1 / 13

Designing Crime Out

Designing Crime Out. Prof. Dr. Tom Vander Beken International Security Management Association (ISMA) 2004 Summer Meeting “ Europe and Beyond – Dynamics of Crime ” Brussels, 29 June 2004. Overview. The cat and the kitchen (Organised) crime fighters rhetorics

Download Presentation

Designing Crime Out

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Designing Crime Out Prof. Dr. Tom Vander Beken International Security Management Association (ISMA) 2004 Summer Meeting “Europe and Beyond – Dynamics of Crime” Brussels, 29 June 2004

  2. Overview • The cat and the kitchen • (Organised) crime fighters rhetorics • Measuring and approaching crime differently • Opportunities and challenges for the business community • Conclusions

  3. 1. The cat and the kitchen Dramatis personae: POEKIE, the cat MARTHA, the mother TOM, the boy SCENE, the kitchen

  4. 2. (Organised) crime fighters rhetorics “Organised crime is growing.” “Organised crime is seriously affecting economy “We have arrested the prime suspect.” “Thousands of counterfeited goods have been confiscated.” “We have frozen the assets of the organisation

  5. 3. Measuring and approaching crime differently A. Knowing and understanding the threat of (organised) crime B. Action beyond traditional (preventive) strategies

  6. A. Knowing and understanding the threat of organised crime (1) Traditional reports on (organised) crime do not provide the information needed • No indication of risk/threat • Not future oriented • Mainly reporting on law enforcement activity Organised Crime Situation Reports are to be converted into real threat assessments Introduction of risk assessment methodologies in oc-reports

  7. A. Knowing and understanding the threat of organised crime (2) Framework method for Europe (IRCP-study and EU crimorg 133): 0. ENVIRONMENTAL SCAN 1. GROUPS 2. COUNTER STRATEGIES 3.LICIT MARKETS 4. ILLICIT MARKERS

  8. B. Action beyond traditional (preventive) strategies a. Prevention of (organised) crime b. Crime proofing c. Vulnerability studies

  9. a. Prevention of (organised) crime Organised crime cannot be tackled by repressive action alone Preventive strategies should focus on the “task environment” and opportunities for organised crime Society (inadvertently) offers opportunitieseconomic activity: products, services,… decision making: rules, legislation

  10. b. Crime proofing Crime proofing Reducing the opportunities for crime which may be inadvertently created by legislation, products and processes (Legislative) crime proofing “Testing legislative proposals as regards the crime opportunities they might create.” (Commission 2000 and 2002) “The scanning of loopholes and crime facilitating opportunities …. applied to the legislation making process” (Commission and Europol 2001) Product (crime) proofing No EU-definition (“so-called product proofing”) (report on implementation millenniumstrategy, 2003) “Method to scan the probability that a crime occurs due to the nature of the product” (own tentative definition)

  11. c. Vulnerability studies MAVUS project (Method for and assessment of the vulnerability of sectors) Vulnerability studies point out where a sector might be vulnerable for (organised) crime (risk) Vulnerability assessment based on information about a sector, applied on vulnerability indicators: Sector analysis (description), Environmental scan and cluster analysis, (description), Reference model analysis (description), Width scan (analysis), Depht scan (analysis), Conclusions Width scan vulnerability indicators refer to nature of the product, threshold, alternative markets, international context Depth scan vulnerabilityindicators refer to viability (costs, solvency, …) , corporate culture (business process level). Link with organised crime report method and crime proofing

  12. 4. Opportunities and challenges for the business community (Organised) crime is not only the government’s business Economy suffers from (organised) crime, but provides the environment for it as well Analysis of sector vulnerabilities will prevent (organised) crime Courage to look at own vulnerabilities (do we want to know?) Private-public partnership

  13. 5. Conclusions Existing knowledge and approaches towards (organised) crime need to be refined More attention for prevention by having a closer look at the opportunities (inadvertently) created for organised crime by the legal environment Knowledge of economic activity, crime situations, crime opportunities Action taken by policy makers, private sector representatives, law enforcement, academics

More Related