PREVENTING TERRORISM USING SOFT TECHNOLOGY Identifying Risky People: identifying potential Terrorists using information technology interrogating / foreigners, apprehending illegal aliens, wiretaps, monitoring phone conversations, monitoring financial transactions, tracking hate-related groups Identifying potential criminals using BIG DATA http://jimadler.me/post/47374264398/the-not-ready-for-prime-time-classifier http://www.bloomberg.com/news/2013-08-14/how-big-data-could-help-identify-the-next-felon-or-blame-the-wrongguy.html Identifying Risky Places: Airports, Public Transportation, Nuclear Plants, Federal Office Buildings INFORMATION TECHNOLOGY AND THE SURVEILLANCE STATE Snowden revelations about the extent of domestic spying underscore the downside of expanded government surveillance. Crime Prevention using big data and new surveillance technology: Do the ends justify the means? https://www.youtube.com/watch?v=9ri0bCmlQ7c THE EXCEPTIONAL CASE STUDY PROJECT In the mid-1990s, the United States Secret Service commissioned a study of 83 individuals known to have attacked or approached with the intent of attacking, a prominent public official or public figure. . Researchers concluded that attempts to develop a useful profile of potential assassins were essentially futile. Nonetheless, they identified a key characteristic shared by all of its subjects, namely, patterns of behaviors in the period leading up to the assassination or assassination attempt CORE PRINCIPLES OF THREAT ASSESSMENT First, , the study found that any attempts to develop a profile of targeted-violence perpetrators would be neither specific enough to have any real discriminatory value nor sensitive enough to effectively identify potential attackers who might fall outside of the “typical profile” CORE PRINCIPLE 2 Second, threat assessment draws a critical distinction between making a threat and posing a threat. The working premise is that the majority of individuals who make specific threats of violence never carry them out, and that many cases of specific violence involve no explicit threats before any action is taken. Although 77% of the ECSP sample had communicated their threat to someone before the incident, threat assessment views articulated threats as neither necessary nor sufficient for the presence of an actual threat. CORE PRINCIPLE 3 Third, acts of targeted violence are not spontaneous events but are planned activities that typically permeate the thoughts of potential perpetrators in the period leading up to the violence. Threat assessment views virtually all acts of targeted violence as preceded by a chain of behaviors, and, There are a series of behavioral warning signs that are amenable to identification and interdiction. CORE PRINCIPLE 4 Fourth, threat assessment takes a dynamic view of the etiology of targeted violence, holding that the trajectory from idea to execution is highly influenced by interactions between would-be attackers, their views of and perceived relations with the target, and a range of situational variables. Effective prevention and interdiction involves evaluating interactions among potential perpetrators, situational and opportunistic contexts, and potential targets. CAN WE ACCURATELY PROFILE LIKELY TERRORISTS? Borum (2004) refutes the notion that there is a “terrorist personality” or any valid psychological, demographic, or behavioral profile of a terrorist (see also Horgan, 2003). The problem with this approach is its lack of both specificity (the ability to exclude “false positives”) and sensitivity (the ability to avoid “false negatives”). The identification and assessment of terrorism risk becomes far more dependent on sophisticated systems of intelligence than assessment of most other forms of targeted violence. THREAT ASSESSMENT PROCESS QUESTIONS TO ASK IN A THREAT ASSESSMENT (Adapted from Borum et al., 1999) What motivated the subject to make the statement or take the action that caused him or her to come to attention? What has the subject communicated to someone else (target, law enforcement, family, friends, colleagues, associates) or written concerning his or her intentions? Has the subject shown an interest in assassination, weapons, militant of radical ideas/groups, murderers and/or mass murderers, and workplace violence and stalking incidents? Is there evidence that the subject has engaged in menacing, harassing, and/or stalking-type behaviors? Has the subject engaged in attack-related behaviors such as: Developing an attack idea or plan. Approaching, visiting, and/or following the target. Approaching, visiting, and/or following the target with a weapon. Attempting to circumvent security. Assaulting or attempting to assault a target. Does the subject have a history of mental illness involving command hallucinations, delusional ideas, feelings of persecution, etc., with indications that the subject has acted on those beliefs? How organized is the subject? Does the subject have the ability to plan and execute a violent action against a target? Is there evidence that the subject is experiencing desperation and/or despair? Has the subject experienced a recent personal loss and/or loss of status? Is the subject now, or has the subject ever been, suicidal? Is the subject's "story" consistent with his or her actions? Are those who know the subject concerned that he or she might take action based on inappropriate ideas? What factors in the subject's life and/or environment might increase or decrease the likelihood that the subject will attempt to attack a target (or targets)? THREAT ASSESSMENT INSTRUMENTS Design Issues: We are in the very early stages of development Linking Assessment to Crime Prevention: the use of alert codes, resource allocation Role of the Private Sector Threat Assessment Case Studies PREVENTING HOMICIDE Do we need a Department of Pre Crime, as depicted in Minority Report? Can potential Homicide Offenders and Victims be identified? In London, the police have created a list of 100 likely homicide offenders, based on extensive research on offender characteristics In Philadelphia, U-Penn researchers found that 70% of all homicide offenders AND victims were on probation or parole at the time of the homicide CAN SCHOOL VIOLENCE BE PREVENTED? Bullying identification protocol The use of mental health data by school officials; and linking mental health, criminal record, and gun purchase data bases; lessons learned from Virginia Tech tragedy The application of other forms of soft technology to crime prevention (e.g. information sharing, improved nationwide data collection protocol for criminal histories, etc.) CAN SEX CRIME BE PREVENTED? Internet- based sex crime prevention strategies: Stategy1: undercover police operations at federal, state, and local level involve monitoring chat rooms, and establishing contact with individuals engaged in solicitation. Strategy 2: investigating sex trafficking on the web/dark web requires global cooperation among law enforcement agencies worldwide. Community-based sex crime prevention strategies: Strategy 1: community education and public awareness campaigns targeting at risk populations; new licensing requirements for coaches, volunteers. Strategy 2: placing restrictions on known sex offenders, via occupational disqualification, sex offender registration, and in many jurisdictions, location restrictions MYTHS AND FACTS ABOUT SEX OFFENDERS Myth: "Most sexual assaults are committed by strangers." Fact: Most sexual assaults are committed by someone known to the victim or the victim's family, regardless of whether the victim is a child or an adult. MYTH 2 Myth: "The majority of sexual offenders are caught, convicted, and in prison." Fact: only a fraction of those who commit sexual assault are apprehended and convicted for their crimes. Most convicted sex offenders eventually are released to the community under probation or parole supervision. MYTH 3 Myth : "Most sex offenders re-offend. " Fact: Reconviction data suggest that this is not the case. Further. Re-offense rates vary among different types of sex offenders and are related to specific characteristics of the offender and the offense. MYTH 4 Myth: "Sexual offense rates are higher than ever and continue to climb." Fact: Despite the increase in publicity about sexual crimes, the actual rate of reported sexual assault has decreased in recent years, following the significant downward trend in all forms of violence over the past twenty years MYTH 5 Myth: "Children who are sexually assaulted will sexually assault others when they grow up.“ Fact: Most sex offenders were not sexually assaulted as children and most children who are sexually assaulted do not sexually assault others Among adult sex offenders, approximately 30% have been sexually abused. Some types of offenders, such as those who sexually offend against young boys, have still higher rates of child sexual abuse in their histories. While past sexual victimization can increase the likelihood of sexually aggressive behavior, most children who were sexually victimized never perpetrate against others OTHER MYTHS ABOUT SEX OFFENDERS Myth: "All sex offenders are male.“ Myth: "Sex offenders commit sexual crimes because they are under the influence of alcohol.“ Myth: "Youths do not commit sex offenses.“ Myth: "Juvenile sex offenders typically are victims of child sexual abuse and grow up to be adult sex offenders.“ Myth: "Treatment for sex offenders is ineffective." CAN SEXUAL ASSAULT BE PREVENTED USING SOFT TECHNOLOGY? EXAMPLES Sex offender registration of all known sex offenders Sex Offender registration does not prevent recidivism (sex crime re-offense rates are very low( 5% for new sex crimes),but it does make it more difficult for offenders to hide from authorities Estimates of the number of sex offenders who fail to register vary from 25,000 to 50,000 Absconders: About 10% of the 800,000 registered sex offenders are identified as absconders. Hiding in plain sight? Identity Theft and Identity Manipulation by Sex Offenders who fail to register or abscond is not common. SOFT TECHNOLOGY APPLICATIONS Lifetime monitoring of known sex offenders is now allowed by statute in over 30 states. Electronic monitoring can be used to locate and track sex offenders. Sex Offenders can be restricted from certain locations ( living, working, visiting) using new GPSbased location/mapping systems Private Sector operation of electronic monitoring raises cost and privatization concerns SOFT TECHNOLOGY APPLICATIONS Community Notification of High Risk Offenders Issue: How do we define different levels of sex offender risk? In Massachusetts, this decision is made by the Sex Offender Registry Board Level 1, 2 , and 3 Sex offenders are identified by the board National Sex Offender Registry link: http://www.nsopw.gov/?AspxAutoDetectCookieSupport=1 SOFT TECHNOLOGY APPLICATIONS Early identification of Adult Sex Offenders( as Juveniles) using various assessment tools Approximately 40% of all known sex offenders are juveniles Currently, it is estimated that adolescents (ages 13 to 17) account for up to one-fifth of all rapes and one half of all cases of child molestation committed each year. The majority of juvenile sex offenders desist; a subgroup continue to commit sex crimes as adults Policy Problem: heterogeneity of sex offenders-We need to distinguish different types of sex offenders when developing new strategies. SOFT TECHNOLOGY APPLICATIONS The use of “profiling” to prevent sex crime Can we accurately predict who will become sex offenders? Is there a link between early victimization and later offending in terms of sex crime? Sex Offender prediction and the false positives problem SOFT TECHNOLOGY APPLICATIONS Geographic Residency Restrictions Map location of schools, parks, libraries Use Mapping technology to create restriction zones Use EM technology to monitor sex offender movements and identify any violations Real time response to violations via police, probation, parole, and/or private sector Problem: Sex offending rarely occurs in public places Massachusetts Supreme Court Ruling in Sept. 2015: http://wwlp.com/2015/09/04/sex-offender-residencyrestrictions-reprimanded-by-sjc/ SOFT TECHNOLOGY APPLICATION Background Checks on all volunteers in schools, youth sports, and all jobs involving minors. Blanket restrictions on all convicted sex offenders Issues to Consider: Role of private sector in data management, cost of system integration Examples: Criminal Background Checks:http://www.lexisnexis.com/backgroundchecks/ Social Media Background Checks: http://gizmodo.com/5818774/this-is-a-socialmedia-background-check RISK ASSESSMENT TOOLS RRASOR. The Rapid Risk Assessment for Sexual Offense Recidivism (RRASOR) is brief and simple to use; it consists of only four variables, all of which can be easily retrieved from official records (Hanson, 1997). These four factors – previous sexual offenses, extrafamilial victims, offender age under 25, and male child victims – were based on research that demonstrated a strong correlation between these factors and the risk of re-offending. RISK INSTRUMENTS Static-99 considers a range of additional factors, including sexual deviance, types of available victims, persistence, and pattern of antisocial behaviors (Hanson & Thornton, 1999; Hanson & Thornton, 2000). In a comparative review, the Static-99 added to the predictive accuracy of the RRASOR in the measurement of long-term risk potential (Hanson & Thornton, 2000). CRIME PREVENTION Six Social-Engineering Strategies Target Removal Target Devaluation Target Insulation Offender Incapacitation Offender Exclusion Offense, Offender, and Target Identification TARGET REMOVAL The logic of prevention is clearest and most effective when a target is removed. Something that is not there cannot be taken. Some Examples: The move toward a cashless society is one example of target removal. Furniture built in to the wall cannot be stolen, and that bolted or welded to the floor is unlikely to be. A number of urban schools have created dress codes banning signs of gang affiliation and expensive clothes and jewelry TARGET DEVALUATION The goal of target devaluation is to reduce or eliminate the value of a potential target to anyone but authorized users. Examples of devalued targets include products that self-destruct (some car radios when tampered with) or that leave dear proof of theft (exploding red dye packs that stain money taken in bank robberies). There is a device that, via cellular phone, can remotely cut off the engine of a stolen car. Another system, called Auto Avenger, is triggered if the door is opened while the engine is running. If not disengaged by a hidden switch, the engine will shut down after a few minutes and the system tells the thief he has fifteen seconds to get out or face a 50,000-volt shock. TARGET INSULATION Target insulation is probably among the oldest of techniques for preventing violations We can separate perimeter-maintaining strategies such as fences, walls, moats, guards, and guard dogs from more specific protections such as safes, chastity belts, and placing goods in locked cases, chaining them to immovable objects, and hiding them. "Skywalks" linking downtown buildings shield their occupants from life on the street. OFFENDER INCAPACITATION Offender incapacitation renders the potential offender harmless. There are a variety of "immobilizers," "restrainers," and "containers" that seek to prevent violations by weakening the potential offender's will or ability to commit the offense. psychosurgery for the violent, literal or chemical castration for sex offenders, and the practice in some Middle Eastern countries of cutting off the hands of pickpockets. Excessively aggressive behavior may be treated with tranquilizers. Drugs such as Depo-Provera may be used to reduce the sex drive. OFFENDER EXCLUSION offender exclusion is the opposite of target insulation. The offender, rather than the potential target, is restricted. In short, the goal of offender exclusion is to keep potential offenders away from persons or environments that may tempt them to commit violations. Capital punishment is the most extreme form of this strategy. EXAMPLES OF OFFENDER EXCLUSION Other examples are exile, prison, curfews, and mobility restrictions (such as house arrests or restraining orders). At the group level, the creation of red light and drug districts away from residential areas (as in Amsterdam and Zurich) is also based on the idea of exclusion. Electronic location devices have recently made individual exclusion easier. the ultimate exclusion may be genetic screening: persons believed to have a biological predisposition to undesirable behavior simply never appear-they aren't born. This screening could be voluntary or mandatory. OFFENSE, OFFENDER, AND TARGET IDENTIFICATION The goal of identification is to document the occurrence of the violation and identify or even trap the violator. Various sensors and alarms fit here. Another expanding area involves immobilization or seizure strategies. One system involves a super-glue that spreads onto the floor after an explosion. Persons may be able to get into a building, but the human flypaper makes it impossible for them to get out. OTHER EXAMPLES OF IDENTIFICATION STRATEGIES A more general form of identification is the stigmatic mark of the "scarlet letter," which gives evidence of past violations. In some jurisdictions convicted drunk drivers must have special identifying license plates or signs on their cars. The requirement that individuals carry their records, or that these be checked, is equivalent. In some jurisdictions sex offenders are required to take out newspaper ads accompanied by photographs with warnings that they have been convicted of particular crimes; or their pictures may be prominently displayed around playgrounds. There is a proposal to electrically shock those under house arrest if they attempt to leave and, if they succeed in leaving, to increase the voltage the farther they stray