Crime and Terrorism Risk
eBook - ePub

Crime and Terrorism Risk

Studies in Criminology and Criminal Justice

Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell

  1. 284 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Crime and Terrorism Risk

Studies in Criminology and Criminal Justice

Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell

Book details
Book preview
Table of contents
Citations

About This Book

Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age. These original articles show how researchers, experts and the public are beginning to think about crime and terrorism issues in terms of a new risk paradigm that emphasizes establishing a balance between threat and resources in developing prevention and response strategies.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Crime and Terrorism Risk an online PDF/ePUB?
Yes, you can access Crime and Terrorism Risk by Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Civil Rights in Politics. We have over one million books available in our catalogue for you to explore.

PART I

OVERVIEW OF RISK ASSESSMENT

In the years since the terrorist attacks of September 11, 2001, the continuing threat has raised significant issues related to risk source assessment, analysis, management, communication, decision making, and values in the context of uncertainty. Yet, to a significant extent, law enforcement agencies confronting these hazards do not have the level of experience with risk assessment and management as have organizations in domains such as environment, food, and health. More accurately, although security agencies deal with risk continually, the tendency has been to do so from a closed-system perspective. In contrast, multidisciplinary research has consistently demonstrated that risk assessment is a highly complex process, dependent on the effective integration of scientific and human dimensions and involving sociopolitical factors that constrain or facilitate risk-based practices and policies (National Research Council, 1983; Stern and Fineberg, 1996).
As we have indicated, the interest in risk in the new research on public security can be divided into two analytical parts: risk assessment and risk management. In risk assessment (covered in Part I) attention is paid to the threats that are perceived in the environment, the opportunities that provide targets, and the calculations that are made by individuals and agencies to balance risk against the demands of routine daily activities. This assessment is influenced by the stage at which we judge risks relative to an actual incident where prevention, preparedness, response, and recovery all affect our risk balance calculation.
Risk management, which we cover in Part II, addresses the ways in which agencies plan for and react to threats and incidents, in particular, in the judgments that they make about resource allocations. This process has important effects, as well, depending on the level of impact of incidents where different levels of jurisdiction may influence the ways in which resources are managed, the ways in which information about threat is used, and the authority that is applied in responding to and coordinating response.
Risk analysis is probabilistic but also must account for uncertainty, where we have more difficulty in make firm assessments of what might occur. The extent to which we can remove uncertainty will influence how well we are able to anticipate hazards and threats and their consequences. Probabilistic risk analysis, based on Bayesian inference, is a well-developed method that has been shown to provide risk management models despite limited data. Similarly, stochastic risk modeling has been used to develop warning systems that can generate testable hypotheses. The National Infrastructure Advisory Council also recommends consideration of the application of the COSO financial risk management model to security risks (see www.coso.org). The COSO model includes risk assessment, risk response, and governance and the development of metrics to assess risk and the integration of the model throughout the enterprise (Marsh and Noonan, 2005).
The RAND Corporation advocates event-based models that include detailed analysis of vulnerability and consequence of specific terrorist attack scenarios (Willis et al., 2005). In this context of uncertainty, the goal of event-based models is to reduce “egregious errors” in risk estimates as opposed to identifying optimal estimates. The point is that risk modeling is a well-developed approach in the private sector and comparative research assessing the use of these models in security organizations offers significant value to policymakers and leaders of organizations such as the Department of Homeland Security.
There is an extensive literature on risk and risk management that has dealt with a range of topics from health security (Glass and Schoch-Spana, 2002), to property protection (O’Malley, 1992), to crime control (Simon, 1988), to crime prevention (Bradley and Morss, 2002), and to environmental threats (Douglas and Wildavsky, 1982; Dimitrov, 2002). Increasingly, researchers are beginning to apply the risk models to the study of terrorism (Cummins and Lewis, 2003; Viscusi and Zeckhauser, 2003). These approaches can be typified as concentrating on applications of a perspective that has become a more prevalent part of criminal justice thinking, beginning with the idea that we are living in a “risk society”, where hazards and threats become a focus of agencies to control through selective application of resources (see Beck, 1992). These controls are calculated through an application of probabilistic reasoning that incorporates the value of information, surveillance, and insurance (or some other form of mitigation) as key components in risk management of crime and terrorism (Simon, 1988). What this means is that agencies become more aware of the need to determine the dangers in an environment and marshal resources to repair damage that come from these dangers. Agencies must also enlist the support of the public in managing their own risks and in allowing the institutional interventions that attack the threats, sometimes at the cost of privacy and freedom of movement.
The calculus for risk management has not had an explicit focus of discussions around counter-terrorism until recently. This has emerged in the United States primarily through the ongoing political debate surrounding the distribution of homeland security funds across the country. While the discussion began as one of fairness, arguing that the areas most vulnerable should receive most funding, this debate has become more focused around how vulnerability can actually be calculated. In these deliberations, US government agencies have offered the formulation that risk is a product of threat, vulnerability, and consequence. In examining these factors, risk is profiled as “relative,” with the direct acknowledgment that resources must be applied unevenly and that not all threats will be addressed. In fact, some have argued that too much protection against loss creates loss. Baker and Simon (2002) state that society should embrace some risks. This view flies in the face of thinking that “we need to be right all the time, the terrorist needs only be right once,” a form of thinking that says that we cannot afford to make a mistake and must take action to impede all possible attacks. This strategy is used in airport screening but not applied successfully in any other instance of broad-based terrorism control (see Lum, Kennedy, and Sherley, 2006; Mueller, 2006).
In articulating risk management procedures, there has been much talk about prevention, response, and recovery (these phrases appear in many different forms in documents prepared by a range of agencies involved in crime prevention, emergency preparedness, terrorism response, and so on). In the case of terrorism, these procedures are based on a view that if attacks can be anticipated, we can quickly respond and recover from these events. But many problems emerge in the prediction of terrorism acts, the most difficult being the fact that these are low incident occurrences that are difficult to plan for. Despite this, the cases where events have occurred have provided important models for response and recovery and are giving us some important insights into how we might better prevent these events (as we have seen in the aftermath of the London transit bombings and the break up of the threatened attacks on airlines in Britain).
In the discussions of risk assessment, there have been conversations about the importance of values and institutional expertise in influencing the success of programs addressing threats and balancing risks (Van Brunschot and Kennedy, 2008). An interesting example of the contrast across societies concerning the tension that develops between experts and the public concerning risks (characterized as the “precautionary principle”) is the aversion of Europeans to genetically modified food, despite continuous claims about its safety, a reaction not reflected in North America. In similar ways, discussions about risk management in responding to terrorism, on the face of it, varies dramatically from country to country. Part of this is determined by the local experiences with threats but it is in part a function of the degree of trust that the public puts in law enforcement and its ability to counter dangers in an effective way. The judgment about the success of risk management in counter-terrorism, then, is dependent on not just reducing incidents but also by delivering programs in which the public has confidence. This success also depends on the degree to which the public becomes a partner in the risk management process, working with agencies to deter terrorism. This can take on many different forms but two examples that illustrate this are the actions taken within ethnic communities that are vulnerable to terrorism recruitment to address these threats and the voluntary participation of industry in securing their supply chains in collaboration with customs and border patrol (Closs and McGarrell, 2004).
An important element in this cultural approach relates to the social construction of risk and the management of risk communications (Wildavsky, 1995; Glassner, 1999). Social construction relates to the ways in which risk and security are discussed in the media, by politicians, in local communities, and in small circles of family and friends. How risk is constructed can have important implications for the steps that we take to mitigate it. In addition, the ways in which we manage risk communication can influence our views of threat. Agencies play an important role in this communication and this needs to conform to their actions in preparing for and responding to crime and terrorism.
In sum, in developing risk assessments strategies, we have to address a number of issues. We can summarize the major ones by posing questions that will be the subject of the articles that we have included in this book:
1. What are the common features of risk assessments of crime and terrorism, natural disasters, and health events and how do they differ?
2. How do we assess the risks of “all hazards” in the ever-changing global environments in which we now live?
3. How do we go about finding out what are the threats to security?
4. How do we keep it from getting too complicated to understand?
5. How do we make sure that we leave no stone unturned in identifying threats to security?
6. How do we determine that what we are told about security and threats is correct and valid (trust)?
7. How do we make sure that everyone understands our results?
8. How do we address different levels of security by circumstance (I’m safe, are you?)?
9. How do we establish trust in prescribing solutions or strategies based on our results?
10. How do we account for changes in security over time?
11. How do we contain the consequences of threats so that we minimize the damage that comes from hazardous events such as terrorist attacks?
12. How do we know that the things that we do actually change the final outcome of security (efficacy)?
13. How do we avoid attributing blame to those who are not involved in compromising our security?
14. How do we get people to return to “normal”, i.e., resume regular routines, without getting too comfortable in their security?
In setting the context for examining risks in modern society, we must also look at the changes that have occurred in global security where the shifting character of national borders and the forces of globalization have brought on new challenges for agencies responsible for addressing threats and hazards.

References

Baker, Tom and Jonathan Simon, eds. 2002. Embracing Risk: The Changing Culture of Insurance and Responsibility. Chicago: University of Chicago Press.
Beck, U. 1992. Risk Society: Toward a New Modernity. London: Sage.
Bradley, Ben S. and John R Morss. 2002. “Social Construction in a World at Risk: Toward a Psychology of Experience.” Theory & Psychology 12:509–532.
Closs, D. J. and E. F. McGarrell. 2004. Enhancing Security Throughout the Supply Chain. Washington, DC: IBM Center for the Business of Government.
Cummins, J. David and Christopher M. Lewis. 2003. “Catastrophic Events, Parameter Uncertainty and the Breakdown of Implicit Long-Term Contracting: The Case of Terrorism Insurance.” The Journal of Risk and Uncertainty 26:153–178.
Dimitrov, Radoslav S. 2002. “Water, Conflict, and Security: A Conceptual Minefield.” Society & Natural Resources 15:677–691.
Douglas, Mary and Wildavsky, Aaron. 1982. Risk and Culture. Berkely, CA: University of California Press.
Glass, Thomas A. and Monica Schoch-Spana. 2002. “Bioterrorism and the People: How to Vaccinate a City against Panic.” Clinical Infectious Diseases 34:217–223.
Glassner, Barry. 1999. The Culture of Fear: Why Americans Are Afraid of the Wrong Things. New York: Basic Books.
International Risk Governance Council. 2005. Risk Governance: Towards an Integrative Approach Geneva, Switzerland: International Risk Govern...

Table of contents