focus on their specific interests (human trafficking, Internet Crimes Against Children (ICAC), gangs, narcotics, etc.). • Despite significantly increased attention to human trafficking, Washington State has not seen an increase in identifiable and prosecutable human trafficking-related cases associated with forced labor and domestic servitude of foreign nationals. An analysis based on analyzing visa applications (e.g., B1, H2A, H2B) should be conducted to produce a “proactive triage” of potential victims from high-risk populations. • Despite significantly increased attention to human trafficking nationwide, U.S. Immigration and Customs Enforcement (ICE) has not seen a comparable increase human trafficking related criminal convictions - only 30% of human trafficking cases that ICE initiated in FY09 eventually led to a criminal conviction. A lessons-learned study should be conducted to identify the factors that are most influential to a case’s successful transition from investigation to a conviction. • An International Association of Chiefs of Police (IACP) Working Group should be convened that builds on IACP’s pre-existing work related to combating human trafficking with a specific focus on the application of technology for training and investigations from the user perspective. Lessons learned, best practices and tools or technologies needed by local law enforcement will be the expected knowledge-product outcomes. • There is large body of knowledge and perspective on trafficking and smuggling residing in the Intelligence Community (IC) which is not widely available within law enforcement. Research should be conducted on lessons learned from the intelligence community concerning human trafficking and related networks (terrorism, smuggling, narcotics, weapons, etc.) which can then be applied to law enforcement and presented in an unclassified report. • There is no systematic means of proactively assessing the scale, movement, demand, inter-connectedness, or general operation of juvenile prostitution and Domestic Minor Sex Trafficking (DMST) at a regional or larger level. A pilot sensor platform should be built to examine a significant subset of on-line prostitution sites in a regional set of participating urban areas, as well as, street-based prostitution associated with DMST. • The greatest and most immediate need that the Co-Chairs of WashACT (Seattle Police, U.S. Attorney’s Office for the Western District of Washington, ICE, and the Washington Anti-trafficking Response Network) identified was for more shelters with specialized services for victims. In order to successfully investigate and prosecute traffickers, victims must be stable and free from fear and intimidation to be effective witnesses. • There is also a lack of capacity to deal with large numbers of trafficking victims at once, should the need arise (i.e., there is no “surge capacity”).

Details: Richland, WA: Pacific Northwest National Laboratory, 2011. 39p.

Source: Internet Resource: PNNL-20258: Accessed December 1, 2012 at: http://www.pnl.gov/main/publications/external/technical_reports/PNNL-20258.pdf

Year: 2011

Country: United States

URL: http://www.pnl.gov/main/publications/external/technical_reports/PNNL-20258.pdf

Shelf Number: 127088

Keywords:
Human Sexual Exploitation
Human Smuggling
Human Trafficking (Washington State, U.S.)
Information Sharing
Inter-Agency Collaboration
Technology

Author: Tolbert, Michelle

Title: Educational Technology in Corrections 2015

Summary: Technology has transformed the way we approach most daily tasks and activities. It plays a role in how we apply for and perform on a job, communicate with friends and family, access government and other services, manage our finances, and purchase entertainment. Technology also enables our learning. Recognizing the positive impact technology can have on education, President Obama, with the support of the U.S. Department of Educations Office of Educational Technology, developed the National Education Technology Plan. It outlines how our education system could use advanced technologies to support student learning regardless of backgrounds, languages, and disabilities; instruction and the professional development of teachers; data collection and analysis; and program improvement (U.S. Department of Education 2010). A corresponding plan describes how these technologies can be applied to the adult education field and adult learners (Russell et al. 2015). As states, districts, higher education institutions, and other education providers implement these plans, education programs in correctional facilities are being left behind. The policies and practices of federal, state, and local corrections agencies, including the juvenile justice system, severely hinder the ability of correctional education programs to enable learning through technology. For example, according to a 2013 survey of state correctional education directors, although most states offer students limited use of computers in their prisons, less than half reported that one or more of their prisons provided students with off-line access to Internet content and even fewer allowed restricted Internet access (Davis et al. 2014). The primary concern about adopting educational technology in corrections is the potential for security breaches. Other reasons include, but are not limited to, insufficient resources and staff capacity to purchase, implement, maintain, and monitor advanced technologies. Despite these legitimate concerns, a sea change is occurring in corrections. As advanced technologies are integrated into other areas of correctional facility life (e.g., family communications via e-mail and video conferencing, and access to health and treatment services via telemedicine), a growing number of corrections agencies and facilities and their education partners are exploring ways to securely and cost-effectively increase access to educational technology. Specifically, they are cautiously adopting advanced technologies to help prepare students to join our globally networked society by developing and improving their computer and digital literacy skills, making educational gains around the clock through computer-assisted instruction, accessing college courses, and preparing for employment; provide students with access to online assessments (e.g., online high school equivalency tests and industry-recognized certification exams), and instructors and administrators with the ability to measure student progress for program improvement purposes; expand the professional development resources available to instructors and equip them with technology-based instructional tools (e.g., open educational resources [OERs], learning management systems, and flipped classrooms) to enhance the classroom experience; support an education continuum for incarcerated individuals through data sharing, and aligning prison-based education and training programs with those in the community; and expand the reach of correctional education services to provide more incarcerated individuals with the knowledge and skills needed to obtain livingwage employment, become productive members of society, and exit court supervision upon release. In addition to strengthening correctional education services, advanced technologies can help correctional education programs have a greater impact on recidivism rates. As documented by a recent meta-analysis of the effects of education on recidivism and postrelease employment outcomes for incarcerated adults, inmates who participated in correctional education programs were 43 percent less likely to return to prison than those who did not enroll (Davis et al. 2014). Advanced technologies could provide the means to expand correctional education servicesto reach more students and to offer broader, more diverse curriculumthereby further lowering recidivism rates. ease the reentry process by allowing incarcerated individuals to prepare for release by researching employment opportunities; applying for jobs, financial aid, and benefits; enrolling in college; addressing outstanding legal issues; searching for and securing housing; and maintaining or developing personal relationships with their community support networks. Most, if not all, of these prerelease activities require some form of computer or telecommunication device and Internet access.

Details: Washington, DC: U.S. Department of Education, 2015. 40p.

Source: Internet Resource: Accessed August 31, 2015 at: http://www2.ed.gov/about/offices/list/ovae/pi/AdultEd/policybriefedtech.pdf

Year: 2015

Country: United States

URL: http://www2.ed.gov/about/offices/list/ovae/pi/AdultEd/policybriefedtech.pdf

Shelf Number: 136641

Keywords:
Correctional Education
Correctional Programs
Educational Programs
Technology
Vocational Education and Training

Author: Framework Convention Alliance

Title: The use of technology to combat the illicit tobacco trade

Summary: A number of industries face a growing trend: new requirements to identify a consumer product in trade, to verify its authenticity and to trace it. The tobacco sector has joined these industries. The Framework Convention on Tobacco Control, a World Health Organization treaty, identifies elimination of illicit trade in tobacco products as a key element of global tobacco control. The treaty requires in Article 15.2(b) that Parties should "consider, as appropriate, developing a practical tracking and tracing regime that would further secure the distribution system and assist in the investigation of illicit trade." Negotiations have begun on a supplementary treaty, or protocol, for combating illicit tobacco trade. In the context of the Article 15.2(b) requirement, this paper is intended to provide a reference source on existing systems. A tracking system allows authorities to monitor the movement of tobacco products. Tracing helps authorities pinpoint where tobacco was diverted into illegal channels. During the negotiations on the FCTC and the protocol, we have noticed many misconceptions about tracking and tracing. Sometimes systems were described as tracking and tracing but they did not allow totally, or in part, the monitoring of tobacco products at the international level. The purpose of this paper is to clarify the concepts, to describe the current use of technology to combat illicit tobacco trade and to identify merits and limitations of these practices. This paper describes the use of codes and markings on tobacco packaging and tax stamps to allow a better monitoring of the tobacco trade. It also gives an overview of coding technologies that are used, or are in development, in the tobacco industry and other sectors.

Details: Geneva, SWIT: FCTC, 2008?. 6

Source: Internet Resource: Accessed September 9, 2017 at: www.fctc.org

Year: 20080

Country: International

URL: www.fctc.org

Shelf Number: 147165

Keywords:
Illegal Tobacco Trade
Illicit Tobacco
Illicit Trade
Technology
Tobacco Industry

Author: CityRisks

Title: Analysing factors influencing the fear of crime from the Citizens' Perspective

Summary: Introduction In this task we aimed to gain greater insight into and a better understanding of the multiple macro- and micro-level factors that influence citizens' perceptions and experiences of crime and the criminal justice system in their local area. In addition, we set out to investigate the readiness of citizens to adopt new technologies which are designed to address fears, perceptions and experiences of crime in the city. To achieve this, existing information on levels and experiences of crime were collected and reviewed and surveys of citizens who live and/or work in three European cities (The London Borough of Waltham Forest, UK; Sofia, Bulgaria; and Rome, Italy) were undertaken. A total of 22,632 questionnaires were successfully completed across the three pilot sites. Survey Findings Perception of local crime rates and the criminal justice system - Most respondents perceived crime rates in their city to be average when compared with the rest of their country. Whilst in Sofia, respondents felt that crime rates had not changed in the time they had been living and/or working in the area, those in Waltham Forest and Rome felt crime rates had risen. - The level of confidence in the ability of local criminal justice agencies to adequately deal with crime varied considerably across the three sites. Broadly, those in Waltham Forest and Sofia expressed greater confidence in the police and criminal justice agencies, in comparison to those in Rome. - Overall, women were more confident in the ability of the police and criminal justice agencies to protect their citizens in the pilot cities than men. Fear of crime and impact of fear on behaviour - Respondents in all three pilot sites reported being 'worried to some extent' about crime. However, those in Sofia and Rome expressed more concern than respondents from Waltham Forest. On the whole, women in the three cities were more fearful of becoming a victim of crime than men. - For almost all in Sofia, the quality of their lives had been affected by their fear of crime. Fewer respondents stated that this was the case in Waltham Forest and Rome. - In Sofia, the same proportion of respondents reported feeling safe walking alone in the day and after dark, fewer respondents from Waltham Forest and Rome felt safe walking alone after dark in their local area. - Across the three sites, respondents reported modifying or changing behaviours because of the fear of being the victim of a crime. This was most likely to be the case in Rome. - Respondents from Sofia expressed very high levels of concern for being a victim of all of the crimes types listed. Comparatively, those in Rome and Waltham Forest were less concerned about being the victim of a crime. Across the three sites, burglary was the crime most commonly feared by respondents. Levels of victimisation - The majority of respondents across the three pilot sites had not been a victim of crime in the last 12 months. - In Waltham Forest and Rome, the crime most commonly experienced by respondents was vehicle damage. - Respondents across the three sites tended to report crime(s) either in person at a police station or by phoning the police. Fewer respondents used textbased or online methods of reporting crimes. - Greater satisfaction was reported by respondents from Waltham Forest when discussing how their crime report was dealt with than respondents in Rome. - Fewer respondents from Rome than Waltham Forest were interested in seeking alternative ways (e.g. via a mobile phone or online) of reporting a crime. The role of citizens in community safety - In all the pilot sites, respondents believed that conducting citizen consultations about crime and community safety issues was a worthwhile process. - Whilst respondents in Rome and Waltham Forest perceived there to be a high degree of willingness amongst citizens in their local area, less shared this willingness in Sofia. The readiness to use new technologies - Across the three sites, most people owned a smart phone (e.g. iPhone). Higher proportions reported ownership of a tablet (e.g. an iPad) than a smart TV. - Social networking apps were the most commonly used apps in Waltham Forest and Rome. - Willingness to report crime via an app, if it was possible, was high across all sites, in particular Sofia. There were similar levels of interest in obtaining and sharing information about a crime in their local area in real-time via an app. Conclusions and implications for the development of technological solutions An (app)etite The survey findings show that there is an appetite amongst citizens in the three European cities to engage with technologies aimed at mitigating risks. Our findings provide support for the development of an app that allows users to report a crime they have witnessed or have been victim to, with speed, ease and one that yields a satisfactory response from the police. Police involvement In developing a technological solution, the police and other criminal justice agencies need to be both central to its development but also, its operation. Targeted citizen consultations Most of those surveyed have lived and/or worked in the area for 10 years or over and utilising their local knowledge and experiences would be valuable to the technological project. Greater, targeted consultation and delivered using a variety of methods is pivotal to the development of a technological app. Information-sharing to address avoidance behaviour Across the three sites, the fear of becoming a victim of crime was quite high. An app that provides accurate and 'live' information about crime and other incidents in local areas has the potential to reduce the fear of crime amongst citizens.

Details: Athens: City.Risks, 2016. 56p,

Source: Internet Resource: Accessed November 2, 2017 at: http://project.cityrisks.eu/wp-content/uploads/deliverables/City.Risks_D2.2-Analysing-factors-influencing-the-fear-of-crime-from-the-citizens-perspective.pdf

Year: 2016

Country: Europe

URL: http://project.cityrisks.eu/wp-content/uploads/deliverables/City.Risks_D2.2-Analysing-factors-influencing-the-fear-of-crime-from-the-citizens-perspective.pdf

Shelf Number: 147975

Keywords:
Crime Prevention
Fear of Crime
Technology
Victimization
Victims of Crime

Author: Newbold, Joe

Title: 'Predictive Policing', 'Preventive Policing' or 'Intelligence Led Policing'. What is the future?

Summary: Executive Summary There is no evidence to suggest predictive policing is completely ineffective, it has generated the following results from the methods used and the trails conducted: - An increase in predictive accuracy of 60 percent (Kent Police: PredPol) - Crime hit rates rose from 5 percent to 11-19 percent (Kent Police: PredPol) - 42 percent drop in crime in City of Lancaster, USA (IBM SPSS modeller) - 26.6 percent reduction in burglaries (Greater Manchester Police: Optimal Forager) - Reduction of domestic violence reoffenders increased from 35-37 percent to 62-65 percent (Strathclyde Police: RFG) - Reduction in harm score of 27 percent in relation to domestic violence (Essex Police: RFG) There are other methods in use across the UK market but specific data was not available for these during the preparation of this report. Cheshire, the MET, Avon & Somerset to name a few are working on various evaluations, the results of these have either not been public or accessible; therefore this data is not included in this report. This report is split into two distinct sections; the here-and-now and the future. The here-and-now utilises information gathered first hand, traditional academic theories and proven results to bring together the current efforts being made to explore predictive policing and modelling by UK police forces. The future is very different, it attempts to guess the evolution of local policing demand, takes ideas and conceptualises the use of technology and data to enable police forces to focus on increasing crime prevention, helping victims and provided a first class and improved service to those they are committed to serve. The original title of this report was "Is Predictive Policing a practical, viable and effective tool for 21st century crime prevention?", however, upon further reflection throughout the course of my research it seemed more appropriate to change it to match the flow of the information, research and theories presented. Hence the change to Predictive Policing', Preventative Policing or Intelligence Led Policing. What is the future? Predictive Policing is defined in the introduction of this report and is a wide and complex area commonly misused to imply an advanced level of analytics to age old techniques such as crime-mapping, which are in essence a mobile, easily accessible and simple form that helps in the visualisation of crime. During the course of the discussions and interviews with UK police forces, one posed the question of "Are there any predictive policing methods that you can say do not work?" the answer is no. From the evidence gathered and presented in this report there is no absolute evidence that would suggest any form of predictive policing does not work. However, the natural evolution to this question would be "Which one is most effective?" this is where the answer is totally dependent on a number of factors that include but not limited to: - Technological capabilities/hardware infrastructure - Advancement in culture towards data-driven policing - Access to mobile information provided to/and gathered from officers - Operational or societal objective of chosen solution - The continued enthusiasm of officers and the integration of modelling into force of National SOPs - Is the focus on improving crime statistics or understanding root causes/supply & demand of crime? Underlying the strapline predictive policing is the need to understand the demand of crime, the influential factors creating it and the situational awareness of the efforts police forces are carrying out. The current approaches are not truly predictive, despite the evidence that has been published which supports this. They are data driven intelligence led methods that do create efficiencies within policing, links in data and easily accessible visualisations. All-in-all enabling the police to have the time to carry out the activities that not only best serve their communities but impact on their security and quality of life. True predictive policing would require more than a few data sets, as some models currently utilise. What is really required is something akin to that proposed by the Dutch National Police (as described in Section V). When reading this report a continued focus should be on the use of data and technology in relation to assisting officers in doing their job not replacing them. I propose that predictive policing in its current form is a toolbox of strategies/techniques that naturally evolve into effective preventative measures that enable police to make an invaluable contribution towards the safeguarding of potential victims and their communities. A theory that alters the thinking towards the use of intelligence led policing is this: Criminals are altering the environment in which they operate by two means, direct and indirect. Direct (opportunistic); the observation of their surrounding environment including monitoring the police and acting accordingly, Indirect (economical); the shift towards the environment in which they have no control but chose to adapt their methods to fit with economic, social and technological changes, the shift towards internet crime and sophisticated wire fraud is an example of this" This is theorised in more detail in the displacement and diffusion section of this report.

Details: Coventry, UK: Warwick Business School, 2015. 47p.

Source: Internet Resource: Accessed January 11, 2019 at: http://library.college.police.uk/docs/Predictive-Preventative-or-Intelligence-Led-Policing.pdf

Year: 2015

Country: United Kingdom

URL: http://library.college.police.uk/docs/Predictive-Preventative-or-Intelligence-Led-Policing.pdf

Shelf Number: 154110

Keywords:
Crime Displacement
Intelligence-Led Policing
Police Officers
Policing
Predictive Policing
Preventive Policing
Technology

Author: United States Government Accountability Office (GAO)

Title: Southwest Border Security: Border Patrol is Deploying Surveillance Technologies but Needs to Improve Data Quality and Assess Effectiveness

Summary: What GAO Found The U.S. Border Patrol, within the Department of Homeland Security's (DHS) U.S. Customs and Border Protection (CBP), has made progress deploying surveillance technology along the southwest U.S. border under its 2011 Arizona Technology Plan (ATP) and 2014 Southwest Border Technology Plan. The ATP called for deployment of a mix of radars, sensors, and cameras in Arizona; the 2014 plan expanded these deployments to the rest of the southwest border. As of October 2017, Border Patrol had completed the planned deployment of select technologies to Arizona, Texas, California, and New Mexico. For example, in Arizona, Border Patrol deployed all planned Remote Video Surveillance Systems (RVSS) and Mobile Surveillance Capability (MSC) systems, and 15 of 53 planned Integrated Fixed Tower (IFT) systems. Border Patrol also deployed all planned MSC systems to Texas, California, and New Mexico and completed contract negotiations to deploy RVSS to Texas. These technology programs have experienced delays, but are currently on track against revised program schedules and cost baselines. To plan for future technology deployments, Border Patrol reports it will use its Requirements Management Process (RMP)a process designed to facilitate planning by, among other things, identifying capability gaps and collecting agents' feedbackand other initiatives. Border Patrol is currently developing written guidance for the RMP to ensure station officials understand their roles and responsibilities in the process. Border Patrol agents collect and report data on asset assists, which are instances in which technologies or other assets (such as canine teams) contributed to an apprehension or seizure; however, Border Patrol has not provided sufficient guidance to ensure the accuracy and reliability of that data. For example, agents incorrectly attributed some apprehensions or seizures to certain technologies rather than others. Stations in the Rio Grande Valley sector recorded assists from IFTs in about 500 instances from June through December 2016; however, this sector does not have IFTs. Data integrity and quality checks are the responsibility of individual sectors, but Border Patrol has provided limited guidance on how to ensure data quality. Without sufficient guidance to ensure the quality of asset assist data, Border Patrol is limited in its ability to determine the mission benefits of its surveillance technologies and use information on benefits to inform resource allocation decisions. Why GAO Did This Study The southwest border has long been vulnerable to cross-border illegal activity. In fiscal year 2016, Border Patrol apprehended over 409,000 illegal entrants. Border Patrol has employed a variety of land-based surveillance technologies to assist in securing the border. GAO has reported regularly on CBP's progress and challenges deploying surveillance technologies. GAO was asked to review CBP's use of surveillance technology. This report examines (1) the deployment status of surveillance technology programs and the extent to which CBP has developed plans for future technology deployments and (2) what data are available on the contributions of deployed technologies to CBP's border security efforts and the extent to which CBP has assessed technology performance. GAO analyzed technology program documents; interviewed CBP and Border Patrol officials; and conducted site visits to Arizona and south Texas to observe the operation of various land-based technologies. We selected these locations because CBP has deployed or has plans to deploy a mix of technologies there, among other factors. What GAO Recommends GAO recommends that Border Patrol issue guidance to improve the quality and usability of its asset assist information. DHS concurred with GAO's recommendation.

Details: Washington, DC: 2017. 43p.

Source: Internet Resource: Accessed January 12, 2019 at: https://www.gao.gov/assets/690/688666.pdf

Year: 2017

Country: United States

URL: https://www.gao.gov/products/GAO-18-119

Shelf Number: 154099

Keywords:
Arizona Technology Plan
Border Patrol
Cameras
Customs and Border Protection
Department of Homeland Security
Government Accountability Office
Integrated Fixer Tower
Mobile Surveillance Capability
Radars
Remote Video Surveillance Systems
Requirements Management Process
Sensors
Southwest Border Technology Plan
Surveillance
Technology

Author: Rademaker, Michel

Title: Dutch Investments in ICT and Cybersecurity: Putting it in Perspective

Summary: Digitalization has taken a predominant role in our everyday lives. The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased our economic prosperity. The digital economy today permeates through different domains of the world economy, ranging from sectors such as banking and retail, to education and healthcare. The opportunities offered by the digital revolution and new technologies are regarded as the single most important drivers of innovation, competitiveness, and consequently, economic growth. The Netherlands considers itself one of the leading ICT countries, promotes itself as 'a safe place to do business' and aspires to be the digital gateway of Europe. But are we investing enough to match these ambitions and manage the risks? In the advisory report presented to Dutch Prime Minister Rutte, Herna Verhagen, CEO of PostNL, urges the Dutch government, companies, and households to invest 10% of their annual ICT budget in cybersecurity. In her analysis, Verhagen presents a compelling overview of the current cyber threats, challenges and opportunities, and sets an ambitious goal, but does not provide any measureable benchmarks for the 10% norm, nor any insight into the current state of Dutch cybersecurity investments. This report will first estimate the current and prospective size of the Dutch digital economy and the ICT sector, and later analyze how much the latter contributes to the national economy. Next, we provide a holistic overview of the current level of public and private investments in cybersecurity, followed by an analysis estimating the Dutch cybersecurity market by comparing different studies. Finally, the report gives an overview of the current state of affairs of awareness, education, and scientific research pertaining to cybersecurity in the Netherlands. In the conclusion, we present the most important findings and assess how advanced the Netherlands is compared to the recently proposed norm that suggest governments, businesses and citizens alike should invest 10% of their ICT budget in cybersecurity.

Details: The Hague, Netherlands: Centre for Strategic Studies, 2016. 47p.

Source: Internet Resource: Accessed January 20, 2019 at: https://www.thehaguesecuritydelta.com/media/com_hsd/report/123/document/HCSS-Dutch-Investments-in-ICT.pdf

Year: 2016

Country: Netherlands

URL: https://hcss.nl/report/dutch-investments-ict-and-cybersecurity

Shelf Number: 154275

Keywords:
Cyber Threats
Cybercrime
Digital Economy
Digitalization
ICT
Technology

Author: Barnes, Curtis

Title: Perception Inception: Preparing for Deepfakes and the Synthetic Media of Tomorrow

Summary: Contemporary audio-visual effects technologies now allow for the creation and manipulation of information in challenging ways never before encountered. They can be used to put words in people's mouths, portray people doing things they never did, copy their faces and voices, or even create entirely new faces and voices that appear thoroughly human. This research report considers the wide-ranging social, legal and policy issues arising. Synthetic media technologies have huge potential benefits, but they also have risks. Public awareness of this risk of deception has grown through discussion of one kind of emerging audiovisual technology known as "deepfakes". The existence of such technologies may undermine general trust in audiovisual information to some degree. The researchers anticipate that synthetic media will continue to improve, becoming better and more accessible. They think it likely that in the near future, consumers and citizens will be regularly exposed to audio, images and video that looks or sounds as if it is a reliable representation of factual events, even though it is not. It is information that gives the impression that it was "captured", when in fact it was "constructed" to a greater or lesser extent. Lots of this information will be benign or beneficial, but some of it will be harmful. The researchers are not convinced that enacting substantial new law is either necessary or the best way to address the harms that may be generated by synthetic media. They also identify a risk that, where new law goes beyond existing law, it may abrogate rights of freedom of expression. Synthetic media is a means of expression like many others. One of the more significant gaps in New Zealand law is not so much a gap as a boundary. It is a result of the nature of its jurisdictional limits to its own sovereign borders (in most cases): in particular, its application to overseas actors, whether other internet users, or to large social media platforms. Importantly, this is not an issue unique to New Zealand or to synthetic media technologies. In their research report from page 122 to 129, the researchers set out their conclusions, identify specific gaps in New Zealand law and make specific recommendations, as well as provide concluding remarks.

Details: Wellington, New Zealand: New Zealand Law Foundation, 2019. 143p.

Source: Internet Resource: Accessed June 4, 2019 at: https://apo.org.au/node/236911

Year: 2019

Country: International

URL: https://www.lawfoundation.org.nz/wp-content/uploads/2019/05/2018_ILP_5_RESEARCH-REPORT_Perception-Inception-Report-EMBARGOED-TILL-21-May-2019.pdf

Shelf Number: 156175

Keywords:
Audiovisual Technology
Deepfakes
Freedom of Expression
New Zealand
Synthetic Media Technology
Technology

Author: Bailey, Madeline

Title: Black Mirror: The Darker Side of Technology in the Criminal Arena

Summary: Technology has become an integral part of our everyday lives. Smart phones and the cloud have changed the way we communicate and do business. However, it has also created new channels within which criminals may operate. The rate at which technology changes makes it extremely difficult for the law to keep up with its change - more so for the courts than the legislature. This article will examine the current law as it relates to searches regarding personal information contained both on smart phones and on the cloud. It will look at a recent murder case in Baton Rouge in which the district attorney hired a third party to unlock the phone of a defendant, after the defendant refused to turn over the pass code to the phone based on his fifth amendment rights. It will explore the need for the law to strike a balance between the privacy rights of individuals and the state's interest in solving crimes and providing security to its citizens. Finally the article will suggest possible ways that the law may strike that balance and stay up to date as technology makes its rapid changes.

Details: S.L., 2019. 17p.

Source: Internet Resource: Accessed June 20, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3382374

Year: 2019

Country: United States

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3382374

Shelf Number: 156532

Keywords:
Evidence
Fifth Amendment
Privacy
Smart Phones
Technology

Author: Sun, Christopher M.

Title: The Strategies for Policing Innovation Initiative: Reflecting on 10 Year of Innovation

Summary: Law enforcement agencies continue to develop new and innovative strategies to better support and police the communities they serve, from integrating gunshot detection technologies into dispatch systems to improve response times during shootings, to collaborating with local health and social service organizations to address issues such as homelessness or substance abuse in comprehensively ways. Over the past 10 years, the Bureau of Justice Assistance (BJA), in partnership with the CNA Institute for Public Research (IPR), has supported law enforcement agencies across the country in implementing innovative policing approaches through the Strategies for Policing Innovation Initiative (SPI, formerly the Smart Policing Initiative). SPI supports not only the development and implementation of innovative policing strategies, but also the research partnerships that result in in-depth analyses and rigorous evaluations of these strategies to advance what is known about effective and efficient policing practices. This report examines SPI's accomplishments since its inception in 2009 and explores some of the major themes across SPI initiatives in both policing and policing research, including the following: -Reductions in violent crime, -Improved crime analysis capabilities in police agencies, -Evolution of research partnerships with SPI sites, -Collaborative partnerships with agencies, organizations, and community stakeholders, -Integration of technology into policing.

Details: Arlington, Virginia: CNA, Analysis and Solutions, Strategies for Policing Innovation, 2019. 20p.

Source: Internet Resource: Accessed June 20, 2019 at: https://www.cna.org/CNA_files/PDF/IIM-2018-U-018471-Final2.pdf

Year: 2019

Country: United States

URL: https://www.cna.org/research/SPI

Shelf Number: 156537

Keywords:
Community Stakeholders
Innovation
Innovative Policing
Innovative Strategies
Law Enforcement
Policing
Smart Policing
Technology

Author: Kramer, Franklin D.

Title: Cybersecurity: Changing the Model

Summary: There is a cybersecurity gap. Despite all efforts, adversarial cyberattacks are outrunning defender security improvements in technology, processes and education. Accordingly, this report recommends a change to new models of cybersecurity that will deliver significantly better results for the key arenas of: critical infrastructures; states, cities, and localities; the federal government; and the international sphere. Crucially, the federal government would enhance its active involvement, expanding support for "coordinated partnerships" in those key arenas, and Congress would provide additional resources and authorities requisite to the task. The private sector would likewise play a key role engaging and supporting coordinated partnerships, including in the development of advanced technologies and the use of critical capabilities such as cloud technologies, automation, and artificial intelligence. The important outcomes would result from coordinated actions, sustained and focused funding, and development and implementation of advanced technologies. -For the key critical infrastructures of energy, finance, transportation, telecommunications, and water treatment, this report recommends the establishment of an enhanced public-private model, with the federal government and key enterprises organizing coordinated, advanced protection and resilience, intelligence sharing, and active defense. The government should provide annual budgetary support and financing for costs incurred, and should utilize its capabilities to "defend forward...to stop threats before they reach their targets." -For states, cities, and localities, this report recommends moving from a largely decentralized and under-resourced approach to a full-fledged, state-centric cybersecurity expert center, to coordinate state-level cyber efforts including: law enforcement and the National Guard; provision of cybersecurity by the state as a service to cities and localities; and establishment of structures and procedures for the federal government to provide states with annual cybersecurity budgetary resources to increase education, training, and exercises, and to undertake "attack protection" through active defense and a "defend forward" approach. -For the federal government, this report recommends the establishment of a National Cybersecurity Fusion Center featuring: intelligence and operational capabilities; increased support to critical infrastructures and state, city, and locality entities, including establishment of a federal cybersecurity budget for these enterprises; expanded use of active defense and "defend forward"; an increased focus on the Department of Defense (DoD) overcoming vulnerabilities and enhancing cybersecurity resilience, including providing a standard "resilience architecture" for contractors and subcontractors; and significant additions of cybersecurity personnel and budgetary funding to the Department of Homeland Security (DHS) and the Department of Defense. -For international activities, this report recommends organizing around likeminded countries and organizations, including through: the establishment of an International Cyber Stability Board; provision of protection and resilience to key cross-border critical infrastructures, including finance and transportation; undertaking a multinational campaign response to malignant cyber actions by significant nation-state and criminal threats; and enhancing capabilities to defend against armed attack, including with allies and close partners. Congress will have a critical role in achieving these objectives. Legislation will be required for -establishing a National Cybersecurity Fusion Center that will coordinate intelligence and operational actions focused on cybersecurity resilience in the United States, to include timely technology insertion, streamlined processes and continuous learning; -providing requisite authorities for federal support to cybersecurity for key critical infrastructures, and to states, cities, and localities; -creating an annual federal budget line to support cybersecurity for states, cities, localities, and key critical infrastructures; -establishing a federal budget line item to support cybersecurity for the federal government, and increasing the number of cybersecurity personnel at the Department of Homeland Security, pursuant to a programmatic plan presented to the Congress; -increasing the focus on and expanding resources - including the number of cybersecurity personnel - to significantly upgrade the cyber resilience of the Department of Defense, including its contractors and subcontractors, pursuant to a programmatic plan presented to the Congress; -establishing and regulating "certified active defenders," private-sector entities that will operate in conjunction with, and under the direction and control of, the government to enhance cybersecurity resilience; and -internationally, authorizing enhanced cybersecurity support to NATO and other treaty allies, as well as the establishment of an International Cyber.

Details: Zurich, Switzerland: Atlantic Council, 2019. 28p.

Source: Internet Resource: Accessed June 27, 2019 at: https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/AtlanticCouncil-Cybersecurity-Changing_the_Model.pdf

Year: 2019

Country: International

URL: https://css.ethz.ch/en/services/digital-library/publications/publication.html/8cff8c8b-73dd-4961-aecb-807e1d4af677

Shelf Number: 156594

Keywords:
Cybercrime
Cybersecurity
Espionage
Technology

Author: Russo, Joe

Title: Procuring and Implementing Offender Tracking Technology: Challenges and Needs

Summary: Criminal justice agencies increasingly leverage offender tracking technology in the supervision of accused and convicted criminal offenders. According to a 2016 survey conducted by The Pew Charitable Trusts, agencies were supervising more than 88,000 individuals with offender tracking technology, a 30-fold increase from the roughly 2,900 reported a decade earlier. In light of the increasingly important role that offender tracking technology plays in community supervision, the Justice Technology Information Center (JTIC), a program of the National Institute of Justice (NIJ), assembled an expert panel of administrators and program managers with responsibility for their agencies' offender tracking programs. This report presents the results of the panel's discussions.

Details: Washington, DC: National Institute of Justice, Office of Justice Programs, U.S. Department of Justice, 2018. 22p.

Source: Internet Resource: Accessed August 14, 2019 at: https://www.justnet.org/pdf/00-offender-tracking_508_8-28-2018.pdf

Year: 2018

Country: United States

URL: https://www.justnet.org/corrections-technology/Corrections-offender-tracking.html

Shelf Number: 156978

Keywords:
Corrections
Electronic Surveillance
Offender Tracking
Supervision
Technology