Crime Prevention Technology lecture byrne

advertisement

CRIME PREVENTION TECHNOLOGY

System Component Technological Application

Crime Prevention -threat assessment instruments

--sex offender registration

Police

-criminal risk assessment /involuntary civil commitment

-bullying ID protocol

-facial recognition software

-residential and commercial property monitoring

-crime mapping (hot spots)

-crime analysis (COMPSTAT)

-criminal history data systems enhancement

-info sharing within CJS and private sector

-technologies to monitor cell and electronic communications amber alerts

-watch lists of potential offenders

-gunshot location devices

THREAT ASSESSMENT INSTRUMENTS

Threat Assessment: Among the more widely cited, and most controversial, crime prevention strategies over the past few decades are various threat assessment instruments tailored specifically to threats against a particular target.

Assessment instruments can be generally focused to examine an offender type

(MOSAIC) or can be offense-specific (i.e., SARA) and are used frequently by law enforcement, private protection services, and other government entities.

Research Findings to date :While the validity of threat assessment instruments can best be termed mixed (e.g., Campbell, Webster, and Glass, 2009; Reddy, Borum,

Berglund, Vossekuil, Fein, and Modzeleski, 2001), researchers and risk threat consultants have been developing and modifying these instruments for commercial use and profit.

PREVENTING CRIME : MOSAIC SOFTWARE

What is MOSAIC?

A development team of experts in psychology, law enforcement, victims' advocacy, prosecution, mental health, and threat assessment determines what areas of inquiry will produce the highest quality assessments. MOSAIC poses those questions to users, accompanied by a range of possible answers. MOSAIC calculates the value of the answers selected by the assessor, and expresses the results on a scale of 1 to 10. MOSAIC automatically produces a full written report, describing the factors that were considered.

Video: MOSAIC https://www.mosaicmethod.com/?page=video_learning

Research on predictive accuracy of MOSAIC: https://www.mosaicmethod.com/documents/DOJ_Study.pdf

https://www.mosaicmethod.com/?page=what_is_mosaic

SARA MODEL: SCANNING, ANALYSIS, RESPONSE

AND ASSESSMENT

HTTP://WWW.POPCENTER.ORG/ABOUT/?P=SARA

PROBLEM ANALYSIS TRIANGLE:

A SUITABLE TARGET IS AVAILABLE.

THERE IS THE LACK OF A SUITABLE GUARDIAN TO PREVENT THE CRIME

FROM HAPPENING.

A MOTIVATED OFFENDER IS PRESENT.

SITUATIONAL CRIME PREVENTION

Situational Crime Prevention

While the Problem Analysis Triangle helps to analyze problems, situational crime prevention provides a framework for intervention. By assessing the opportunities that specific situations offer for crime, situational crime prevention has identified five main ways in which situations can be modified. These are:

Increasing the effort the offender must make to carry out the crime.

Increasing the risks the offender must face in completing the crime.

Reducing the rewards or benefits the offender expects to obtain from the crime.

Removing excuses that offenders may use to “rationalize” or justify their actions.

Reducing or avoiding provocations that may tempt or incite offenders into criminal acts.

25 SITUATIONAL CRIME PREVENTION

TECHNIQUES

http://www.popcenter.org/25techniques/

SEX OFFENDER REGISTRATION

Sex Offender Registration: All convicted sex offenders must register with the local/state sex offender registry

Sex Offenders: there are approximately 800,000 registered Sex Offenders nationwide.

Technology: As with general risk and threat assessment, sex offender registries pre-date and are not philosophically tied to technological issues; but as is common, technology facilitate the dissemination of information to a far broader audience.

Effectiveness: A growing body of research has demonstrated that sex offender registries are inaccurate and do little to impact offender behavior and that the harm to offenders may greatly outweigh the benefits to society (Tewksbury, 2006: Tewksbury, 2005).

Thus, as a crime prevention strategy, the evidence suggests sex offender registries do not influence offender behavior to a significant degree and may in fact exacerbate existing issues that hamper rehabilitation and reintegration of offenders back to communities.

INVOLUNTARY CIVIL COMMITMENT : SPECIAL

POPULATIONS

Involuntary civil commitment has become more difficult due to changes in statutes beginning in late 60’s across the USA.

Mentally ill:

Since the tightening of criteria for involuntary psychiatric hospitalization, the

United States has seen a trend of persons with mental illness being marginalized to unsafe and inappropriate settings. Since deinstitutionalization, there has been a tremendous increase in America's population of people with mental illness who are living on the streets. The latest estimates by the United States' Substance Abuse and

Mental Health Services Administration reveal that up to 25 percent of our country's homeless population is made up of individuals with mental disorders, despite the fact that only approximately six percent of the general population suffers from mental illness.

Statutory Shift:

Under treatment-driven criteria for commitment, these persons would have gained access to the system through hospitalization on an involuntary basis if necessary. However, under standards based on dangerousness, the medical system will not intervene against a person's wishes until he or she becomes suicidal, physically violent, or grossly unable to perform activities of daily living.

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3392176/

INVOLUNTARY CIVIL COMMITMENT AND RISK

ASSESSMENT TECHNOLOGY

Potential Target Groups: Violent offenders , mentally ill offenders, sex offenders, and drug users

Involuntary Civil Commitment Statutes: used to hold individuals because they have been assessed as a significant threat to others or to themselves. Attention in recent decades to dangerous sexual predators (or the perception of) led to several US states loosening criteria for involuntary civil commitment; criteria that had been rather extensive and required a strict demonstration of evidence in most contexts.

Slippery Slope Argument:Technology bringing together risk assessment protocols and increased surveillance, coupled with an attitudinal shift in the general public (and lawmakers) to a punitive stance in dealing with sexual offenders has resulted in additional sanctions being imposed on offenders and, critics contend, an open door to extending this strategy to other types of offenders and even those deemed at risk for committing dangerous offenses in the future.

SPECIAL POPULATIONS TARGETED FOR

INVOLUNTARY CIVIL COMMITMENT

NGRI: insanity acquittees are not quickly released to society. Although these persons are technically acquitted by the justice system, they are almost always subsequently remanded to the medical system with the expectation that they will receive psychiatric care.

This expectation is met through civil commitment, and insanity acquittees remain hospitalized until they can prove that they have been sufficiently psychiatrically rehabilitated to no longer pose a risk to society.

The process of release from commitment for persons found NGRI can be very lengthy and complicated, and the time acquittees spend in psychiatric facilities may exceed the term of the jail sentence that they would have served if found guilty of the crime that they committed

SEXUALLY VIOLENT PREDATORS

Sexually violent predator (SVP) commitment laws exist in the legal statutes of 20 states as well as in federal law. Massachusetts is one of these states.

These laws allow civil commitment of individuals who have been convicted of sexually violent crimes provided that they have been diagnosed with a mental illness and are judged to present a risk to the general public because of their diagnoses.

Issue to consider:

The American Psychiatric Association formally opposed SVP commitment laws, and a large number of psychiatrists over the years have expressed professional concerns that these laws mandate physicians to serve the inappropriate, nonclinical function of incarcerating persons with criminal pasts in facilities that were established for treatment of psychiatric disorders.

OTHER SPECIAL POPULATIONS TARGETED FOR

INVOLUNTARY CIVIL COMMITMENT

Eating Disorders:

Despite the potential lethality of the disorders, the fact that an inpatient setting is often the most appropriate setting for weight restoration and intense psychiatric treatment, and the commonality of treatment refusal among those with the disorders, commitment of individuals with eating disorders is uncommon. Although many states have statutes that allow for commitment of patients whose behavior renders them gravely disabled, the behavior has to be so disabling as to create an imminent risk of harm to the patient.

Substance Abuse:

Currently, there are many states with systems in place that allow persons convicted of drug offenses to go to treatment as an alternative to going to jail. Research has shown that these individuals, who are coerced into treatment, have just as favorable outcomes as do voluntary patients. Because of limited access to programs and a widely shared belief that resources should be prioritized for people who truly want to be in recovery of their own accord, the practice of committing addicted individuals who have not broken laws is rare

Personality Disorders:

With regard to a personality disorder, antisocial personality disorder, which predisposes individuals to dangerousness, there is controversy regarding the issue of civil commitment. Psychiatrists disagree about whether this diagnosis alone should be grounds for commitment, and there have been conflicting legal decisions on the matter.

CHAPTER 35 IN MASSACHUSETTS

About the Statute

Massachusetts General Laws Chapter 123, Section 35 permits the courts to involuntarily commit someone whose alcohol or drug use puts themselves or others at risk. Such a commitment can lead to an inpatient substance abuse treatment for a period of up to 90 days.

Under the law, the person can be committed to a licensed treatment facility or, if none is available, to a separate unit at the correctional facility at Bridgewater for men or

Framingham for women.

In 2006, a new system of care for women was established and in 2008, a similar one was established for men. The Women's Addiction Treatment Center (WATC) is in

New Bedford and the Men's Addiction Treatment Center (MATC) is in Brockton both provide intake and treatment for those civilly committed under this law.

http://www.mass.gov/eohhs/gov/departments/dph/programs/substanceabuse/addictions/drugs-and-alcohol/section-35-faq.html#treatment

CHAPTER 12: APPLICATION FOR SHORT TERM

HOSPITALIZATION

Mental Illness:

For purposes of admission to an inpatient facility under Section 12, “Mental Illness” means a substantial disorder of thought, mood, perception, orientation, or memory which grossly impairs judgment, behavior, capacity to recognize reality or ability to meet the ordinary demands of life. Symptoms caused solely by alcohol or drug intake, organic brain damage or intellectual disability do not constitute a serious mental illness. Specify evidence including behavior and symptoms:

_______________________________________________________________________________________

_______________________________________________________________________________________

B).

Likelihood of Serious Harm

(check all categories that apply):

_____ (1) Substantial risk of physical harm to the person himself/herself as manifested by evidence of threats of, or attempts at suicide or serious bodily harm; and/or

_____ (2) Substantial risk of physical harm to other persons as manifested by evidence of homicidal or other violent behavior or evidence that others are placed in reasonable fear of violent behavior and serious physical harm to them; and/or

_____ (3) Very substantial risk of physical impairment or injury to the person himself/herself as manifested by evidence that such person’s judgment is so affected that he/she is unable to protect himself/herself in the community and the reasonable provision of his/her protection is not available in the community.

Specify evidence including behavior and symptoms:______________________________________________________

SCHOOL BULLYING

• One out of every four students (22%) report being bullied during the school year

(National Center for Educational Statistics, 2015).

• 19.6% of high school students in the US report being bullied at school in the past year. 14.8% reported being bullied online ( Center for Disease Control, 2014 ).

• 64 percent of children who were bullied did not report it; only 36 percent reported the bullying (Petrosina, Guckenburg, DeVoe, and Hanson, 2010).

• More than half of bullying situations (57 percent) stop when a peer intervenes on behalf of the student being bullied (Hawkins, Pepler, and Craig, 2001).

• The reasons for being bullied reported most often by students were looks (55%), body shape (37%), and race (16%) (Davis and Nixon, 2010).

USING TECHNOLOGY TO IDENTIFY SCHOOL

BULLYING AND MONITOR ONLINE BULLYING

School Bullying Identification Tools: In developing a risk profile for students who may be at risk of becoming/being victims of bullying, a host of individual-level variables relative to students themselves as well as contextual variables relating to the school environment have been analyzed to determine significance.

Causes of the Problem: Prior research has shown that institutional culture (e.g., a school’s anti-bullying protocol, level of security, staff training) is a significant factor in determining bullying risk (Sweeney, 2007; Gottfredson, 2001).

Prevention: School-based bullying prevention programs decrease bullying by up to 25%

(McCallion and Feder, 2013). http://www.pacer.org/bullying/about/mediakit/stats.asp

Massachusetts Response to Bullying and Cyber Bullying: http://www.mass.gov/ago/about-the-attorney-generals-office/communityprograms/bullying-and-cyberbullying/

NEW TECHNOLOGY: COMPUTER RECOGNITION OF BIOMARKERS, INCLUDING FACIAL

RECOGNITION, PALM/FINGERPRINT DETECTION, AND RETINAL/IRIS SCANNING

The technology of access control has been evolving in our midst for some time and individual identifiers hold the potential to make mechanical forms of access control

(i.e., keyed locks and access cards) obsolete in the very near future.

Identification Technology: Researchers at the University of Texas at Dallas in conjunction with the National Institute of Standards and Technology found that newly created computer algorithms designed to recognize human facial features did so with greater accuracy than humans themselves, thus demonstrating that machines can in fact substitute for human eye witness identification.

Access Technology : Fingerprint scanning has been in use for current generations of smartphones produced by companies such as Apple and Samsung and those corporations are experimenting with retinal and iris (with iris scanning thought to be the superior and more secure) scanning technology for the next generation of their devices. Many private and public sector entities are using these advances to eliminate key and key card access to restricted locations within their facilities.

RESIDENTIAL AND COMMERCIAL PROPERTY

MONITORING TECHNOLOGY

Home/ Commercial Security is Big Business:

Worldwide, property security systems (or

‘alarm systems’ as they are colloquially referred in many locales) are a nearly 3 billion US dollar market, of which roughly 40 percent is spent on the security of private homes (Knott, 2013). While this figure represents but a fraction of the monies spend annually around the world on crime prevention strategies, it nevertheless is a significant amount that is projected to increase at roughly a five percent rate annually through 2017 (Knott, 2013).

The epitome of the controlled environment is the fully secured gated community (also typically known globally as a Common Interest Development, or CID). Such a community plan takes the notion of residential security to the next level by effectively isolating an entire planned development, layered with both security personnel and technology, with a cost-structure only feasible for a select subset of the wealthiest citizens (Le Goix and Webster, 2008).

Download