Advanced Sciences and Technologies For S
Advanced Sciences and Technologies For S
P. Saskia Bayerl
Ruža Karlović
Babak Akhgar
Garik Markarian Editors
Community
Policing - A
European
Perspective
Strategies, Best Practices and Guidelines
Advanced Sciences and Technologies
for Security Applications
Series editor
Anthony J. Masys, Centre for Security Science, Ottawa, ON, Canada
Advisory Board
Gisela Bichler, California State University, San Bernardino, CA, USA
Thirimachos Bourlai, Statler College of Engineering and Mineral Resources,
Morgantown, WV, USA
Chris Johnson, University of Glasgow, UK
Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece
Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada
Edward C. Morse, University of California, Berkeley, CA, USA
David Skillicorn, Queen’s University, Kingston, ON, Canada
Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Japan
bayerl@rsm.nl
The series Advanced Sciences and Technologies for Security Applications
comprises interdisciplinary research covering the theory, foundations and
domain-specific topics pertaining to security. Publications within the series are
peer-reviewed monographs and edited works in the areas of:
bayerl@rsm.nl
P. Saskia Bayerl Ruža Karlović
•
Editors
Community Policing - A
European Perspective
Strategies, Best Practices and Guidelines
123
bayerl@rsm.nl
Editors
P. Saskia Bayerl Babak Akhgar
Rotterdam School of Management CENTRIC, Sheffield Hallam University
Erasmus University Sheffield
Rotterdam UK
The Netherlands
Garik Markarian
Ruža Karlović School of Computing and Communications
Police Academy Zagreb Lancaster University
Zagreb Lancaster
Croatia UK
bayerl@rsm.nl
Foreword
bayerl@rsm.nl
vi Foreword
Today we are faced with new challenges like terrorist threats and attacks,
refugees, radicalization, conflicts between groups in society, the impact of (social)
media and blurring boundaries between countries, resulting in the fact that security
issues are not explicitly local. It is therefore important that research on Community
Policing based on international orientation, finding indicators for success and
insights into good practices, takes place.
This publication “Community Policing in a European Perspective” provides that
insight. The wide palette of themes, profound insights, European comparisons and
good practices gives many partners in security a great opportunity to expand their
knowledge and possibilities to deploy solutions.
Freddy Weerdmeester
Chief Superintendent
Senior Lecturer/Researcher
Police Academy of the Netherlands
bayerl@rsm.nl
Acknowledgements
The editors wish to thank the multidisciplinary team of experts who have
contributed to this book, sharing their knowledge, experience and latest research.
We further want to thank Maria Athanasiadou for her support in the editing of the
large amounts of text in this book.
Our gratitude is also extended to the following organizations and projects:
vii
bayerl@rsm.nl
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
P. Saskia Bayerl, Babak Akhgar, Ruža Karlović and Garik Markarian
ix
bayerl@rsm.nl
x Contents
bayerl@rsm.nl
Editors and Contributors
xi
bayerl@rsm.nl
xii Editors and Contributors
several international journals and has acted as chair and program committee member for numerous
international conferences. He has extensive and hands-on experience in the development, man-
agement and execution of KM-projects and large international security initiatives (e.g., the
application of social media in crisis management, intelligence-based combating of terrorism and
organized crime, gun crime, cyber-crime and cyber-terrorism and cross-cultural ideology polar-
ization). In addition to this, he acts as technical lead in EU security projects (e.g., projects Courage
on Cyber-Crime and Cyber-Terrorism and Athena on the Application of Social Media and Mobile
Devices in Crisis Management). Currently, he is the technical lead on EU H2020-project TENSOR
on dark web. He has co-edited several books on intelligence management. His recent books are
Strategic Intelligence Management (National Security Imperatives and Information and
Communications Technologies), Knowledge Driven Frameworks for Combating Terrorism and
Organised Crime, Emerging Trends in ICT Security, Open Source Intelligence Investigation and
Application of Big Data for National Security. Professor Akhgar is board member of the European
Organisation for Security (EOS) and member of the academic advisory board of SAS UK.
Garik Markarian holds the Chair in Communication Systems in the School of Computing and
Communications at Lancaster University, UK and is the CEO and Founder of Rinicom Ltd. (www.
rinicom.com). Prior to joining Lancaster University, he spent over 10 years in the wireless
broadband industry, working in senior executive positions for UK, USA and Canadian technology
companies. He is one of the founding members of the IEEE802.16 standard, where he chaired a
number of working groups aiming at selecting PHY Layer solutions and actively contributed to the
EUROCAE WG-82 (AeroMAX), EUROCAE WG-72 and IEEE802.16m standards. His current
research interests include IMT-advanced systems, wireless broadband for aviation security
applications, nonlinearity mitigation for OFDM/OFDMA, QoS and QoE, cross-layer optimization
techniques and ad hoc mesh networks. He has co-authored over 700 publications including 42
patents, 4 textbooks and 12 standard contributions. He is Fellow of the National Academy of
Sciences in Armenia and for a long time served as the Chair of the IET Professional Panel in
Communications. Under his management, Rinicom grew up to become one of the world’s leading
technology companies supplying its products to first responders and security agencies around the
world. In recognition of these achievements, Rinicom was awarded with the Queens Awards for
Excellence in Business.
Contributors
Babak Akhgar CENTRIC, Sheffield Hallam University, Sheffield, UK
M.L.M.G. Alcoforado University of Pernambuco, Recife, Brazil
Azliza Mohd Ali Lancaster University, School of Computing and Communiation,
Lancaster, UK
Plamen Angelov Lancaster University, School of Computing and Communiation,
Lancaster, UK
P. Saskia Bayerl CESAM/Rotterdam School of Management, Erasmus
University, Rotterdam, The Netherlands
Elisabeth Brein CESAM/Rotterdam School of Management, Erasmus University,
Rotterdam, The Netherlands
bayerl@rsm.nl
Editors and Contributors xiii
bayerl@rsm.nl
xiv Editors and Contributors
bayerl@rsm.nl
Chapter 1
Introduction
Community Policing (CP) is embedded in the daily life of European citizens; e.g.,
when police officers aim to solve local problems to improve the quality of life and
ensure a favourable state of security in the community. However, there are still
debates about the difference between ‘traditional’ policing and community policing.
Furthermore, community policing in Europe with its diversity of cultures, tradi-
tions, religions and practices did not evolve into a unified ‘one for all’ procedure
and is continuing to develop differently in various EU countries. It is therefore
unrealistic to expect that community policing in Europe could be harmonised and
that the same rules and procedures will become mandatory in all EU states. Instead,
different countries will continue to develop their own ways of delivering commu-
nity policing, which will need to be incorporated into the daily life of EU society
with its ideal of open borders and freedom of movement. This process of individual
developments within an economically and socially interlinked European society
brings many challenges and opens numerous opportunities for optimizing the way
community policing in Europe is delivered. In this book, we outline the challenges
and differences and suggest ways for developing community policing, which will
meet the requirements of EU citizens in the 21st century.
bayerl@rsm.nl
2 P.S. Bayerl et al.
bayerl@rsm.nl
1 Introduction 3
bayerl@rsm.nl
4 P.S. Bayerl et al.
References
Byrne J, Marx G (2011) Technological innovations in crime prevention and policing. A review of
the research on implementation and impact. CPS 3(20):17–40
Lewis S, Lewis DA (2012) Examining technology that supports community policing. Conference
on human factors in computing systems—proceedings, pp 1371–1380. doi:10.1145/2207676.
2208595
Scheider M (2008) The role of technology in community policing. Community Policing Dispatch
1(11). Published online: http://cops.usdoj.gov/html/dispatch/November_2008/nugget.htm
bayerl@rsm.nl
Part I
CP Context and Processes
bayerl@rsm.nl
Chapter 2
Community Policing in Support of Social
Cohesion
Concepts of safety, crime, policing and community are frequently used in profes-
sional but also laypersons’ discourse. However, definitions and the interrelatedness
of these concepts are often very complex and vary between different theoretical
perspectives and research fields. Thus, this chapter first gives a short overview of
the core concepts together with the relations among them.
Higher levels of concerns about neighbourhood safety are correlated with higher
levels of perceived physical incivilities (e.g., Taylor 1997), higher levels of crimes
against people and property (e.g., Taylor 2002), lower levels of community care and
vigilance and lower levels of place attachments/territoriality (Sampson and Graif 2009).
Crime rates in communities are strongly related to the extent of community social (dis)
organisation (Sampson and Groves 1989), and both disorder and crime should be
treated as outcomes of disorganisation, not as causes of one another (Sampson and
Raudenbush 1999). Social capital generally refers to the intangible resources of a
community (Saegert and Winkel 2004) such as mutual trust, patterns of reciprocity,
communalism, shared norms and identity (Flora et al. 1997) produced in “relations
among persons that facilitate action” for mutual benefit (Coleman 1988, p. 100). Social
disorganisation erodes social bonds and increases social disruption in communities
I. Sučić (&)
Institute of Social Sciences Ivo Pilar, Zagreb, Croatia
e-mail: Incs.Sucic@pilar.hr
R. Karlović
Croatian Police Academy, Zagreb, Croatia
e-mail: rkarlovic@fkz.hr
bayerl@rsm.nl
8 I. Sučić and R. Karlović
(Brewer et al. 1998), resulting in a lack of common values and social cohesion within
the community.
The level of cohesion determines the level of collective efficacy. Collective efficacy
is the driving force for residents to take an active role in modelling their communities
(Sampson and Raudenbush 1999) and in maintaining effective and collective social
control of crime and security (Sampson and Groves 1989). High collective efficacy is
negatively associated with crime rates and neighbourhood disorder, and it reduces
neighbourhood disadvantage, residential instability and fear of crime (Sampson and
Raudenbush 1999). Even neighbourhoods with weak social ties can have low crime
rates if they have high levels of collective efficacy; so networks and resources may be
necessary but not sufficient for social control (Morenoff et al. 2001). The breakdown of
social cohesion and erosion of social capital can both be causes and consequences of
increasing levels of insecurity (see also Chaps. 3 and 17).
Social cohesion is an ordering feature of a society and, according to Durkheim,
represents the interdependence between the members of society, shared loyalties
and solidarity (Jenson 1998). The term social cohesion is thus often used to
describe how well people who live in the same area are integrated into their local
ethnic or religious community (Robinson 2004) or as the amount of individual
participation in social groups in the community. There are two principal dimensions
of social cohesion: (1) social inclusion, i.e., the reduction of disparities, inequalities
and social exclusion and (2) social capital, i.e., the strengthening of social relations,
interactions and ties (Berger-Schmitt 2000).
The term ‘social cohesion’ has occasionally been used synonymously with the
term ‘community cohesion’ though they should be differentiated (Cantle 2001). The
term community cohesion was established following riots and disturbances in the
northern towns of Bradford, Burnley and Oldham (UK) in 2001 and the subsequent
Report of the Independent Review Team in which the problem of ‘parallel lives’
was identified (Cantle 2001; see also Chap. 7). This emerged as a policy response to
the perceived need for strengthened community identity and purpose in the context
of increasingly differentiated identities, transnational attachments and a general
climate of fear and marginalisation (Cantle 2005). According to Cantle (2001),
social cohesion assumes that all societal differences are essentially determined by
social class and economic inequalities while community cohesion assumes that
problems between identifiable groups, based on ethnic, faith or cultural divisions,
create a sense of unfairness and undermine solidarity among community members.
Community cohesion describes how well micro-communities are knitted together as
a whole, and its focus is on the existence of shared social values that enable all
communities to work together for common goals and to feel a sense of belonging
and citizenship (Robinson 2004).
Recently, policymakers have turned their attention from ‘community cohesion’
to issues of ‘integration’ and ‘resilience’. Integration means creating the conditions
for everyone to play a full part in national and local life (Department for
Communities and Local Government 2012), while resilience refers to the extent to
which a community is able to adapt to (economic) shocks and (cultural) changes
(Centre for Local Economic Strategies 2014).
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 9
The (limited) academic literature has been quite critical of the policy of com-
munity cohesion (Lowndes and Thorp 2011). It was criticized for its lack of clarity
and consistency (Flint and Robinson 2008; Joppke 2007) and seen as representing a
new form of governmentality (McGhee 2003). Also, community cohesion was
considered a ‘new buzz phrase in policing and community safety’ (Chainey 2005).
Community cohesion is “undermined by the disadvantage, discrimination and
disaffection experienced by the identifiable community as a whole” (Cantle 2005,
p. 52), and a lack of social cohesion results in increased social tensions, violent
crime, targeting of minorities, human rights violations and, ultimately, violent
conflict, etc. (Bureau for Crisis Prevention and Recovery 2009). Socio-economic
status and deprivation (90% of participants), access to services and facilities (70%
of participants), and crime (58% of participants) were considered the factors with
the greatest impact on community cohesion and resilience (cp. Centre for Local
Economic Strategies 2014).
Enhancing community security and cohesion has been identified as one of nine
outcomes under the broader Crisis Prevention and Recovery (CPR) outcome area in
the UNDP Strategic Plan (2008–2013) (Bureau for Crisis Prevention and Recovery
2009). Cohesive and resilient communities are less likely to experience neigh-
bourhood problems such as anti-social behaviour, crime and waste mismanagement
(Centre for Local Economic Strategies 2014). The concepts of community security
and social cohesion are mutually reinforcing. If communities feel physically secure,
they are likely to act in more cohesive ways and vice versa (Bureau for Crisis
Prevention and Recovery 2009). However, community cohesion does not neces-
sarily mean that there is an absence of conflict but that the community has ‘a
collective ability to manage the shifting array of tensions and disagreements’
(Gilchrist 2004). Consequently, it can be argued that to some extent the relationship
between crime and collective (dis)organisation may be mediated by the role of
police in community (cooperative or conflicting) (Skogan 1989), since police are
society’s first-line defence in dealing with conflicts among people (Trojanowicz and
Bucqueroux 1991) and the function of the police involve more than just enforcing
the law (Goldstein 1987).
bayerl@rsm.nl
10 I. Sučić and R. Karlović
Community Policing emerged as a means of addressing high crime rates in the early
1990s (Lewis and Lewis 2012) and of improving the relationship between the
police and the public (Eck and Rosenbaum 1994). Community Policing was
1
Sampson and Cohen (1988) found that robust arrests for disorderly conduct and drunk driving
had a deterrent effect on an unrelated crime—robbery.
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 11
bayerl@rsm.nl
12 I. Sučić and R. Karlović
(Jackson et al. 2009, p. 6), and strengthen social order, cohesion and informal social
control (Jackson and Bradford 2009; Jackson et al. 2009; Cooper and Innes 2009)
and the belief that the police are fair in their procedure and just in their treatment
and decision making (Jackson et al. 2013). Thus, public confidence is based less on
instrumental concerns about crime (in terms of crime-rates, perceived chances of
victimisation or fear of crime) and more on expressive ‘day-to-day’ concerns about
neighbourhood stability and breakdown (in terms of cohesion and collective effi-
cacy; see also Chap. 8).
Reiner (2000) suggested that the police are faced with the paradox that they are
judged by the lack of need for them and by public diagnoses of local values and
moral structures that shape perceptions of crime. In essence, low confidence in
policing expresses not only an unfavourable assessment of police activities, but also
an unfavourable assessment of the strength of the ties and bonds within the local
community. As such, narrow attempts to reduce fear and to communicate the reality
of crime did not significantly improve public confidence (Jackson and Bradford
2009). However, Community Policing strategies that look to take active part and
engage more with the day-to-day social order of civil public space and civil society,
seeking to increase the visibility, accessibility and familiarity of the police (Innes
2004) may address both fear of crime and public confidence in policing (Jackson
et al. 2009).
Cooperation between police and citizens is the central premise of Community
Policing (Goldstein 1987; Hawdon and Ryan 2003) and the key factor for suc-
cessful implementation of a Community Policing programme in support of social
cohesion (Greene and Pelfrey 1997; Goldstein 1987; Williams 1998). Again, there
is the question whether certain crimes will ever come to the attention of police
without Community Policing. Community Policing empowers citizens by enrolling
them as partners in efforts to make their communities a better and safer places to
live: They are expected to identify problems in their community, to give input into
decision making on the forms of required police services and to provide feedback
regarding the strengths and weaknesses of police services. Police officers should be
sensitive and responsive to residents’ concerns.
Usually, the problems of disorder and low-level crime—and not high profile
index crimes—pose an immediate and direct threat to residents and their families
(Trojanowicz and Bucqueroux 1991). Thus police officers should be able to deal
with the full range of community problems and not only violations of the law. They
should participate in peacekeeping and/or maintaining order (Goldstein 1987) as
well as supporting community-based efforts to reduce neighbourhood incivilities
and improve its physical appearance (see Chap. 7) Policing also empowers police
officers to be more independent and creative in developing alternate solutions to
community problems and to blend aspects of social work with police work
(Trojanowicz and Bucqueroux 1991) providing residents with what they really want
—crime prevention, i.e., to be spared from becoming a victim (Trojanowicz and
Bucqueroux 1991).
According to Lewis and Lewis (2012), two major perspectives on crime pre-
vention can be differentiated—those based on victimization theory and those based
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 13
on social control theory (Lewis and Salem 1981). While victimization theory
focuses on understanding crimes as events that occur between a potential victim,
offender and the environment (Lewis and Salem 1981), social control theory sug-
gests that social interactions influence criminal acts through the informal enforce-
ment of social norms (Hirschi 1969). From the victimization perspective, a potential
victim or offender assesses the risk of being victimized or caught, respectively
(Lewis and Salem 1981), while from a social control perspective, social norms
shape the morals and values of a community that influence criminal behaviour.
While social control theory is the basis for crime prevention from the community
perspective, police primarily embrace the victimization theory as a method to
understand and prevent crime (Skogan 2006). Thus by developing prevention
strategies, police mainly focus on changing the behaviours of potential victims and
offenders by impacting how they assess the risk of being victimized or being
caught.
bayerl@rsm.nl
14 I. Sučić and R. Karlović
Community Policing assumes that residents trust the police and are willing to
cooperate with the police, which is often far from the truth in many poor or minority
neighbourhoods (Manning 1997), high crime areas (Bartollas and Hahn 1999) and
disorganized communities (Langworthy and Travis 1999). The more crime and risk
factors a neighbourhood faces, the less likely it is to develop any organized activity
to fight crime, and residents are more reluctant to take the risk of intervening in
neighbourhood problems (Kubrin and Weitzer 2003). In disadvantaged neigh-
bourhoods, there is often a lack of the value consensus and resident cooperation that
Community Policing needs to succeed in reducing crime (Hope 1995; Walker
1992). Their residents consider that police have an ‘outsider’ perspective of the
neighbourhood (i.e., residents are often seen as ‘deserving victims’ whose lifestyles
invite victimization) and they are dissatisfied with police services (e.g., police
respond less vigorously to residents’ calls, there are higher rates of officers’ mis-
conduct than in more affluent areas) (e.g. Kane 2002; Mastrofski et al. 2002; Reisig
and Parks 2000; Smith 1986; Velez 2001; Weitzer 1999, 2000). Also, there is
distrust, a poor relationship and low support of the police and high resistance to
crime prevention programmes, since they do not see the benefit of community
programs and consider those programmes to be ineffective in controlling the crime
problems in their community (Stein and Griffith 2015). In disorganized commu-
nities, informal networks of social control are lacking. Thus, local offenders often
try to administer their own form of informal control or ‘justice’ to others in the
community (Kubrin and Weitzer 2003) or communities tend to employ more for-
mally organized responses to crime (Skogan 1989) or the police is forced to use
more traditional styles of policing (Hawdon and Ryan 2003).
Recent research speaks in favour of socio-economic deprivation as a cause of
poor community cohesion in disadvantaged areas rather than differences in ethnic
groups (Centre for Local Economic Strategies 2014). High crime rates exist not
because oppositional values are anchored in the community, but because limited
opportunities make it difficult for residents to pursue conventional goals and
because they lack the willingness or capacity to prevent deviance (Kubrin and
Weitzer 2003; Skogan 1989). Thus, the major challenge for the government is to
mobilise communities to participate in fighting crime (Lewis and Lewis 2012).
Local authorities and police forces should take the lead in establishing effective
multi-agency arrangements to develop and deliver a coordinated response to crime.
Shared moral values strengthen the connections between citizens and institutions
(Jackson et al. 2013), so residents should have opportunities for their conflict with
or animosity towards the police to be openly addressed (Gilchrist 2004). This can
be achieved by establishing channels of communication between residents and
between residents and police. Sharing information related to crime among com-
munity residents reciprocally and freely is crucial to crime prevention and control
(Manaliyo and Muzindutsi 2013). Shared experiences and activities allow people to
identify enough of a community of interest to establish a bond of trust. People are
linked by geography, but their affluence allows them access to technologies that
frees them to exercise a community of interest with those who live elsewhere.
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 15
bayerl@rsm.nl
16 I. Sučić and R. Karlović
2.5 Conclusion
Community security and social cohesion mutually reinforce each other. Since along
with socio-economic status, deprivation and access to services and facilities, crimes
also have significant impact on community cohesion and resilience, a cooperative
role of police in a community is very important in securing that communities stay
safe and cohesive. Community Policing represent proactive policing in which
formal and informal social control reinforce each other helping to reduce crime by
employing prevention activities that serve to promote social cohesion and reduce
neighbourhood disorder.
To reduce observed failure of existing Community Policing programs in their
efforts to strengthen community cohesion and organization, police should overcome
obstacles emerging out of its structural features but it should also more vigorously
mobilise communities to participate in fighting crime by establishing effective
multi-agency arrangements and communication channels to share information
among community residents reciprocally and freely by using information and
communication technologies. Overall, in order for Community Policing to support
social cohesion, programmes should aim to continually decrease tensions between
police and the community and aim to increase the quality of police services, police
visibility, effectiveness in dealing with community problems and their account-
ability to the community.
References
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 17
Centre for Local Economic Strategies (2014) Community cohesion and resilience—acknowledg-
ing the role and contribution of housing providers: final report
Chainey S (2005) The police role in community cohesion: using geographic indicators to identify
vulnerable localities. Jill Dando Institute of Crime Science, University College London
Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:95–120
Cooper H, Innes M (2009) The causes and consequences of community cohesion in Wales:
secondary analysis. Cardiff University School of Social Sciences, Cardiff
Department for Communities and Local Government (2012) Available at: https://www.gov.uk/
government/uploads/system/uploads/attachment_data/file/7504/2092103.pdf
Eck JE, Rosenbaum DP (1994) The new police order: effectiveness, equity, and efficiency in
community policing. In: Rosenbaum DP (ed) The challenge of community policing, Thousand
Oaks, CA7 Sage
Flint J, Robinson D (2008) Community cohesion in crisis?. Policy Press, Bristol
Flora JL et al (1997) Entrepreneurial social infrastructure and locally initiated economic
development in the non-metropolitan United States. Sociol Q 38(4):623–645
Friedman W (1994) The community role in community policing. In: Rosenbaum DP (ed) The
challenge of community policing: testing the promises. Sage, London
Gilchrist A (2004) Community cohesion and community development: bridges or barricades?
Community development foundation, London
Goldstein H (1979) Problem-oriented policing. Tample University Press, Philadelphia
Goldstein H (1987) Toward community-oriented policing: potential, basic requirements, and
threshold questions. Crime Delinquency 33(1):6–30
Goldstein H (1990) Problem-oriented policing. McGraw Hill, New York
Greene J (1999) Zero Tolerance. Crime and Delinquency 45:171–87
Greene JR (1987) Foot patrol and community policing: past practices and future prospects. Am J
Police 6(1)
Greene JR, Pelfrey WV Jr (1997) Shifting the balance of power between police and community:
responsibility for crime control. In: Dunham R, Alpert G (eds) Critical issues in policing:
contemporary readings. Prospect Heights, IL, Waveland
Hampton K, Wellman B (2003) Neighboring in netville: how the internet supports community and
social capital in a wired suburb. City Community 2(4):277–311
Hawdon J, Ryan J (2003) Police-resident interactions and satisfaction with police: an empirical test
of community policing assertions. Crim Justice Policy Rev 14
Hesketh B (1992) The police use of surveys: valuable tools or misused distractions? Police Stud
15:55–61
Hirschi T (1969) Causes of delinquency. University of California Press, California
Hope T (1995) Community crime prevention. In: Tonry M, Farrigngton DP (eds) Building a safer
society, crime and justice, 19. University of Chicago Press, Chicago
Hough M, Roberts J (2004) Confidence in justice: an international review. Home Office, London
Innes M (2004) Signal crimes and signal disorders: notes on deviance as communicative action.
Br J Sociol 55(3):335–355
Jackson J, Bradford B (2009) Crime, policing and social order: on the expressive nature of public
confidence in policing. Br J Sociol 60(3):493–521
Jackson J, Bradford B, Hohl K, Farrall S (2009) Does the fear of crime erode public confidence in
policing? Policing J Policy Pract 3(1):100–111
Jackson J, Bradford B, Stanko B, Hohl K (2013) Just authority? Trust in the police in England and
Wales, Routledge, London
Jenson J (1998) Mapping social cohesion: the state of Canadian research, Canadian Policy
Jiang S, Lambert EG (2009) Views of formal and informal crime control and their correlates in
China. Int Crim Justice Rev 19(1):5–24
Jiao A (1997) Factoring policing models. Policing Int J Police Strat Manag 20(3):454–472
Joppke C (2007) Beyond national models: civic integration policies for immigrants in Western
Europe. West Eur Politics 30(1):1–22
Kane RJ (2002) The social ecology of police misconduct. Criminology 40:867–96
bayerl@rsm.nl
18 I. Sučić and R. Karlović
Kerley KR, Benson ML (2000) Does community-oriented policing help build stronger
communities? Police Q 3(1):46–69
Kubrin CE, Weitzer R (2003) New directions in social disorganization theory. J Res Crime
Delinquency 40:374–402
Langworthy RH, Travis LP (1999) Policing in America: a balance of forces, 2nd ed. Prentice Hall,
Upper Saddle River, NJ
Lewis DA, Salem G (1981) Community crime prevention: an analysis of a developing strategy.
Crime Delinquency 27(3):405–421
Lewis S, Lewis DA (2012) Examining technology that supports community policing. In:
Conference on human factors in computing systems—proceedings. doi:10.1145/2207676.
2208595
Lowndes W, Thorp L (2011) Interpreting ‘community cohesion’: modes, means and mixes. Policy
Polit 39(4):513–532
Manaliyo J-C, Muzindutsi P-F (2013) Community participation in crime prevention: informal
social control practices in Site B, Khayelitsha Township. Mediterr J Soc Sci 4(3):121–127
Manning PK (1997) Violence and symbolic violence. In: McShanfeand M, Williams III FO
(eds) Law enforcement operations and management, Garland, New York
Mastrofski S, Reisig M, McClusky JD (2002) Police disrespect toward the public: an
encounter-based analysis. Criminology 40:519–51
McGhee D (2003) Moving to “our” common ground: a critical examination of community
cohesion discourse in twenty first century Britain. Sociol Rev 51(3):366–404
Meares TL (2002) Praying for community policing. Calif Law Rev 90(5):1593
Morenoff J, Sampson R, Raudenbush S (2001) Neighborhood inequality, collective efficacy, and
the spatial dynamics of urban violence. Criminology 39(3):517–558
Office Home (2009) Protecting the public: supporting the police to succeed. Home Office, London
Oliver WM (2000) The third generation of community policing: moving through innovation,
diffusion, and institutionalization. Police Q 3:367–388
Reiner R (2000) The politics of the police, 3rd edn. Oxford University Press, Oxford
Reisig MD, Parks RB (2000) Experience, quality of life, and neighbourhood context: a hierarchical
analysis of satisfaction with police. Justice Q 17(3):607–630
Rena L, Caob L, Lovrichc N, Gaffneyd M (2005) Linking confidence in the police with the
performance of the police: Community Policing can make a difference. J Crim Justice 33:55–
66
Robinson D (2004) Communities and cohesion: what’s housing got to do with it? The housing
studies association Spring conference, Sheffield Hallam University, 15th and 16th April 2004
Centre for Local Economic Strategies
Saegert S, Winkel G (2004) Crime, social capital, and community participation. Am J Community
Psychol 34(3/4):219–233
Sampson R, Raudenbush S (1999) Systematic social observation of public spaces: a new look at
disorder in urban neighbourhoods. Am J Sociol 105(3):603–651
Sampson RJ (1997) Collective regulation of adolescent misbehavior: validation results from eighty
Chicago neighbourhoods. J Adolesc Res 12:227–44
Sampson RJ, Groves WB (1989) Community structure and crime: testing social disorganization
theory. Am J Sociol 94:774–802
Sampson RJ, Cohen J (1988) Deterrent effects of the police on crime. Law Soc Rev 22:163–89
Sampson R, Graif C (2009) Neighbourhood social capital as differential social organization:
resident and leadership dimensions. Am Behav Sci 52(11):1579–1605
Schuck A, Rosenbaum D (2008) Building trust and a police-community website: an assessment of
the CLEARpath planning and community engagement process, Tech. rep., Macauthor
Foundation
Skogan WG (1989) Communities, crime, and neighborhood organization. Crime Delinq 35
(3):437–457
Skogan W (2006) Police and community in Chicago: a tale of three cities. Oxford University Press
bayerl@rsm.nl
2 Community Policing in Support of Social Cohesion 19
Skogan WE, Hartnett SM (1997) Community policing, Chicago style. Oxford University Press,
New York
Smith D (1986) The neighbourhood context of police behaviour. In: Reiss A, Tonry M (eds) Crime
and justice, vol 8. University of Chicago Press, Chicago, pp 313–341
Stein RE, Griffith C (2015) Community policing strategies need to take into account police and
residents’ different perceptions of neighbourhood crime. Available at: http://bit.ly/1FwR1vC
Taylor R (1997) Social order and disorder of street blocks and neighbourhoods: ecology,
microecology and the systemic model of social disorganization. J Res Crime Delinquency
34(1):113–155
Taylor R (2002) Crime prevention through environmental design (CPTED): yes, no, maybe,
unknowable, and all of the above. In: Bechtel R, Churchman A (eds) Handbook of
environmental psychology. Wiley, New York
Toch H, Grant JD (1991) Police as problem solvers. Plenum, New York
Trojanowicz RC, Moore MH (1988) The meaning of community in community policing. The
National Center for Community Policing, Michigan State University
Trojanowicz R, Bucqueroux B (1991) Community policing and the challenge of diversity.
National Center for Community, Policing School of Criminal Justice, Michigan State
University
Tyler TR (2004) Enhancing police legitimacy. Ann Am Acad 593:84–99
Tyler TR (2006) Psychological perspectives on legitimacy and legitimation. Annu Rev Psychol
57:375–400
Velez M (2001) The role of public social control in urban neighbourhoods. Criminology 39:837–
63
Verschelde M, Rogge N (2012) An environment-adjusted evaluation of citizen satisfaction with
local police effectiveness: evidence from a conditional data envelopment analysis approach.
Eur J Oper Res 223:214–225
Walker S (1984) Broken windows and fractured history: the use and misuse of history in recent
police patrol analysis. Justice Q 1(1):75–90
Walker S (1992) The police in America. McGraw-Hill, New York
Weitzer R (1999) Citizens’ perceptions of police misconduct: race and neighbourhood context.
Justice Q 16:819–46
Weitzer R (2000) Racialized policing: residents’ perceptions in three neighbourhoods. Law Soc
Rev 34:129–55
Williams BN (1998) Citizen perspectives on community policing. State University of New York
Press, New York
Wilson J, Kelling G (1982) Broken windows: the police and neighbourhood safety. Available at
http://www.theatlantic.com/politics/crime/windows.htm
bayerl@rsm.nl
Chapter 3
‘One for All and All for One’: Fostering
Accountability in Community Policing
Bankole Cole
3.1 Introduction
The accountability of the police is imperative if the use of their powers is to be seen as
legitimate. One of the key principles of democratic policing is that the police operate in
the best interest of the public; therefore, it is essential that the police secure public trust
and confidence in whatever they do. Nonetheless, policing functions in Europe have,
historically, been diffused with the police having been involved in a variety of duties
that included the enforcement of welfare provisions and tax laws in addition to their
basic crime control, prevention and order maintenance duties (Denys 2010; Emsley
1983, 1987). More importantly, European communities are increasingly becoming
multicultural and multi-faith, therefore, the policing needs and demands of the ‘public’
in modern Europe have become much more complex.
Since the 9/11 terrorist incidents in the United States, the police in Europe are
also increasingly dealing with security and public safety issues, as counter-terrorism
progressively becomes a key part of their everyday law enforcement duties.
Alongside this development has been the growth in Community Policing initiatives
to bring the police closer to the communities they police and to engage the public
much more in police work that is directly related to the crime, disorder, public
safety and security problems experienced in specific communities. In all their
duties, the police are regarded as servants of the public who are expected to police
in the public interest. Accordingly, the monitoring of police activities and their
accountability have become key features in policing discourse since modern
policing was introduced in Europe in the 19th century. Who should the police be
accountable to and what should be the role of the public in police accountability?
Although structures are in place to ensure the accountability of the police, the
centrality of community participation in Community Policing has raised important
B. Cole (&)
Sheffield Hallam University, Sheffield, UK
e-mail: B.Cole@shu.ac.uk
bayerl@rsm.nl
22 B. Cole
3.2 Accountability
The need for the police to account for their actions has been at the centre of policing
debates and politics since the inception of modern policing in Europe in the 19th
century. Whereas the forms of accountability varies depending on how modern
policing emerged and the roles that the police are expected to play, the concept that the
use of police powers is not without question is central to the development of European
policing (Critchely 1967; Emsley 1991; Mawby 1999). As more European states strive
towards democratic governments with the emergence of universal human rights after
the Second World War, the question concerning accountability of the police and their
legitimacy has become an important topic in the assessment of the growth and
development of democratic governance in Europe.
The topic of police accountability has grown even more significantly in the last
fifty years or so, generating substantial political interest in terms of legislation, the
creation of structures of police governance and codes of professional practice and
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 23
ethics. As Walsh and Conway (2011, p. 61) argued, the reason for this growth in
interest is because “policing itself has changed immensely over the past 50 years in
response to the demands imposed upon it by an increasingly diverse, technological,
urbanised, globalised, mobile, sophisticated, rights-conscious and knowledge-based
society.” In addition, police powers have increased significantly over the years with
an increase in the following: the use of new technologies, a significant shift towards
intelligence-led policing, the development of highly trained and heavily armed
combat units, the use of lethal and semi-lethal weaponry in forces that were tra-
ditionally unarmed, the blurring of the boundaries between civil policing and
security, the adoption of managerial strategies and methods from private sector
business organisations, a greater input from the private sector in the delivery of
policing services and the growth in direct cross-border cooperation between police
forces in Europe. All of these changes mean that professional and ethical standards
have become an important and integral part of policing. Therefore, mechanisms of
police accountability or oversight of policing have to be a priority if Europe is to
sustain an identity of democratic policing (Walsh and Conway 2011; see also Bigo
2006; Block 2008; Cope 2004; Council of Europe 2002, 2003; Loader 2000, 2002a,
b; Loader and Walker 2007; Neyroud and Beckley 2001; Reiner 2010; Rijken and
Vermuelen 2006; Sheptycki 2000; Stenning 2000, 2009).
Police accountability is usually discussed alongside police governance. Both
concepts are multi-faceted and multi-dimensional and they are often used inter-
changeably. The confusion arises from the fact that accountability and governance
are frequently discussed within the broader concept of police oversight systems. In
reality, these concepts are significantly different (see Ranson 2003; van Kersbergen
and van Waarden 2004; Walker 2002). According to Walsh and Conway (2011,
p. 62f), police governance can be defined as “encompassing the procedures and
methods aimed at ensuring the efficient discharge of the policing function. As such,
it includes key management issues such as: policy formation and implementation;
the determination of priorities and strategies; deployment choices; the allocation of
resources; the maintenance of standards. It follows that governance can be asso-
ciated with the promotion of values such as transparency, responsiveness and the
maintenance of professional, ethical and human rights standards in policing.” Police
governance, therefore, is usually the domain of politicians (both national and local),
and it relates mainly to making the police an efficient, effective force that operates
according to accepted ethical and professional standards. Police accountability
refers to the mechanisms in place, usually within police governance structures,
under which the police can be called to account and disciplined for not complying
with stated performance requirements, legal duties and professional standards (see
also Chap. 12).
To be accountable to someone means that one is answerable to that person for
one’s actions and that obligation is subject to disciplinary action if one’s actions are
disapproved of by the person to which one is accountable. That A is accountable to
B implies that B has the power to call A to account and to impose sanctions on A if
A’s actions are unacceptable to B. Accountability is much more than simply ren-
dering the account of one’s performance to another person such as a line manager or
bayerl@rsm.nl
24 B. Cole
a review body. The key word in police accountability is the disciplinary clause,
which may range from direct punishment or reprimand for specific acts or omission,
misconduct or abuse of power to recommendations for a change in policing
approach, methods or policies following an inquiry or review into police actions.
Central to police accountability therefore, is the principle that police powers are not
absolute and that policing can only be fair and just where police actions are subject
to democratic review. However, although accountability bestows some degree of
authority on the person answerable to it does not imply a relationship of control. As
Card explained, “the fact that A is accountable to B does not necessarily give B
control over A” (Card 1979, p. 9f).
All European countries have oversight mechanisms in place to ensure that the
police are managed effectively and held to account for their actions (see den Boer
and Fernhout 2008). Indeed, police governance and accountability arrangements in
Europe are quite complex—incorporating a mixture of national and local govern-
ment bodies and administrative structures with varying powers to oversee police
work and call the police to account. The ultimate authority over policing is of
course the state, who through parliament has the supreme power to make legislation
that defines the boundaries of police powers. This is significant as the police can
only be called to account on points of law. However, a parliament cannot instruct
the police on how to carry out their policing functions as that would be unconsti-
tutional (see Ayling et al. 2009; Jefferson and Grimshaw 1987; Stenning 2007).
Instead, powers have been delegated to state departments in charge of policing,
usually the Ministries of Internal or Home Affairs such as the British Home Office,
that have the sole authority for the management of the police and the provision of
general direction on policing operations, nationally.
These powers vary but they generally include powers to set up policing plans
and standards, discipline officers, determine police budgets and state police per-
formance indicators. The Ministries of Internal Affairs usually act as the sole
national police authority and may make decisions independently but at times may
be subject to parliamentary approval. In some countries, some of the Ministers’
decisions are made only after consultation with a national advisory group such as
the Polish Political Advisory Committee (Haberfeld 1997). The police are
accountable to the Ministers in charge of police affairs (Ministers of Internal
Affairs) in the sense that the final authority on disciplinary control of the police lies
with this governmental department. These powers are exercised via regulatory laws
and procedures such as those provided in Police Acts. In England and Wales, for
example, the Home Secretary has wide ranging powers to dismiss chief police
officers and to cut the budgets of an ‘inefficient’ local police force (Brogden 1982;
Jones and Newbum 1997; Reiner 2010). In addition, the police are accountable at
national levels to national bodies in charge of specific areas of policing such as
public complaints against the police and police ethics (see Brodeur 2007).
Nevertheless, the accountability of the police at the national level exists beyond
the domains of the Ministries for Internal Affairs. As public servants, the police are
also subject to oversight mechanisms that public servants face to ensure that public
funds allocated to policing are used in the best interest of the taxpayer and the
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 25
general public. In the United Kingdom, the police must additionally comply with
national ‘value for money’ standards to ensure that the costs of policing meet
specified criteria in terms of quality of service, efficiency and effectiveness in the
interest of communities (see for example, Department of the Environment 1997, on
the Principles of Best Value in the UK Public Service).
There are very few countries in Europe where the police operate only as a national
organisation. Most countries in Europe have multiple layers of police forces,
operating either nationally, locally or at both levels, covering various areas of law
enforcement both criminal and civil (Italy and France are typical examples). In
countries where local policing exists, either distinctly or as local arms of the
national police, structures to manage the police at local government level and to
ensure their accountability also exist.
In this regard, it is common in European countries with diversified policing
structures to have the police managed by local authority bodies or elected local
political figures charged with the responsibility of administering the police on
behalf of the local community. These include municipality Mayors, Police and
Crime Commissioners (in the UK) or a local government body in charge of local
policing such as a Police Board (e.g., in Belgium) (see Brodeur 2007). In theory,
these bodies represent the local voice in policing, which includes the power to call
the police to account for not complying with national policing priorities at the local
level or failing to meet agreed specific local policing needs. In practice, however,
research and experience have shown that the powers of these local bodies are
restricted mainly to administrative governance. Local Mayors, Police and Crime
Commissioners and local Police Boards cannot hold the police to account without
the approval or consent of central government (for the British experience, see
Brogden 1983; Spencer 1985).
In other words, the police in Europe are not directly accountable to local gov-
ernments. Whereas local governments in England and Wales for example, have
acquired powers to contribute to and agree local policing plans and targets with the
police (Jones and Newbum 1997), the local police and crime commissioners do not
have the direct power to discipline the local police chief constables where disputes
have occurred over how the police are carrying out their duties locally. Any deci-
sions to hold the police to account by direct disciplinary means must receive national
consent for it to be effective. Similarly, neighbourhoods or communities have no
direct powers to hold the police to account. Community grievances regarding the
police are usually dealt with by locally elected representatives (Mayors, etc.) who
would have to establish the normal channels for redress recognised in law by central
government or take the matter to the courts (see Fig. 3.1).
Furthermore, police accountability is discussed at two levels: (1) the account-
ability of individual police officers for their actions on and off duty and (2) the
bayerl@rsm.nl
26 B. Cole
Overall management,
Performance Indicators,
Ethical Guidelines, Policing Plans,
Police Complaints and Discipline,
Financial Oversight and Management
Performance Local
Police Administration Government,
Assessments,
Professional POLICE Governance Mayors, Police
Professional
Bodies Resources and Crime
Standards
Commissioner
Citizens,
Communities
accountability of the police institution itself with regard to their overall responsi-
bility for law enforcement and the maintenance of public order, peace and security.
A police officer can be called to account only on points of law; for example, on the
grounds that their actions are illegal, excessive, discriminatory and malicious or
done in bad faith. The avenues for calling individual police officers to account are
via established police complaints structures or the courts, both criminal and civil.
Chief police officers are also accountable for their performance or misdoings that
may lead to their removal from office. As mentioned above, the authority to dis-
cipline police forces as a whole or heads of police forces is beyond communities or
their local representatives but lies with central government departments in charge of
policing.
It is an obvious fact that the police in Europe are held accountable on several
grounds. Indeed, in Europe, police accountability supersedes police governance—
the structures to which the police are accountable are generally more than those
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 27
with the responsibility for their governance. In summary, the following structures of
accountability are common to all police systems in Europe:
1. Accountability to the law that is the very basis of police powers: In this regard,
individual police officers, a police department or a local police body may be held
accountable for violations of the law in terms of deliberate omission, incom-
petence, misuse, abuse, unreasonable or excessive use of legal powers (for
example, the use of unreasonable force) and misconduct or actions unbecoming
of a police officer (for example, the involvement in a criminal offence or
corruption).
2. Accountability to citizens: Where police action is in violation of a citizen’s legal
or human rights and measures are in place, for example, through police com-
plaints systems and Ombudsman structures, for the aggrieved parties to call the
police to account and request redress or punishment if the police are found to
have misused or abused their powers, acted in a manner that is discriminatory
against a particular social group or acted in excess of the powers conferred upon
them by law (for example, the use of lethal force during arrests).
3. Accountability to international laws and conventions on human rights with
regards to the administration of justice and law enforcement (for example, the
UN codes of conduct for law enforcement officers, and the Council of Europe’s
Code of Police Ethics—see Council of Europe 2002; Crawshaw and Holmstrom
2008).
4. Accountability to professional bodies that monitor compliance with professional
standards (for example, Her Majesty’s Inspectorate of the Constabulary in the U.
K.).
5. Accountability to national treasuries for how police budgets have been spent
and resources used. This includes measures to ensure that the police use public
funds and other resources allocated for policing equitably and in line with the
principles of value for money in the interest of the taxpayer.
6. Accountability to other public bodies with general democratic oversight powers.
This includes parliamentary, public or judicial enquiries, committees, civilian
ombudsmen, and public or judicial enquiries with statutory powers to impose
sanctions on public bodies.
A key issue with the current approach to police accountability is that questions
of accountability are often raised only where the police are perceived to have failed
to carry out their duties effectively according to law or where there are allegations
of misconduct or abuse or excessive or unacceptable use of their powers.
Invariably, the general perception is that police accountability is relevant only
where the police are believed to have done something wrong and the state or
whosoever has the authority to do so, calls the police to account for their actions.
This approach to accountability complies with what Terpstra (2011a) described as a
Hierarchist culture of police governance and accountability, which is a system
whereby:
bayerl@rsm.nl
28 B. Cole
Problems are attributed to poor compliance with rules and procedures; remedy is more,
strict procedures and rules, better coordination, more control and more ‘grip’ by the
authorities at the top. (Terpstra 2011a, p. 90)
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 29
bayerl@rsm.nl
30 B. Cole
encouraging their police to work more closely with communities epitomised in the
emergence of various modern policing initiatives such as ‘citizen-focused policing’,
it is interesting that the need to make the police directly accountable to citizens has
received very little or no political support.
Many authors have argued that different types of accountability may accompany
different types of relationships. Indeed, accountability can take several forms
—“internal and external, local and centralized, vertical and horizontal, upwards and
downwards” (Terpstra 2011a, b, p. 89; see also Hupe and Hill 2007; Somerville
2009; Walker 2002).
Terpstra (2011a, p. 90) further argued that “various forms of governance and
accountability may be understood as reflecting different underlying cultures:
fatalist, hierarchical, individualist and egalitarian.” As discussed above, the
European approach to police accountability appears to be traditionally enshrined in
the hierarchist culture. Terpstra described two of the remaining three cultures of
accountability: ‘egalitarian’ and ‘individualist’—as less rigid forms of account-
ability and governance. In the egalitarian culture of accountability, there is room
for ‘participation’ in decision-making and in co-production of ‘equal’ members, and
more trust is put “in the participation of lower-level members” (Terpstra 2011a,
p. 90). An individualist culture would emphasise market-like incentives to guide
individual action and define success. The individualist culture of accountability
might further be interpreted as implying that the ‘official and bureaucratic’ approach
in the hierarchist culture and the ‘people-centred’ approach in the egalitarian model
are non-existent as all those involved in Community Policing are equally
accountable to mutually agreed performance goals.
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 31
never been a key issue whether communities themselves could be held accountable
for the success or failure of Community Policing initiatives in their neighbour-
hoods. All those that have the power to hold others to account must themselves be
prepared to be held accountable for their own actions.
The egalitarian nature of Community Policing is its key strength that makes it a
part of police work most akin to democratic policing. It would be appropriate,
therefore, if the approach to accountability in Community Policing embraces this
egalitarian nature by making accountability in Community Policing mutual—
whereby each member of the partnership is empowered to hold the others to
account for actions taken in respect of meeting stated aims and objectives (see
Fig. 3.2). To use a medical analogy, “it makes physician and patient accountable to
each other for the patient’s health” (Kelling et al. 1988, p. 4).
Sanctions will be imposed collectively for mutually agreed misdoings or inef-
ficiencies. Rewards might also be given in order to encourage better performance
(see Kelling et al. 1988). Thus, accountability will project a less judgemental pose
and will be seen as a positive approach towards effectiveness and efficiency. This
approach may need to be managed or ‘overseen’ by the local authority, however,
the Community Policing partners will not be accountable to the local government
Other Agencies
Community
Representatives Social Services
(Local Authority)
Community Policing
Priorities
Responsibility-focused
Accountability by negotiation,
deliberation and consensus
bayerl@rsm.nl
32 B. Cole
but instead to the policing goals that have been set for their Community Policing
project. In addition to closely resembling the egalitarian culture in Terpstra’s
(2011a) typology, this approach to accountability also embraces the individualist
culture whereby accountability is not dictated top-down but seen as the individual
responsibility of all those guided by mutually agreed goals. This approach will
strengthen citizen empowerment, encourage transparency and increase public
confidence in Community Policing. The fact that communities themselves might be
held accountable where Community Policing objectives are not being met as a
result of inefficiency on their part, would be a radical departure from current
practice. Community’s representatives could then be called to account and made to
put right what is required of them in order for a Community Policing project to run
as planned. In addition, this approach allows ‘face-to-face’ contact with the person
to whom one is accountable, not a distant Mayor or PCC and accountability is
through dialogue, negotiation and consultation.
3.6 Conclusion
In this chapter, it has been argued that democratic accountability and the legitimacy
of the police is strengthened where both the police and the communities are
accountable to each other and accountability is not enforced by punishments alone
but also by rewards. The chapter advocates what is essentially a participatory
governance and accountability approach where local Community Policing initia-
tives are managed by the representatives of the agencies constituting the
Community Policing partnership, including the police, who are accountable to each
other in a ‘roundtable’ fashion whereby accountability is mutual and complemen-
tary as it should exist among equals. In this framework, the burden of the success or
failure of Community Policing will be borne not only by the police alone but the
communities also.
References
Ayling J, Grabosky P, Shearing C (2009) Lengthening the arm of the law: enhancing police
resources in the twenty-first century. Cambridge University Press, Cambridge
Bigo D (2006) Internal and external aspects of security. Eur Secur 15:385–404
Block I (2008) Combating organised crime in Europe: practicalities in police cooperation. Policing
74–81
Brodeur J-P (2007) Policing in continental Europe. In: Greene JR (ed) The encyclopaedia of police
science, 3rd edn. Routledge, London
Brogden M, Nijhar P (2005) Community Policing. National and international models and
approaches, Willan, Cullompton
Brogden M (1982) The police: autonomy and consent. Academic Press
Brogden M (1983) The Myth of policing by consent. Police Rev 22 April
Card R (1979) Police accountability and control over the police. J Bramshill 1(1):9–14
bayerl@rsm.nl
3 ‘One for All and All for One’: Fostering Accountability … 33
Cope N (2004) Intelligence led policing or policing led intelligence. Br J Criminol 44:188
Council of Europe (2003) Cross-border cooperation in the combating of organised crime. Council
of Europe, Strasbourg
Council of Europe (2002) The European code of police ethics: Recommendation (2001) and
explanatory memorandum. Council of Europe, Strasbourg
Crawshaw R, Holmstrom L (eds) (2008) Essential texts on human rights for the police: a
compilation of international instruments. Martinus Nijhoff, Leiden
Critchley TA (1967) A history of police in England and Wales 900–1966. Constable, London
den Boer M, Fernhout R (2008) Policing the police, police oversight mechanisms in Europe:
towards a comparative overview of ombudsmen and their competencies. Paper presented at the
workshop: improving the role of the Police in Asia and Europe Delhi, India 3–4 December
2008
Denys C (2010) The development of police forces in Urban Europe in the eighteenth century.
J Urban Hist 36(3):332–344
Department of the Environment (1997) The principles of best value. DoE, HMIC (UK), London.
Available at http://www.justiceinspectorates.gov.uk/hmic/
Emsley C (1983) Policing and its context 1750-/850. Macmillan, London
Emsley C (1987) Crime and society in England 1750–1900. Longman, London
Emsley C (1991) The english police: a political and social history. Longman, London
Haberfeld MR (1997) Poland: the police are not the public and the public are not the police,
Policing. Int J Police Strat Manag 20:4
Hupe P, Hill M (2007) Street-level bureaucracy and public accountability. Public Adm 85(2):279–
299
Jefferson T, Grimshaw R (1987) Controlling the constable. Unwin and Hyman, London
Jones T, Newbum T (1997) Policing after the Act. Policy Studies Institute, London
Kelling GL, Wasserman R, Williams H (1988) Police accountability and community policing.
National Institute of Justice/John F, Kennedy School of Government, Washington/Cambridge
Loader I (2000) Plural policing and democratic governance. Soc Legal Stud 9:323–345
Loader I (2002a) Governing European policing: some problems and prospects. Policing Soc
12:291–305
Loader I (2002b) Policing, securitisation and democratisation in Europe. Criminol Crim Justice
2:125–153
Loader I, Walker N (2007) Civilising security. Cambridge University Press, Cambridge
Mawby R (ed) (1999) Policing across the world. UCL Press, London
Muller ER (2002) Policing and accountability in the Netherlands: a happy marriage or a stressful
relationship? Policing Soc 12(4):249–258
Neyroud P, Beckley A (2001) Policing, ethics and human rights. Willan, Collumpton
Ranson S (2003) Public accountability in the age of neo-liberal governance. J Educ Policy 18
(5):459–480
Reiner R (2010) The politics of the police, 4th edn. Oxford University Press, Oxford
Rijken C, Vermuelen G (2006) Joint investigation teams in the European union: from theory to
practice. TMC Asser, The Hague
Service T (2012) From Belfast to Bishkek: an international perspective on neighbourhood and
community policing. Int J Police Sci Manag 14(4):362–372
Sheptycki J (ed) (2000) Issues in transnational policing. Routledge, London
Somerville P (2009) Understanding community policing, Policing. Int J Police Strat Manag 32
(2):261–277
Spencer S (1985) Calling to account: the case for police accountability in England and Wales.
National Council for Civil Liberties, London
Stenning P (2000) Powers and accountability of private police. Eur J Crim Policy Res 8:325–352
Stenning P (2007) The idea of the political ‘independence’ of the police: international
interpretations and experiences. In: Beareand M, Murray T (eds) Police and government
relations: Who’s calling the shots?. University of Toronto Press, Toronto
bayerl@rsm.nl
34 B. Cole
Stenning P (2009) Governance and accountability in a plural policing environment: the story so
far. Policing 22–33
Terpstra J (2004) Governing the police in the local governance of crime and disorder. In: van der
Vijver K, Terpstra J (eds) Urban safety: problems, governance and strategies. IPIT, Enschede
Terpstra J (2005) Models of local security networks. On the diversity of local security networks in
the Netherlands. Crime Prev Community Saf Int J 7(4):37–46
Terpstra J (2011a) Governance and accountability in community policing. Crime Law Soc Change
55:87–104
Terpstra J (2011b), Governance and accountability in community policing. Available at https://hal.
archives-ouvertes.fr/hal-00668577
Van Kersbergen K, van Waarden F (2004) ‘Governance’ as a bridge between disciplines: cross
disciplinary inspiration regarding shifts in governance and problems of governability,
accountability and legitimacy. Eur J Polit Res 43(2):143–171
Walker P (2002) Understanding accountability: theoretical models and their implications for social
service organizations. Soc Policy Adm 36(1):62–75
Walsh DPJ, Conway V (2011) Police governance and accountability: overview of current issues.
Crime Law Soc Change 55:61–86
bayerl@rsm.nl
Chapter 4
Community Policing: The Relevance
of Social Contexts
4.1 Introduction
Even though crime rates have been declining in Europe since the mid-1990s, the
perception of many is that crime rates have in fact been increasing (Millie and
Herrington 2005; see also Kappeler and Gaines 2015; Lee and McGovern 2014 for
discussions on fear of crime). Furthermore, elevated levels of fear of crime correlate
with a decreased confidence in the functioning of police forces and organisations
(Millie and Herrington 2005). The feeling of insecurity combined with the per-
ception that crime is rising in communities is also called the reassurance gap
(Millie and Herrington 2005). Traditionally, the perceived increase of crime and
corresponding decreased levels of confidence in police functioning has underpinned
a need for reassurance of the public as a means of gaining legitimacy for policing
decisions (Millie and Herrington 2005; see also Hamilton-Smith et al. 2014;
Mazerolle et al. 2013). This change in policing climate has led to far-reaching
changes in policing style and raised important questions regarding what the
expansion of the traditional policing role to Community Policing (CP) means to
various communities and police forces. Research shows that a reduction of inse-
curity or risk experienced by people has a positive impact on their perception of
crime, thus reducing this reassurance gap (Millie and Herrington 2005). This means
that the police should tackle volume crime effectively but also target risks identified
by the public in order to address the reassurance gap and (re)define
bayerl@rsm.nl
36 M. van der Giessen et al.
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 37
bayerl@rsm.nl
38 M. van der Giessen et al.
However, even after the reform, the American police was still very much iso-
lated from the public they served, relying on personal rather than constitutional
authority, and lacking the relationship with the public necessary for the creation of
safety through CP (Greene 2000; Kappeler and Gaines 2015). It was not until the
1970s that the basic issues and ideas that would ultimately be considered
Anglo-American CP became prevalent in the American police discourse and
practice (Goldstein 1979; Trojanowicz 1973; Trojanowicz and Dixon 1974;
Trojanowicz et al. 1975). Rising crime rates, loss of confidence in traditional
policing methods, increased social polarisation and city riots seemed beyond the
ability of law enforcement control, sparking discussions regarding the effectiveness
of traditional policing and the proper role of the police in a democratic society
(Zhao et al. 1995).
Community Policing came to be seen as a suitable reaction to the perceived
failures of traditional policing as police practitioners, academics and policy-makers
in the Western world agreed that the traditional style of policing, which focused
mainly on law enforcement, was no longer sufficient to tackle emerging crime and
safety concerns of contemporary societies (OSCE 2008). The police simply did not
have the resources or capabilities to deal with the increasingly complex underlying
causes of crime without the assistance of other state and non-state agencies—and of
key importance, the public (see also Chaps. 2, 3, 5 and 12). This is particularly the
case in our increasingly multi-cultural society where certain (less privileged, low
income, minority) segments are especially vulnerable to crime and disorder and
enforcement demands prevention, partnership working and problem solving (OSCE
2008). The subsequent widespread adoption and further development of
Community Policing during the late 1980s in Europe, America and England has
been described by many as a policing paradigm shift away from a reactive,
task-driven approach toward a community focused one where policing involves
non-enforcement tasks and assistance for and with the community (Hail 2015a). It
is clear however that, even when adopting a historical view of ‘European CP’, it has
never been uniform in its underlying social philosophy, implementation or
effectiveness.
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 39
bayerl@rsm.nl
40 M. van der Giessen et al.
(Bayerl et al. 2016; Van der Giessen et al. 2016). However, although it is clear that
a common understanding of the general CP philosophy exists, there are consider-
able differences across countries and subgroups regarding the prioritization and
implementation of specific CP elements (cp. case examples in Part 2).
Although trust and mutual understanding are almost unanimously considered
important, there are still local differences in terms of how best to actually promote
trust, confidence and understanding across Europe (see also Hail 2015a; Kääriäinen
and Niemi 2014). In a recent study on CP practices in Europe, Belgian police
officers for example operationalized the promotion of trust primarily through pro-
moting accountability and transparency of police functioning, while local minority
community members in Belgium prioritized improving social cohesion and
embeddedness (Van der Giessen et al. 2016; see also Chap. 8).
In the Anglo-American model, Community Policing is often implemented in a
way to contribute to a visible presence in the streets as a means of providing
reassurance and a source of security to the public. Police should be both locally
accountable and transparent where they must have discretion and should use this
positively to maximize community confidence in the police (Brogden and Nijhar
2005). Similarly, although there is a consensus on the notion that no single agency
is equipped to deal with the complex and convoluted reality of local community
safety and crime problems, some emphasize law enforcement agency and service
provider cooperation, while others emphasize police–community partnership (Hail
2015a; Van der Giessen et al. 2016). Combined these two approaches are com-
monly referred to as the mixed economy of policing, where the inclusion of
non-police agencies in the creation of safety increases the opportunities to resolve
local issues (Skogan 1994).
Ideally, Community Policing involves a combination of the two approaches. The
basic premise of German CP, for example, is that a network of engaged partners is
required, where the community itself will “take responsibility and do its part to
prevent crime” (Marin 2011 p. 21; see also Hail 2015a). This generally involves
consulting, engaging and mobilizing the community in order to identify and tackle
local community problems and their underlying causes, setting priorities for actions,
multi-agency policing, reassurance policing and other pro-active problem solving
strategies (OSCE 2008).
When it comes to communication and interaction between the police and local
communities, similar differences in prioritization and implementation occur. When
Bulgarian police officers were asked about their implementation of CP, they for
example predominantly mentioned actions related to information gathering and
sharing between not only police and community partners but also with other local
partners. This can be contrasted with the Community Policing actions desired by
local community members in Finland, who preferred CP initiatives related to
improving the availability, accessibility and approachability of local community
officers (Van der Giessen et al. 2016). These differences can be attributed in part to
specific local needs and concerns (see also case studies in Chaps. 5–11).
The traditional response to crime and disorder is maintenance policing. However,
this requires agreement about policing priorities in specific neighbourhoods and
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 41
communities where this may not exist. There is a substantial body of research that
suggests there is often disagreement even within communities on what priorities for
Community Policing should be (Kappeler and Gaines 2015). Adopting a
one-size-fits-all approach to dealing with these community problems would likely not
deal with the different issues and priorities that exist. Depending on these local
requirements, some practitioners emphasize the importance of proactive policing for
Community Policing, while others emphasize the importance of cooperation to address
local needs and issues reactively as they emerge (Van der Giessen et al. 2016). Police
organisations in England and Whales for example have adopted the label of ‘neigh-
bourhood policing’ to refer to proactive local services (Hail 2015a), and CP practi-
tioners in some other European countries also prioritize Community Policing focused
on prevention, protection and intervention (Van der Giessen et al. 2016; cp. Chaps. 5
and 10). On the other hand, others still maintain a reactive modus operandi, provided
that local needs and issues remain central. ‘Soft’ policing activities related to providing
assistance and service are sometimes considered as more influential to improve
police-community relations than reactive or prevention oriented policing efforts (Van
der Giessen et al. 2016). Such differences require different communication strategies.
In short, although countries and groups seem to agree on the main core concepts,
considerable differences exist regarding what constitutes Community Policing in
practice. Police forces and communities thus have differing perspectives within and
across countries on what ‘community partnership’ entails (Hail 2015a). As such, the
local needs, requirements and therefore implementation of Community Policing
could differ drastically depending on the country, community and background of
local CP officers. Hence, Community Policing efforts need to content with an
inherent multi-contextuality in tasks, processes and objectives.
A long tradition in management research shows that the social context has a major
impact on the meaning, interpretation and implementation of specific governance
practices (Hofstede 1993). Policing, and CP practices specifically, are no exception.
For example, Terpstra and Fyfe (2015) have recently shown for the Scottish and
Dutch police that policies and strategies change their meaning quite a bit on their
way to implementation. Jacobs and colleagues (2008) found similar effects within
the German policing context. Neighbourhoods serve as the primary focus of police
organisations where community consensus and structures guide the police response
to the community’s crime and security problems. Community Policing is thereby
embedded in its respective communities and the success of Community Policing is
contingent on the requirements and expectations of these communities. Here we
refer to such contingencies as the multi-contextuality of CP, and it is the primary
reason that the export of Anglo-American CP principles to other contexts is so
bayerl@rsm.nl
42 M. van der Giessen et al.
challenging (see for example Brogden and Nijhar 2005; Dvoršek 1996; Hail 2015a;
Kääriäinen 2007; Van der Giessen et al. 2016).
Although differences between countries, groups and individuals are innumer-
able, one specific factor deserves special attention: Citizen support significantly
enhances police efforts and citizen support is contingent on the trust between police
and their communities (Jackson and Gau 2016; Kääriäinen and Siren 2012; Skogan
2006). The joint pursuit of safety by the police, local communities and other
partners is dependent on the mutual trust between the stakeholders and the per-
ceived legitimacy of the police as a partner in CP. As Myhill put it, the effective and
continuous engagement of local neighbourhoods in CP requires their “willingness,
capacity and opportunity to participate” (Myhill 2012, p. 1, cited in Hail 2015b).
Trust is often used synonymously with legitimacy, although there is an impor-
tant distinction. According to Jackson and Gau (2016, p. 3), trust concerns “peo-
ple’s predictions that individual officers will (and do) do things that they are tasked
to do”, whereas legitimacy “is the property or quality of possessing rightful power
and the subsequent acceptance of, and willing deference to, authority.” Trust thus
refers to the expectation that a person will perform whatever his or her task is, while
legitimacy refers to the extent to which that person is perceived to have the right to
perform that task. For example, a local police force can be both perceived to have
the right to participate in local community events (perceived legitimacy of police
action in the community) and to be effective in offering preventive information
during these events (trust in positive behaviours and outcomes). Vice versa, a local
community can be perceived to have the right to set its own safety priorities and be
trusted to deal with these safety issues when empowered to do so. It is when trust
and legitimacy overlap and exist mutually between the relevant stakeholders that
these CP efforts are most likely to result in partnership and cooperation for CP (see
Jackson and Gau 2016 and Kääriäinen and Niemi 2014 for a more detailed dis-
cussion of the importance of these concepts combining for attitudes toward legal
authorities).
There is a social contract between citizens and government, which ‘legitimates’
the police to have moral and ethical authority (cp. Chap. 3). Citizens give up certain
rights and entrust the police with the expectation that it will carry out expected
activities in a positive manner (Kappeler and Gaines 2015). It is therefore important
to what extent the community accepts police ‘interference’ in the sphere of com-
munity relations and safety. As Virta puts it, “the political culture (and within that,
the specific police culture) provides for an acceptance of state police officers
conducting activities outside more traditional public order and crime-related
functions” (Virta 2002, p. 191). This is central, as Community Policing takes
advantage of police discretionary powers to enable them to conduct a variety of
tasks that were previously not regarded as falling within the orbit of traditional
police work.
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 43
There are two presumed underlying trains of thought: instrumental justice and
procedural justice (Kääriäinen and Niemi 2014). Many studies suggest that positive
attitudes toward the police are predominantly due to successful police work and
reductions in crime. This is known as the instrumental approach. Others suggest
that legitimacy and trust are predominantly due to perceived fairness and respectful
treatment by the police. This is the procedural approach (Bradford 2012; Sunshine
and Tyler 2003; Tyler 1990, 2001, 2005). An important complication to note here is
that the public constructs their view of the police not only through their personal
experiences, but also through the experiences of others. For example, members of
ethnic minority groups may not have direct, personal negative experiences with the
police, but because it is common to share experiences in close-knit communities,
first-hand negative experiences can be shared to create a larger culture of distrust
(Kääriäinen and Niemi 2014; Weitzer and Tuch 2005). The police being viewed as
a legitimate organisation not only by an individual, but also by the individual’s
community is therefore paramount in order for support for cooperation with
policing efforts to develop (Bradford et al. 2013; Tyler 2003; Lai and Zhao 2010;
Worral 1999).
With these aspects of trust and legitimacy in place, it is possible to consider the
differences between countries, communities, stakeholders and individuals regarding
(mutual) trust and perceived legitimacy for Community Policing activities.
Community Policing embodies a rapid change in policing where the role of police
has been extended beyond law enforcement, placing additional demands on the
community, which may or may not perceive this extension as legitimate (Bittner
1970; Manning 1997; Wilson 1968). The same applies to perceptions of community
responsibility, where Community Policing can embody responsibilities of com-
munities in safety issues where this was not previously the case. Therefore, when
looking at the implementation of Community Policing across Europe, it is impor-
tant to take into account the political history. Examples where the implementation
of CP has proven difficult due to lacking police legitimacy (among other factors)
include Spain and Italy, where centralized Napoleonic traditions have made it
challenging for both the police and the public to accept CP roles (Hail 2015b).
Differences in perceived legitimacy and trust also seem to exist due to
socio-economic factors, as evidenced by differences between countries and specific
communities. Even within communities, there are numerous groups and subgroups
of people, which may have differing perceptions of the police and their effective-
ness in Community Policing (Brown and Benedict 2002). Nordic countries par-
ticularly evidence relatively high levels of trust in the police; according to
Kääriäinen at least in part due to a generally perceived equality and fairness of
society as well as a high standard of public administration, low level of corruption
and even income distributions among the population (Kääriäinen 2007; Kääriäinen
and Niemi 2014; cp. Chap. 5).
bayerl@rsm.nl
44 M. van der Giessen et al.
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 45
We argue that integrating the above insights regarding European CP practices and
the importance of local context in terms of perceived legitimacy of CP roles and
mutual trust allows for a more comprehensive model of police–public CP efforts in
Europe. In Fig. 4.1, described and shown below, we depict the interplay between
local context, perceptions of legitimacy and trust and CP partnership for local safety
discussed throughout this chapter. As previously stated, Community Policing is not
a uniform concept and the local implementation is highly contingent on the local
context and mutual trust and perceived legitimacy between the police and local
community, both in the traditional policing sense and the expanded CP conceptu-
alization. As such, although local CP efforts are based on Community Policing
principles and generally include elements of trust, communication, cooperation and
addressing local needs and issues, the exact conceptualization and implementation
varies from country to country and community to community.
This variation in Community Policing conceptualizations and implementation
throughout Europe can be attributed to several factors. First and foremost, the
community’s readiness to cooperate, collaborate and partner with the police for CP
is dependent on the community’s trust and perceived legitimacy of the police. As
depicted in Fig. 4.1, a community member is willing to cooperate if the police is
trusted and perceived as legitimate in its traditional role performance, is willing to
collaborate with the police if the police is trusted and considered legitimate in its
expanded role in the community and is willing to accept the police as a partner in
bayerl@rsm.nl
46 M. van der Giessen et al.
CP efforts when the police is trusted and considered legitimate both in its traditional
role as law enforcer and in the expanded community-oriented role of CP. Similarly,
Community Policing requires an acceptance of the local community role in local
safety issues by the police. Furthermore, Fig. 4.1 also depicts how perceived
legitimacy and trust are highly dependent on the environmental context and per-
ceived justice, which include the political, social and economic context as well as
the individual’s and/or community’s experiences with police treatments and
policing outcomes.
Lastly, it should be emphasized that the local CP context not only has a strong
influence on CP practices, but successful CP practices also influence the local
context. This self-enforcing loop between the local CP context and joint CP efforts
by the police, their partners and the communities (also shown in Fig. 4.1) is the goal
of Community Policing. This involves partnership, shared agenda setting, problem
solving and an enhanced relationship between the police in the public in order to
jointly improve the local situation. As such, Community Policing has the potential
to deal with contemporary problems of crime, safety and reassurance as long as the
requirements of these diverse communities and contexts are met.
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 47
2. Satisfaction with the performance and outcomes of core tasks of policing and
Community Policing in the broader sense strongly drive the readiness of
community members to cooperate and collaborate with the police to tackle local
concerns related to safety and security. Signs of dissatisfaction of community
members with these core tasks therefore have to be taken seriously. This
includes adequately dealing with, for example, perceptions of racial profiling,
frequency of victimization, injustice, lack of concern on the part of the police
and ineffectiveness of policing efforts.
3. Local communities are not homogenous entities and social complexities within
communities need to be acknowledged. Pleasing the majority or
over-emphasizing needs and expectations of one sub-group over another can
trigger dissatisfaction within other segments of the community. This means all
needs and concerns of local communities, not just those of a majority, must be
taken into account when agenda setting, empowering local actors or visibly
enforcing the law.
4. Community Policing involves an expansion of the social contract between cit-
izens and government placing additional requirements on trust and legitimacy
throughout the whole community. Joint CP efforts can only work when the
community accepts police involvement within their community and the police
accepts the community as a partner for local safety and security. It is important
that all stakeholders acknowledge this, particularly when the socio-political
context is such that police and community roles have historically been very
distinct. Community Policing should therefore involve not only an empower-
ment of local actors, but it might also include an effort to embed police actors
within local communities if the context demands it.
5. Though it is not possible to generalize CP practices developed in a certain
context to other settings without considering the local context, it is desirable to
learn from various local contexts to subsequently apply these lessons to own
communities and CP practices. We have adopted a European perspective to
Community Policing, as we should learn from each other’s approaches to CP
with specific communities in specific policing contexts and subsequently adapt
and adopt those lessons learned. There is a great deal of diversity within Europe,
which is reflected in the diversity within local communities.
Though to date Community Policing has had mixed results and has led to
undesirable side effects, it is our hope that it is possible to overcome these com-
plexities if both practitioners and academics consider the complexities of CP for the
implementation and evaluation of Community Policing efforts in Europe. We hope
we can encourage tailor-made CP approaches. Although Community Policing
requires courage and genuine interest from police and communities, we believe that
this courage can lead to resilient communities and lasting partnerships to deal with
local needs in the areas of safety and security.
bayerl@rsm.nl
48 M. van der Giessen et al.
References
Ashforth BE, Gibbs BW (1990) The double-edge of organizational legitimation. Organ Sci 1
(2):177–194
Barnes I, Eagle T (2007) The role of community engagement in neighbourhood policing. Policing
1(2):161–172
Bayerl PS, Van der Giessen M, Jacobs G (2016) Unity—1st Stakeholder analysis: shared themes
and concepts. H2020-Project unity deliverable 3.2. Rotterdam, Netherlands: Centre of
Excellence in Public Safety Management/Rotterdam School of Management, Erasmus
University Rotterdam
Beck A (2002) International and regional initiatives: providing appropriate international
assistance. Crime and Policing in Transitional Societies Conference paper. Johannesburg,
pp 235–241
Bittner E (1970) The functions of the police in modern society. National Institute of Mental
Health, Center for Studies of Crime and Delinquency, Rockville, MD
Bowling B, Philips C (2003) Policing ethnic minority communities. In: Newburn T (ed) Handbook
of policing. Wilan Publishing, Devon, UK
Bradford B (2012) Policing and social identity: procedural justice, inclusion and cooperation
between police and public. Policing Soc Int J Res Police 24(1):22–43
Bradford B, Jackson J, Hough M (2013) Police legitimacy in action: lessons for theory and
practice. In: Reisig M, Kane R (eds) Oxford handbook of police and policing. Oxford
University Press, Oxford, UK
Brogden ME (1982) The police: autonomy and consent. Academic Press, London
Brogden M, Nijhar P (2005) CP. National and international models and approaches. Willan,
Cullompton
Brown B, Benedict WR (2002) Perceptions of the Police. Policing Int J Police Strat Manag
23:439–465
Carter D (1985) Hispanic perception of police performance: an empirical assessment. J Crim
Justice 13:487–500
Casey J (2010) Implementing CP in different countries and cultures. Pak J Criminol 2(4):55–70
Chan J (2011) Racial profiling and police subculture. Can J Criminol Crim Justice 52(1):87–93
Crawford A, Lister S, Wall D (2003) Great expectations: contracted CP in New Earswick. Joseph
Rowntree Foundation
Dvoršek A (1996) Applicability of western police experiences—desires and possibilities from the
viewpoint of Slovenian police. In: Policing in Central and Eastern Europe: Comparing
Firsthand Knowledge with Experience from the West. College of Police and Security Studies,
Slovenia
Fruhling H (2002) Changing the police in transitional countries: the case of Latin America. In:
Conference in search of security: Montreal
Goldstein H (1979) Improving policing: a problem-oriented approach. Crime Delinquency
25:236–258
Greene J (2000) CP in America: changing the nature, structure, and function of the police. In:
Justice Criminal (ed) volume 3, policies, processes, and decisions of the criminal justice
system. National Institute of Justice, Washington DC, pp 299–370
Hail Y (2015a) CP across Europe. Document provided for the Unity project, October 26, 2015
Hail Y (2015b) Procedural justice, legitimacy and CP. Document provided for the Unity project,
October 26, 2015
Hamilton-Smith N, Mackenzie S, Henry A, Davidones C (2014) CP and reassurance: three studies,
one narrative. Criminol Crim Justice 14(2):160–178
Hofstede G (1993) Cultural constraints in management theories. Acad Manag Perspect 7(1):81–94
Innes M (2004) Signal crimes and signal disorders: notes on deviance as communicative action.
Br J Sociol 55(3):335–355
bayerl@rsm.nl
4 Community Policing: The Relevance of Social Contexts 49
Jackson J, Gau JM (2016) Carving up concepts? Differentiating between trust and legitimacy in
public attitudes towards legal authority. Interdisciplinary Perspectives on Trust, Springer
International Publishing, Switzerland, pp 44–69
Jacobs G, Christe-Zeyse J, Keegan A, Polos L (2008) Reactions to organizational identity threats
in times of change: illustrations from the German police. Corp Reputation Rev 11(3):245–261
Kääriäinen J (2007) Trust in the police in 16 European countries—a multilevel analysis. Eur J
Criminol 4:409–435
Kääriäinen J, Niemi J (2014) Distrust of the police in a Nordic Welfare State: victimization,
discrimination, and trust in the police by Russian and somali minorities in Helsinki. J Ethn
Crim Justice 12(1):4–24
Kääriäinen J, Sirén R (2012) Do the police trust in citizens? European comparisons. Eur J Criminol
9(3):276–289
Kappeler VE, Gaines LK (2015) CP: a contempary perspective, 7th edn. New York, London,
Routledge
Kappeler VE, Sluder RD, Alpert GP (1998) Forces of deviance: understanding the dark side of the
force, 2nd edn. Waveland Press, Prospect Heights, IL
Lai Y, Zhao S (2010) The impact of race/neighbourhood context, and police/citizen interaction on
residents’ attitudes toward the police. J Crim Justice 38:685–692
Lee M, McGovern A (2014) Policing and media: public relations, simulations and communica-
tions. Routledge, Abingdon, Oxon: NY
Manning PK (1997) Police work, 2nd edn. Waveland Press, Prospect Heights, IL
Marin I (2011) CP in Berlin. International conflict research institute background paper. Accessed
at http://www.incore.ulst.ac.uk/pdfs/wp_BerlinBackgroundPaperCAPT.pdf
Mazerolle L, Bennett S, Davis J, Sargent E, Manning M (2013) Procedural justice and police
legitimacy: a systematic review of the research evidence. J Exp Criminol 9(3):245–274
Millie A, Herrington V (2005) Bridging the Gap: understanding reassurance policing. Howard J
Crim Justice 44(1):41–56
Myhill A (2012) Community engagement in policing: lessons from the literature. National
Policing Improvement Agency. Accessed at http://whatworks.college.police.uk/Research/
Documents/Community_engagement_lessons.pdf
Organization for Security and Co-operation in Europe (2008) Good practices in building
police-public partnerships. OSCE, Vienna
Richardson JF (1974) Urban police in the United States. National University Publications,
Kennikat Press, Port Washington, NY
Roh S, Robinson M (2009) A geographic approach to racial profiling. The microanalysis and
macro analysis of racial disparity in traffic stops. Police Q 12(2):137–169
Scaglion R, Condon RG (1980) Determinants of attitudes toward city police. Criminology 17
(4):485–494
Skogan W (1994) Community participation and CP. Presentation at the workshop on evaluating
police service delivery. University of Montreal & Solicitor general Canada, November 1994,
Accessed at http://www.ipr.northwestern.edu/publications/papers/urban-policy-and-
community-development/docs/caps/caps4.pdf March 2014
Skogan WG (2006) Police and community in Chicago: a tale of three cities. Oxford University
Press, New York
Skogan W (2008) An overview of CP: origins, concepts and implementation. In: Williams T
(ed) (2008) The handbook of knowledge based policing: current conceptions and future
directions, pp 43–58, Wiley and Sons, England
Staniforth A (2015) Unity—an introduction to CP in the UK. West Yorkshire for Innovation, West
Yorkshire Police, UK
Sunshine J, Tyler T (2003) Moral solidarity, identification with the community, and the importance
of procedural justice: the police as prototypical representatives of a groups moral values. Soc
Psychol Q 66(2):153–165
Terpstra J (2009) CP in practice: ambitions and realization. Policing 4(1):64–72
bayerl@rsm.nl
50 M. van der Giessen et al.
Terpstra J, Fyfe N (2015) Mind the implementation gap? Police reform and local policing in the
Netherlands and Scotland. Criminol Crim Justice 15(5):527–544
Trojanowicz RC (1973) Juvenile delinquency: concepts and control. Prentice Hall, Englewood
Cliffs, NJ
Trojanowicz RC, Dixon SL (1974) Criminal justice and the community. Prentice Hall, Englewood
Cliffs, NL
Trojanowicz RC, Trojanowcz JM, Moss FM (1975) Community based crime prevention.
Goodyear Publishing Co, Pacific Palisades, CA
Tyler T (1990) Why people obey the law. Yale University, USA
Tyler T (2001) Public trust and confidence in legal authorities: what do majority and minority
group members want from the law and legal institutions? Behav Sci Law 19:215–235
Tyler TR (2003) Procedural justice, legitimacy, and the effective rule of law. Crime Justice
30:283–357
Tyler T (2005) Policing in black and white: ethnic group differences in trust and confidence in the
police. Police Q 8(3):322–342
Van der Giessen M, Jacobs G, Brein E, Bayerl PS (2016) Unity—first stakeholder analysis:
comparative view on stakeholder needs and perspectives. H2020-Project Unity Deliverable 3.3.
Rotterdam, Netherlands: Centre of Excellence in Public Safety Management/Rotterdam School
of Management, Erasmus University Rotterdam
Virta S (2002) Local security management policing through networks. Policing Int J Police Strat
25(1):190–200
Warren PY (2011) Perceptions of police disrespect during vehicle stops: a race based analysis.
Crime Delinquency 57(3):356–376
Weitzer R, Tuch SA (2005) Determinants of police satisfaction with the police. Police Q 8(3):279–
297
Wilson JQ (1968) Dilemmas of police administration. Public Adm Rev (Sept/Oct):407–416
Worral JL (1999) Public perceptions of police efficacy and image: the “fuzziness” of support for
the police. Am J Crim Justice 24:47–66
Wu Y, Sun IY, Triplett RA (2009) Voices from the Barrio: Chicano/a gangs, families, and
communities. In: Esbensen F, Tibbetts S, Gaines L (eds) American youth gangs at the
millennium. Waveland Press, Long Grove, IL, pp 113–141
Zhao J, Lovrich N, Thurman Q (1995) Community-oriented policing across the US: facilitators
and impediments to implementation. Am J Police 1:11–28
bayerl@rsm.nl
Chapter 5
Community Policing as a Social System
and Its Components
5.1 Introduction
bayerl@rsm.nl
52 J. Houtsonen et al.
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 53
that often follow the use of drugs. Fourth, people living in the neighbourhood,
although not directly involved in any of the incidents, may start feeling insecure and
might want to stay at home in the evenings causing losses to local businesses.
Finally, there are various organizations and associations that provide services and
can help to identify the roots of the problem and find sustainable solutions. These
actors can, for instance, be local civic associations, youth workers, social workers,
local schools, psychiatric nurses and the police.
When we observe a concrete Community Policing system within the systemic
framework, the most immediately noticeable elements (i.e., members) are those of
police officers who are engaged in community related policing functions and their
contacts within different communities. Such community members or stakeholders
can be active or potential individuals, public agencies, community groups,
non-profit and civic service providers and private businesses. The most pertinent
elements and community members are the ones that have an interest in the outcome
of the particular security problem.
Concerning the structure of the Community Policing system, or the relations
between the elements, only such relations are relevant for our purpose that make a
difference within the system in the sense that they have an important effect on the
elements of the system. For instance, if individuals (elements) engage in commu-
nicative relations they change in the process. Communication is regarded as an
important type of relation in Community Policing, while trust is regarded as the
foundation of partnerships needed for solving security problems (COPS 2014).
Indeed, trust between the police and citizens are one of the key properties of
Community Policing relations. Trust is both a prerequisite for and an outcome of
relations between members of the Community Policing system.
We are interested here in relations that involve actual or potential activities such
as communication, collaboration and joint problem solving, since open and recip-
rocal communication between the citizens and Community Policing officers has
positive consequences on trust. Increased confidence between the parties then feeds
back into improved communication, which is likely to have a positive influence on
other Community Policing activities and outcomes.
In a widely spread conception, community-oriented policing is seen as con-
sisting of three key components, namely community partnership, problem-solving
and police organizational transformations (COPS 2014; Gill et al. 2014; Keppeler
and Gaines 2015). Although there are similarities, the three-component constructs
should not be equated with the systemic perspective presented here. One should
note, for instance, that the term community partnership actually merges the two
components that are used here to describe Community Policing as a system—
elements and their relations. With neutral terms, such as an element and a relation,
we can identify all relevant individuals and organizations and also the quality of
their relations, which could even include distrustful or non-existent relations.
Successful implementation of Community Policing, including partnership and
problem solving, presupposes transformations in the police organization.
Management, processes, skills and capabilities should support the building of
bayerl@rsm.nl
54 J. Houtsonen et al.
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 55
bayerl@rsm.nl
56 J. Houtsonen et al.
security problem solving are one of the basic tools of preventive police work. They
cover cooperation with other authorities, local communities and residents. Building
bridges and trust between the police and citizens, especially in vulnerable com-
munities, is seen as an important task of the police organization. Generally speaking
96% of all Finnish people trust the police very much or somewhat (Vuorensyrjä and
Fagerlund 2016).
The following historical sketch outlines the changing environment of the
Community Policing system in Finland. The concept and modes of preventive
police work has been transformed through the decades. In the 1950s, when Finland
was still mostly an agrarian society, village constables were a very close part of the
civil society. Constables lived in their own district and knew practically all residents
in their area. Village cops solved different kinds of security issues and social
problems and mediated tensions and conflicts between villagers (Brogden and
Nijhar 2005; Virta 2013).
Increasing urbanization doubled the amount of crimes in the cities. As a con-
sequence so called ‘Block Policing’ was introduced. Block constables’ main tasks
were maintaining law and order in towns by foot or bicycle patrolling in certain
blocks in the centres, i.e., they were trying to prevent accidents, disorder and crime
in particular town blocks. The preferred methods of prevention were early identi-
fication and intervention in addition to youth and school policing in the form of
legal education and advice (Ministry of the Interior, the Report of the Block
Policing 1979).
The continued urbanization and migration from the countryside to suburbs in the
1970s brought block policing to an end. The number of police officers was reduced
and foot patrols could not respond to the demands of a changing society. Foot and
bicycle block patrols were replaced by car patrols, whose area of operation
expanded to suburban neighbourhoods. The main tasks of Area Policing were equal
provision of preventive police services in every region or town, rationalization of
preventive policing, building bridges to the communities and gathering regional
intelligence. In principle, however, the major difference between block and area
policing was only the extended area of operation. Both activities were regarded as
forms of Community Policing, the purposes of which were to bring the police
nearer to the citizens (Mantila 1987).
Over the decades, Finland has also had other concepts of preventive policing
such as youth constables, school liaison officers and community liaison officers
depending on the period of time and local conditions and needs. The purpose of
these diverse roles has always been to prevent crime and public disturbances by
maintaining a public presence and interacting with citizens and communities
(Poliisihallitus 2015).
Currently, the Anglo-American model of Community Policing has been adopted
in adjusted form in Finland starting in 1996. However, an exact literal translation
for Community Policing does not exist in the Finnish language. Therefore, the
concept was translated as lähipoliisi (‘Proximity Policing’) when it was initially
presented in 1978 (Virtas 2002). In addition, partly due to a much smaller police
force in Finland, the Anglo-American Community Policing model has been
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 57
bayerl@rsm.nl
58 J. Houtsonen et al.
security. This specific type of policing should be organized, managed and supported
by uniform structures and processes. Such preventive policing, or Community
Policing, includes also the Internet police and annually selected specific projects
such as the prevention of radical extremism (Poliisihallitus 2015).
Social and health policy measures that promote equality have a strong preventive
impact against crime and disorder (e.g., Pike 1985). Effective crime prevention
requires a credible criminal policy and legal system in addition to well-functioning
social policies. The public, private and non-governmental organizations producing
welfare services strive for equal opportunities for all to well-being and good life.
These services can be regarded as the mainstay of the Nordic welfare states. Within
this framework the police are not only a crime fighting tool, but also an agent
together with other agents that try to prevent crime, social disorder and deprivation
and increase the sense of security and well-being of citizens. As a Nordic welfare
state Finland invests much more resources in the social and welfare services than
public safety services including the police. The emphasis on social rather than
safety services is likely one of the explanations why citizens in the Nordic countries
have such a strong trust in the police (Kääriäinen 2007).
The Finnish welfare society has been quite stable so far, but now, as a result of
weakening economic growth and increasing unemployment rates, politicians and
the public sector struggle to ensure social integration and equality while cutting
spending on public services. Growing unemployment and social exclusion increase
the sense of insecurity and social tensions and complicate the integration of
marginalized individuals and groups into the society.
At the turn of the year 2015, the population of Helsinki was about 620,000, while
there were 1.1 million inhabitants in the Helsinki Metropolitan area. Since 2010 the
annual growth was about 10,000 persons leading to a population growth forecast of
100,000 new residents by the year 2035.1 Demographics of Helsinki differ from the
rest of the country. The largest age group in Helsinki comprises young adults
between 23 and 33 years of age, whereas in the whole country 56 to 66 year olds
form the largest group.2In addition, the birth rate and increase in foreign-born
immigrants is much faster here than in the rest of the country. Almost 90% of the
Finnish migration falls upon the Helsinki region. About one third of this is
immigration. In Helsinki, the proportion of people whose first language is neither of
the two official language, Finnish of Swedish, is about 13.5% (Helsinki 2016).
Although there are wealth differences, the socio-economic composition of the
residential areas in Helsinki is relatively equal compared with some other European
1
Statistics Finland, www.stat.fi (accessed October 25, 2016).
2
Helsinki by district 2014, www.hel.fi (accessed October 25, 2016).
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 59
bayerl@rsm.nl
60 J. Houtsonen et al.
victim or the offender is under the influence of alcohol. A typical battery on public
streets occurs in front of a restaurant around closing time. Also about 70% of
homicide offenders and victims are under the influence of alcohol. Particularly
aggravated violence by young people is strongly associated with alcohol, substance
abuse, mental and social problems, and hence social exclusion (Rikollisuustilanne
2015).
In 2012 police changed its intervention strategy from visible, emergency-based
car patrolling to proactive intervention that meant zero tolerance for underage
alcohol assumption. Since 2012 police has intervened very strictly in minors’
alcohol consumption on the streets. Before, hundreds of intoxicated youngsters
posed a threat to the public safety in parks during the weekends. By controlling
young men’s alcohol consumption, street violence reduced rapidly. This has
required a change in the attitudes and working methods of patrol police and has
been successful despite the inertia and resistance of old school police officers. The
result is that youngsters do not consume alcohol on the streets any longer. At the
same time, according to several studies, young people’s attitudes towards alcohol
have changed to the negative. Indeed, alcohol use has decreased and alcohol
abstinence has increased among the young since the beginning of the 2000s
(Kinnunen et al. 2015).
When daily work of local police patrols is done in a proactive fashion, the
specifically appointed community police officers are free to concentrate on special
proactive work in order to improve safety. These police specialists are able to target
wider and tougher security challenges by creating relations with other relevant
stakeholders (elements in the system) without the requirement to respond reactively
to emergency calls. That is to say, community police officers are involved in solving
proactively deep-rooted security problems. Effective proactive policing requires
new problem solving methods, which can include, for instance, risk assessment,
analysis and evaluation of security measures. It also requires encouraging stake-
holders to take ownership and responsibility of the problems and develop solutions
proactively and independently.
Virtual Community Policing is an example of special proactive police work.
There are two types of preventive online police methods in Finland. First, the
Virtual Community Police, established at the Helsinki Police Department in 2008,
consists of three full-time virtual police officers working to solve problems and
prevent crimes by using Community Policing methods online. Full or part-time
virtual police officers were established also in other police departments in Finland.
The second method uses social media as a Community Policing tool. Police officers
have their own Facebook profiles, which they use for communication and infor-
mation sharing purposes with different online communities and individuals.
A further example of special proactive police work is the multi-professional
Anchor Team model. The first team was established in 2004 in the Kanta-Häme
Police Department (Sisäministeriö 2014) from where the model spread to other
police departments in Finland. Anchor Team is a proactive working model through
which the police have establish operational working relations with other relevant
public agencies including social work, health care, child welfare and youth work.
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 61
The initial goals were timely intervention of underage criminal behaviour, domestic
and intimate partner violence, but has extended to prevention of extremism and
improvement of internal security through cooperation with multiple partners.
In Helsinki the multi-professional Anchor Team works on the premises of the
Helsinki Police Department. They search, offer and develop services for diverse
needs of various customers. On the basis of the specific expertise and information
of each member the team produces a comprehensive assessment of customers’ often
very tough life situation and finds customer-oriented solutions. The Anchor Team
has extensive operational relations with many other stakeholders (elements) ranging
from public authorities to association offering social services and support.
The Anchor Team handles about one thousand customers per year, the most of
whom are young persons with minor offences. Other customers are offenders that
are guilty of domestic or intimate partner violence or individuals who hold
extremist viewpoints. The starting point is a customer’s desire to achieve a change
in his or her life. A preliminary assessment indicates that about 75% of the cus-
tomers have benefited from the Anchor Team’s services and have given up com-
mitting crimes.
The third example of special proactive work is the organized Proactive Policing
Unit at the Helsinki Police Department. The unit was founded in 2012 and set as its
main goal the enhancing of security in the city of Helsinki, the early prevention of
phenomena that pose a threat to the security and the building of partnership rela-
tions with other members of the system. In practice this means cooperation with
other local and national police units, public authorities, non-governmental organi-
zations, civic association and citizens of Helsinki. An important measure that
ensures that these goals are realized is to build trust with other stakeholders and
collectively try to tackle possible security challenges. Security cooperation and
planning is based on reciprocity that benefits all parties. Early intervention requires
active and target-oriented cooperation with relevant partners. Although policy and
action planning is usually developed centrally by authorities in Finland, preventive
action plans needs to be adjusted to the local conditions and requirements.
Consequently, local communities and their representatives need to be actively
engaged in the development and implementation of action plans, and the com-
munities need to collaborate with the police and other public authorities. In other
words, local communities need to take ownership of the problems and action plans.
Proactive policing in Helsinki is organized into two different teams, both having
their own focus.
The task of team one is to create and maintain relations of trust between the
police and groups coming from various linguistic and ethnic groups. A special task
is to prevent politically or ideologically based violence. Team two focuses on those
security threatening phenomena that require more thorough investigations into the
root of the problems, which may not be possible by the more traditional law
enforcement methods. By means of local problem solving this team first tries to
identify the factors behind crimes and disorder and then moves on to influence
those factors in collaboration with other police units, public agents, civic organi-
zations and residents of particular areas. In its work, the team especially tries to
bayerl@rsm.nl
62 J. Houtsonen et al.
build and maintain trusting relations between the young and the police. Young
people are met during the police fieldwork and in social media. The team collab-
orates with schools, youth clubs and associations in the Helsinki region. The team
also works with the Anchor Team focusing especially on young first-time offenders
and socially marginalized individuals who are in a vulnerable position or at risk of
committing increasingly serious crimes or of moving into criminal careers.
Although the two teams have a somewhat different focus, they will apply similar
methodologies and techniques of local problem solving that are well tested, for
instance, in the prevention of extremism and multi-professional cooperation.
One of the specific tasks of the Proactive Policing Unit is to prevent violent
extremism. This includes individuals that are prepared to use violence to further
their ideological goals, which could be religious or political radicalism (left-wing
and right-wing extremism), individuals with hardline and extremist views and lone
actors such as potential school shooters.
In their daily work, police officers in the Proactive Policing Unit, who work both
in uniform and in plain clothes, meet individuals and representatives of various
communities, talk to young people, participate and help organize community
events, work as negotiators in demonstrations and arrange seminars and Q&A
sessions together with the communities. The multi-professional approach is often
the preferred method when the teams encounter an individual and his or her family
who tend to have a multitude of other social and psychological problems than mere
antisocial behaviour or petty crime.
The effectiveness and outcomes of preventive policing work in Helsinki has not
been evaluated so far. Based on Gill et al. (2014) one could expect that at least
people are more satisfied with the police and the police legitimacy will become
stronger, whereas it is likely harder to prove that Community Policing will reduce
fear of crime or crime rates.
5.5 Conclusions
bayerl@rsm.nl
5 Community Policing as a Social System and Its Components 63
reduce citizens’ fear of crime. In order to accomplish those purposes the police
needs to build active relations with all relevant players among public, private and
non-governmental organizations and individual citizens. The fact that the relations
are active means that they are functional, i.e., they have been created for some
activity goal-driven. For instance, there can be relations of communication and
collaboration in order to ahieve the goal. Engaging in such relations changes the
parties and the quality of the relation. Thus, trust between the police and the
community, which is often mentioned as a crucial aspect of Community Policing, is
a consequence of communication but also a prerequisite for engaging in commu-
nication in the first place. Mechanisms are processes through which community
policy attempts to achieve its purpose. The most generic mechanism in Community
Policing is problem solving, which can include various sub-processes or particular
methods and techniques such as multi-professional interventions, prevention of
radicalization or facilitated invention of solutions.
The operative environment of a Community Policing system is constantly
changing and Community Policing has to be aware and adjust to the demands of the
environment. One important sub-process of problem solving is the strategic analysis
of the operational environment to identify the opportunities and challenges the
organization has to come terms with. Such environmental forces and trends are
often analysed into political, economic, social, technological, environmental and
legal aspects. Strategic planning and analysis includes also the exploration of the
environment inside the organization in order to identify strengths and weaknesses.
Through this type of strategic analysis of external and internal organizational
environments one can suggest improvements in Community Policing services and
thereby create more public value for citizens and fulfil the police mission (Bryson
2004).
Adding new components into the model can further develop the systemic
framework presented in this chapter. Consequently, the analysis becomes more
detailed. For instance, the model could be extended by various actual and potential
organizational capacities and capabilities that various members can bring into the
system and thereby improve the effectiveness of a community. These capabilities
and capacities include, for instance, management, organizational structures and
processes, personnel and information technology.
References
Brogden Mike, Nijhar Preeti (2005) Community policing. Willan Publishing, London
Bryson John M (2004) Strategic planning for public and nonprofit organizations: a guide to
strengthening and sustaining organizational achievement. Jossey-Bass, San Francisco
Bunge Mario (1999) Social science under debate: a philosophical perspective. University of
Toronto Press, Toronto
Bunge Mario (2004) Clarifying some misunderstandings about social systems and their
mechanisms. Philos Soc Sci 34(3):371–381
bayerl@rsm.nl
64 J. Houtsonen et al.
COPS (2014) Community policing defined, community oriented policing services, U.S.
Department of Justice, Washington D.C. https://ric-zai-inc.com/ric.php?page=detail&id=
COPS-P157
Gill Charlotte, Weisburd David, Telep Cody C, Vitter Zoe, Bennet Trevor (2014)
Community-oriented policing to reduce crime, disorder and fear and increase satisfaction
and legitimacy among citizens: a systematic review. J Exp Criminol 10(4):399–428
Haraholma Kristiina, Houtsonen Jarmo (2013) Restructuring the finnish police administration. In:
Fyfe Nicholas R, Terpstra Jan, Tops Pieter (eds) Centralizing forces? Comparative perspectives
on contemporary police reform in Northern and Western Europe. Eleven International
Publishing, The Hague, pp 59–75
Helsinki (2016) Helsingin seudun vieraskielisen väestön ennuste 2015–2030 (Forecast of Foreign
Language Population in the Helsinki Region, 2015–2030). Helsingin kaupungin tietokeskus,
Tilastoja 1/2016, Edita Prima, Helsinki
Kääriäinen J (2007) Trust in the police in 16 European countries: a multilevel analysis. Eur J
Criminol 4(4):409–435
Kappeler VE, Gaines LK (2015) Community policing: a contemporary perspective, 7th edn.
Routledge, New York & London
Kinnunen J, Pere L, Lindfors P, Ollila H, Rimpelä A (2015) Nuorten terveystapatutkimus 2015,
Nuorten tupakkatuotteiden ja päihteiden käyttö 1977–2015 (The Adolescent Health and
Lifestyle Survey 2015, Adolescent smoking, alcohol and substance use in 1977–2015).
Sosiaali- ja terveysministeriö, Helsinki
Mantila Anu (1987) Community policing—the opinions of neighborhood and district policemen of
their work. Valtion painatuskeskus, Helsinki
Nieminen Tarja, Sutela Hanna, Hannua Ulla (2015) Ulkomaista syntyperää olevien työ ja
hyvinvointi Suomessa 2014 (Work and Well-being of Foreign Origin in Finland 2014).
Tilastokeskus, Helsinki
Poliisihallitus (2015) Poliisin ennalta estävä toiminta—EET hanke, julkaisematon, (Preventive
policing work—EET project, unpublished), Poliisihallitus
Rikollisuustilanne 2015 (2016) Rikollisuustilanne 2015, Rikollisuuskehitys tilastojen ja tutkimuk-
sen valossa, (Crime Review 2015, Crime Trends in the Light of Statistics and Research),
Helsingin yliopisto, Valtiotieteellinen tiedekunta, Kriminologian ja oikeuspolitiikan instituutti,
Katsauksia 14/2016
Sisäasiainministeriö (1979) Korttelipoliisityöryhmän mietintö, (The Ministry of the Interior.
Report by the Working Group on Block Policing), Helsinki
Sisäasiainministeriö (1987) Poliisin ennalta estävän toiminnan strategiaa suunnitelleen työryhmän
mietintö, (The Ministry of the Interior. Report by the Working Group on the Strategy of Police
Preventive Work). Helsinki 1987
Sisäministeriö (2014) Poliisin ennalta estävän toiminnan strategia vuosille 2014–2018, (Police
Strategy for Preventive Work 2014–2018), Sisäministeriön julkaisu 2/2014
Tihveräinen Tero (2016) Poliisin tietoon tullut viharikollisuus Suomessa, 2015 (Hate Crime
Known to Police in Finland, 2015), Poliisiammattikorkeakoulun katsauksia 10/2016. Juvenes,
Tampere
Virta S (2002) Local Security Management Policing through Networks. Policing Int J Police Strat
25(1):190–200
Virta S (2013) Finland, In: Nalla MK, Newman GR (ed) Community policing in indigenous
communities. CRC Press, Boca Raton, p 247–256
Vuorensyrjä M, Fagerlund M (2016) Poliisibarometri 2016, Kansalaisten käsitykset poliisin
toiminnasta ja sisäisen turvallisuuden tilasta (Police Barometer 2016, Citizens Perceptions’ of
Police Activities and the State of Internal Security). Sisäministeriön julkaisuja 27/2016
bayerl@rsm.nl
Part II
European CP Practices and Case Studies
bayerl@rsm.nl
Chapter 6
Community Policing and Radicalization:
Evaluation and European Examples
6.1 Introduction
The 21st century Europe is marked by various challenges, ranging from war in the
Middle East to a tremendous refugee crisis to the omnipresent threat of terrorism.
The large migration of the Muslim population to Europe, triggered by war and
terror in Syria and Iraq, entails next to challenges also risks. On the one side, radical
Islamist Groups are trying to win traumatized, lonely and therefore easy to influence
refugees for their ideology. On the other side, radical left and right wing groups are
taking advantage of the refugee crisis to underpin their propaganda and to spread
their body of thought. In order to prevent individuals from the germination of
radical ideas and the drift into a radical group, security authorities throughout
Europe need a new approach to meet the threat at an early stage and successfully.
Stakeholders and Law Enforcement Agencies (LEAs) need to cooperate and
communicate, because radicalisation that leads to terrorism is a threat to community
security and not only to state security.
Communities are stakeholders and partners of the police in preventing radical-
isation and therefore need to be involved into the workflows to reduce the risk of
radicalization. Community Policing with its multidisciplinary approach seeks the
cooperation of local communities and the broad range of public authorities to
counter radicalisation that leads to terrorism. The interaction between police and
communities can not only provide an important source of information about crimes
and suspicious behaviour, it can also prevent all kinds of radicalisation, be it right,
left, politically or religiously motived.
bayerl@rsm.nl
68 H. Nitsch and S. Ronert
6.3 Radicalization
The term radicalization originates from the Latin word radix, which means root.
Radicalization can be understood as a process, i.e., a progress in the course of
which people or groups change their point of view and/or their behaviour (Mandel
2009).
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 69
Radicalization describes all political orientations, which are aiming to change the
existing social order fundamentally. However, radicalization does not necessarily
mean that a person is on the way to becoming a violent extremist. In the past, there
were also examples for non-violent political movements like organisations advo-
cating for women’s suffrage or civil-rights (Leuprecht et al. 2010), which were also
classified as radical. Therefore, the term radicalisation is describing a process,
which is not always ending in violence and extremism and is used in various
contexts. While radicalism identified liberal reformers and freedom and democracy
movements in the 19th century, in the early 20th century it often was a description
for Marxist, Leninist and anarchistic groups (Mandel 2009). Accordingly, central
characteristics of radicalism are striving to realize a social utopia and its incon-
siderate enforcement.
Today the term radicalism can be understood more as an insistence on an initial
position, which rejects every other position, opinion or value and which supports
acts of violence. However, of course the process of radicalization can also lead into
violent extremism and violent political behaviour like jihadi Salafis or extreme
right-wing groups are demonstrating today. The increasing amount of people who
are travelling from western countries to Syria in order to support and fight next to
the Islamic State make this abundantly clear. At the moment of writing, experts
consider that 4500–5000 Europeans travelled to Syria with the intent to join the
radical terrorist group.
To reduce this kind of radicalization, LEAs and stakeholders need to understand
the process of becoming an extremist with violent behaviour. Unfortunately, no one
can explain this process in an accurate and extensive way. However, many experts
on the subject of sociology agree on the view that people are shaped by their social
surroundings. That means that an individual is formed by its immediate social
conditions mostly within a group (Schulze 2000). Imagine that a young Muslim is
on the search for his/her identity, because s/he grew up in a non-Muslim society and
doesn’t know where s/he belongs to—a typical identity crisis; a group of radical
Muslims would assign him/her to a role and give him/her an identity. S/He would
be surrounded by people with the same opinions and experiences. This familiar
structure will lead to a feeling of strength and moral superiority against outsiders
(Abou-Taam 2011). By promoting the solidarity of a radical group, members will
begin to distinguish between fellows and non-fellows, between ‘we’ and ‘they’. The
group will develop a collective identity, which eventually will overshadow the
individual identity.1 The fusion with a radical group will isolate the individual from
its ‘normal’ surrounding in a psychological and physical way2 and relationships of
1
This group dynamic also simplifies the strength of recruitment.
2
One example is the full body veil of the Salafis. The women will literally be isolated from their
surroundings, which will lead little by little to a total encapsulation from her former social
environment.
bayerl@rsm.nl
70 H. Nitsch and S. Ronert
trust will only exist within the group (Abou-Taam 2011). But of course there are
numerous other factors that can lead to radicalization.
Considering the age of modern terrorists, it is striking that young people seem to be
more susceptible for radicalization than elderly people. Most of the people, who
join a radical group are between 16 and 59, the average age is 25. This is also
supported by general criminological investigations stating that young people are
more vulnerable for criminality than the elderly (Fuchs and Mähler 2015). The
same investigations also indicate that the male gender is predominant considering
radicalization and violent extremism (Fuchs and Mähler 2015). The reasons for this
may be a gender-specific perception or a different attitude towards violence in men
and women. Another significant factor for radicalization is the social environment.
According to different studies, family relations play a significant role in the process
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 71
3
An example are the so-called Black Widows. Black Widow is a description for widowed
members of Islamist terrorist groups, who are revenging the death of their husbands. This term first
became known at the Moscow theater hostage crisis of October 2002.
4
A person performing Jihad.
bayerl@rsm.nl
72 H. Nitsch and S. Ronert
pretended love (Erelle 2016). And last but not least, mechanisms like thrill, status
and money are driving individuals of each age-category into the clutches of radical
groups (Leuprecht et al. 2010).
5
Ibrahim Abou-Nagie, a Salafi preacher in Germany, is such a charismatic leader. With his
community ‘Die wahre Religion’ (engl.: The true religion), Abou-Nagie is converting juveniles to
Salafi Islam. He became known through campaigns called “LIES!” (engl: Read!), where he and his
followers distributed their interpretation of the Quran to passengers.
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 73
External threats can lead to increased group identification and magnify the power of
leaders on both levels, the group and the mass level. An example for mass impact to
external threats is for example the reaction of American citizens after 9/11
(Leuprecht et al. 2010). Anti-Islamic and islamophobic communities and associa-
tions sprung up in the U.S. and won people like never before. We can observe a
similar reaction in 21st century Europe, since millions of Muslims fled from terror
and war in Syria and Iraq and settled down in the countries of Europe. After the
Paris attacks in 2015 and the Brussels bombing in 2016, people felt an external
threat which caused a shift to the right, which spread throughout Europe.
But there are also mechanisms within migrant communities in western societies
that can support the process of radicalization. As we know, the integration of
Muslims into western societies does not always succeed, and integration policies
are often perceived by Muslims as anti-Islamic. Current public policy debates about
Muslim communities and their probably failed integration are enhancing a feeling
of segregation and a negative attitude towards democracy among migrants. As a
result, especially Muslims who are living in the 3rd or 4th generation in a western
country are feeling a kind of rootlessness, as they often also lost contact to their
countries of origin. At this point it is very easy for recruiters or radical groups to
catch the person on the search for identity and to win her/him for their ideologies by
giving a new identity and affiliation (Fuchs and Mähler 2015).
But there is yet another mechanism on the group level. In most cases, individuals
in the process of radicalization develop a feeling of hate, because hate allows an
essentialized and dehumanised view at self-appointed enemies, which in turn
facilitates violating and killing of human beings (Leuprecht et al. 2010). This can be
seen in the ideology of radical Salafis who declare the whole western society as an
enemy of Islam and who are inciting hate against the West in all their recruits.6
Radical groups succeed in spreading this hate by talking directly to potential
recruits and by uploading their propaganda to the internet, where millions of people
will have access to this material.
Only a few technological innovations had such far-reaching effects as the internet
and the World Wide Web, which revolutionized the communication by making the
exchange of information quicker, easier, cheaper and above all global. Because of
the easy access, the (potential) anonymity of communication, the fast flow of
information and many other advantages, internet usage by extremists and terrorists
is growing (Whine 1998). They are using this method of communication for
6
cf.: Osama bin Laden's Declaration of War.
bayerl@rsm.nl
74 H. Nitsch and S. Ronert
7
Arid Uka can be identified as a lone-wolf terrorist. After he radicalized himself by watching
Islamist propaganda videos on YouTube and reading Salafi ideological texts in different forums, he
attacked US-American Soldiers at the airport of Frankfurt and killed two people (cp. Leenaars and
Reed 2016).
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 75
the extremist’s trust and liberate him/her from their radical surrounding and
thinking. These partnerships of police, stakeholders, experts and citizens would not
only be able to take appropriate measures in the case of an extremist, but also to
recognize the radicalisation of person at a very early stage and to counteract this
process. For this purpose, it is necessary to cooperate with schools, to start pre-
vention projects in affected communities, to develop opt-out programs and infor-
mation channels and to train multipliers. Here it is, where Community Policing can
find its main role and purpose.
Considering that the average age of individuals being susceptible for radicalization
is 25, it is necessary for the police to engage with youths. But while it is easy for the
police to contact young people, it is often difficult to build up a cooperation.
Reasons for this may include grievances against the society and the state, which
lead to negative perceptions of the police and a reluctance to have any contact with
officers. But a positive perception of the police among young people is a perquisite
for a successful police-citizen partnership, as young men and women who feel
respected and valued by the police are much more willing to cooperate and
communicate.
Youth engagement activities are key components in the framework of Community
Policing, not only because they are susceptible for radicalization, but also because they
tend to use different methods of communication and get information from different
sources. Therefore, young people often have an excellent network and can provide
useful and important information. However, the communication among youths takes
place primarily on the internet and social-networking media. For that reason, the use of
social media can be an effective way to reach young people and to convey messages or
awareness-raising activities that can prevent young men or women from being drawn
into the process of radicalization. In addition, the police can also establish a presence on
social media to engage with youths, to improve the image of the police by giving an
insight into the daily police work or by organizing information events (OSCE 2014; see
also Chaps. 11 and 13).
bayerl@rsm.nl
76 H. Nitsch and S. Ronert
numerous reasons for Law Enforcement Agencies to engage with religious leaders
or faith-based organizations. One of these reasons is the fact that religious com-
munities may be potential targets of terrorist attacks. In the beginning of 2016, for
instance, an attack was made on a Sikh temple in Essen, Germany during a wedding
celebration by two offenders of Turkish origin.
Next to the need for protection and security, religious communities can provide
crucial feedback on how de-radicalizing measures have affected their community
and how they are perceived. But religious leaders or faith-based organizations can
also help Law Enforcement Agencies to better understand their community, their
religion and their culture. And this in turn could facilitate the development and
implementation of counter-terrorism measures. However, the most important reason
to engage with religious communities is the opportunity of information exchange.
Especially religious leaders may be aware of individuals who are vulnerable for or
already are in the process of radicalization or of propaganda material circulating
within their community.
However, engaging with religious leaders or faith-based organizations should
not be underestimated, as there are some challenges. For instance, there may be a
history of tensions and distrust between the state and religious communities due to
real or perceived injustices like discrimination. Further, each religious community
has its own complex dynamics and characteristics regarding ethnicity, culture,
linguistic usage and regulations. Therefore, the multidisciplinary approach of
Community Policing is essential for Law Enforcement Agencies in order to con-
struct a new relationship based on mutual respect, solidarity and partnership (OSCE
2014).
Especially in times of the refugee crisis and large demographic changes, it is more
essential than ever to engage with minorities. Still, as is the case for engaging with
religious leaders and faith-based organizations, there are challenges in creating
relationships and partnerships with minorities. There may also be distrust between
police and ethnic minorities, especially as the result of practices perceived as dis-
criminatory by minority members. An exemplary case is the strained relationship
between the police and people of African and Latin origin in America, as in recent
months there were frequent incidents of real or perceived discrimination; and
therefore such communities may often have a negative attitude towards the police.
In the case of immigrants, negative experiences with the police sometimes are
imported from abroad. Various social workers stated that immigrants often feel
negatively towards or are even afraid of the police, as they have had negative
experiences with police officers in their country of origin (Egharevba 2014).
Therefore, it is important not to unwittingly stigmatize any particular ethnic
minority, turning them into a ‘suspect group’, as this behaviour will lead to a feeling
of displeasure, alienation and animosity towards police. This in turn will reduce the
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 77
As there exists no specific methodology for the work within the scope of
de-radicalization, countries’ approaches differ greatly. But it can be said that European
de-radicalization strategies tend to differ from strategies outside Europe, as they tend to
focus more on deconstructing radical theologies that lead to radicalization than pros-
ecuting supposed terrorists or extremists (Saltman and Smith 2015). In addition,
counter-radicalizing strategies are often influenced and triggered by major events like
terror attacks.8 Nevertheless, certain European countries have been streamlining efforts
that are combining official counter-terrorism strategies and Community Policing
approaches by increasing the responsibilities of stakeholders like teachers, social
workers, NGO’s, associations and authorities (OSCE 2014). In the following we
describe some approaches to give an overview of current practices.
6.5.1 Germany
The first official development of German prevention strategies began in the year
2003, which mainly entailed the distribution of informative material to education
8
For example, the large expansion of the preventive strategy in the UK was planned and imple-
mented shortly after the bombings in central London in 2005.
bayerl@rsm.nl
78 H. Nitsch and S. Ronert
institutes and the civil society. In addition, workshops and trainings for stakeholders
were organized on recognizing extremism. In 2010, a hotline was established for
individuals who wanted to exit radical or extremist groups—which, however,
remained strikingly underused. In relation with the Syria crisis and the high amount
of individuals that left Germany to fight,9 the Department of Information on
Radicalization (Beratungsstelle Radikalisierung) was established within the
German government and the development of the before mentioned exit mechanisms
was delegated to de-radicalization programs and society groups (Saltman and Smith
2015). In 2015, the Bavarian Criminal Investigation Agency (Bayerisches
Landeskriminalamt) established the Competence Centre for De-Radicalization
(Kompetenzzerntrum für Deradikalisierung) and at the same time brought the
Network for Prevention and De-Radicalization (Netzwerk für Prävention und
Deradikalisierung Gegen Salafismus) into life to counteract radicalization in the
field of Salafism. Their aim is to coordinate de-radicalization approaches in order to
minimize the danger of religiously motivated radicalized individuals.
For this purpose, the Competence Centre cooperates with the Bavarian coun-
selling centre of the association Violence Prevention Network e. V. Within the work
of de-radicalization, the Competence Centre firstly acts as the coordinator for
de-radicalizing measures. In addition, the Centre is a contact point and advisor for
all public authorities concerning questions of de-radicalization in Bavaria and
ensures the exchange of information between partners of the prevention network.
Furthermore, representatives of the Competence Centre are cooperating and fos-
tering the dialogue with Muslim communities. In this context, the Bavarian
counselling centre of the association Violence Prevention Network e. V. also
assumes the role of contact point and advisor for relatives of possibly religiously
motivated extremists. Moreover, it offers anti-violence and competence trainings in
youth prisons for vulnerable inmates and an assistance program for persons who
want to leave the Salafi scene.10 Therefore, the Competence Centre for De-
Radicalization combines various partners and stakeholders in the field of Salafism
and de-radicalization in order to prevent and counteract the increase of religiously
motivated radicalized individuals. The Competence Centre is also actively con-
tacting stakeholders and communities to inform them about their work and their
activities. This Community Policing approach opens a communication channel with
otherwise difficult to reach minority communities.
9
Experts suggest that by now about 800–900 Germans travelled to Syria with the intention to fight
and about 300 of these came back to Germany (see: https://www.verfassungsschutz.de/de/
arbeitsfelder/af-islamismus-und-islamistischer-terrorismus/zahlen-und-fakten-islamismus/zuf-is-
reisebewegungen-in-richtung-syrien-irak, 09.10.2016).
10
See: http://www.violence-prevention-network.de/de/aktuelle-projekte/beratungsstelle-bayern,
https://www.polizei.bayern.de/muenchen/schuetzenvorbeugen/index.html/232038.
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 79
6.5.2 Denmark
6.5.3 Sweden
bayerl@rsm.nl
80 H. Nitsch and S. Ronert
individuals left Sweden to fight and several returned, which added new challenges
for organizations on how to de-radicalize returnees.
One of these organizations dealing with prevention and de-radicalization is
called Exit Sweden and is located within the large youth centre Fryshuset. It
originally was established in 1998 to support individuals who wanted to exit
neo-Nazi or racist groups, provided that they are attracted to white supremacist
groups more as a product of social and emotional conditions rather than by ide-
ology. The aim of this project is “to help individuals leave White supremacy
groups, and to support them in establishing new lives with economic and social
support structures to make their new lives sustainable.”11
Exit Sweden concentrates on aiding the disengagement process by dealing with
radicalization supporting issues like the search for identity or power, looking for a
reason in life and social exclusion. The majority of the Exit employees have
experiences with far-right extremism, which gives credibility and legitimacy to their
voices for the purpose to de-radicalize others. In addition, a number of qualified
psychotherapists support individuals and encourage their families to ensure sus-
tainable support to the networks. Experiences made by these employees are relayed
directly to stakeholders in order to better inform policy and practices around
countering radicalization and violent extremism on the ground. Considering this
multidisciplinary approach in the framework of far-right extremism and
de-radicalization, the project Exit Sweden is also qualified to confront Islamist
extremism in a similar manner (Saltman and Smith 2015).
6.5.4 England
After the 9/11 attacks the UK brought the Contest programme into life, which is
based on the four P’s prepare, pursue, protect and prevent. In 2015, the UK
government elected to pass the Counter-Terrorism and Security Bill in response to
the 700 individuals that left the UK to fight in Syria and Iraq and the 300 returnees
that came back. This decision gave new life to the de-radicalization programme
Channel, which was established in 2007 and aims to provide support to people who
are identified as being vulnerable to being drawn into terrorism. During 2012, the
Channel project was extended across England and Wales with the remit to adopt a
multi-agency approach to identify and assess cases of radicalization and to support
the de-radicalization process. This approach intends to be adaptable to different
forms of extremism and radicalization, as it deals with individuals on a
tailored-as-appropriate basis.
This counter-radicalization process begins with the identification or the referral
of an individual at risk of radicalization to their local police. This referral can come
from different stakeholders like community members, social services, family
11
See: www.exit.fryshuset.se.
bayerl@rsm.nl
6 Community Policing and Radicalization: Evaluation … 81
6.6 Conclusion
War, terror and demographic changes are creating new challenges and issues that
cannot be met by police on its own. Almost every European country faced serious
threats from domestic terrorism, be it left, right or Islamist over the past years.
Because of the various different religions, cultures, ideologies and attitudes that
exist within every society, it is almost impossible for Law Enforcement Agencies to
prosecute the numerous cases of radicalization and to prevent individuals from
sliding into a radical group or into a radical ideology. In addition, many police
authorities have a lack of in-depth knowledge in the fields of religion, culture and
ideology and simply lack sufficient resources. At this point it is inevitable to
integrate the multidisciplinary concept of Community Policing into the daily police
work to support preventive approaches. Each community with its multi-dimensional
nature, knowledge and influence can provide a powerful and active support for
preventing and countering radicalization. Police-citizen partnerships are necessary
to cover the wide spectrum of monitoring radicalization, implementing
de-radicalization measures, supporting dropouts and preventing individuals from
being radicalized. The approach of Community Policing will therefore not only
strengthen the effective engagement and cooperation between police forces and the
communities, it will also support the creation of safer communities for all.
bayerl@rsm.nl
82 H. Nitsch and S. Ronert
References
bayerl@rsm.nl
Chapter 7
Police Liaison Approaches to Managing
Political Protest: A Critical Analysis
of a Prominent UK Example
David Waddington
This chapter focuses on a highly illuminating example of the way in which the
principles of Community Policing have recently been incorporated into the police
handling of major protest throughout the United Kingdom. This highly significant
sea change regarding the nature and underlying philosophy of public order policing
in the UK was induced by controversy surrounding the Metropolitan Police
Service’s (MPS’s) handling of the anti-G20 demonstration in London on 1 April
2009. Mass media and ‘citizen journalism’ coverage of this event emphasised how
police officers had reacted to protesters in a sometimes violent and allegedly
indiscriminate manner and had resorted to the controversial tactic of ‘kettling’
(corralling or ‘containing’) demonstrators into a confined space and detaining them
for several hours (Greer and McLaughlin 2010; Rosie and Gorringe 2009).
A subsequent official inquiry urged the police to adopt more tolerant methods of
handling political protest with the aim of facilitating, rather than subjugating, the
‘right’ to protest (HMCIC 2009a, b). This directive was wholeheartedly embraced
by the Association of Chief Police Officers and Association of Chief Police Officers
in Scotland, whose Manual of Guidance on Keeping the Peace
(ACPO/ACPOS/NPIA 2010) stipulates that crowd order tactics and strategy must
be designed and implemented in such a way as to facilitate protest, adequately
differentiate between the ‘innocent’ and ‘guilty’, and generally aspire to a ‘no
surprises’ approach to engaging with the public.
Underpinning the contents of the new manual was a justificatory social psy-
chological rationale (Stott 2009), predicated on the Elaborated Social Identity
Model (ESIM) (e.g., Drury and Reicher 2000; Stott and Drury 2000). The basic
tenet of the ESIM is that any form of police intervention perceived as indiscriminate
D. Waddington (&)
Sheffield Hallam University, Sheffield, UK
e-mail: D.P.Waddington@shu.ac.uk
bayerl@rsm.nl
84 D. Waddington
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 85
The demonstration in question was called and organised by a coalition of local trade
union groups and political activists calling itself the Sheffield Anti-Cuts Alliance
(SACA). Following the formation one year earlier of a Coalition Government
between the Conservative and Liberal Democratic parties, Nick Clegg (the newly
appointed Deputy Prime Minister, Lib Dem leader and MP for Sheffield Hallam)
had nominated Sheffield City Hall as the venue for his party’s Annual Spring
Conference in what was regarded, at the time, as a benevolent gesture to his ‘home
town’. It is fair to say, however, that the perceived part played by Mr. Clegg and
other Lib Dem members of the Coalition cabinet in endorsing a series of highly
contentious ‘austerity measures’ had served to generate considerable local anger
and indignation.
To SYP’s great relief and satisfaction, the two days of protest were virtually
trouble-free. A relatively small crowd of 800 protesters gathering on the afternoon
of Friday, 11 March, in anticipation of the arrival of Lib Dem delegates, posed no
real problems for the police. Then, on the following morning, a larger crowd of
2000–3000 people (which subsequently grew in size to around 5000) set off on a
two-mile march through the city before finally assembling on Barker’s Pool, a
pedestrian concourse directly in front of the City Hall. The only noteworthy inci-
dents occurred when 30 members of UK Uncut were ejected from a handful of
stores and the branch of a well-known High Street bank, and when a 24-year-old
man ignited a firework flare and scaled a police protective barrier in what resulted in
the only arrest of the entire event.
Fundamental to the success of SYP’s ‘Operation Obelisk’ was a newly-created
and assigned 15-person Police Liaison Team (PLT), which was centrally
co-ordinated on the day of the event by a remote ‘Silver Command’ team consisting
of the Silver Commander himself and an assistant Negotiator Co-ordinator (a
female colleague of equal rank). This pair worked in close conjunction with a
5-person Social Media Team (SMT), led by a female inspector, whose function was
to monitor and respond to relevant messages appearing on Twitter, Facebook and
the Sheffield Forum blog, and to transmit informative and reassuring messages to
protesters and members of the wider general public (cp. Chaps. 11 and 13).
While immediate overall authority over the PLT was assigned to a Bronze
commander at Chief Inspector level (the ‘PLT Bronze’), during the protest proper
the team was divided up into equal sub-groups of five. The first of these consisted of
four lower-ranking officers (sergeants or police constables) under the direct
supervision of the PLT Bronze, and the remaining two of similar groups of junior
officers, which each reported to a ‘sub-Bronze’ commander of Inspector level. In
addition to each having experience of public order leadership, the PLT Bronze, two
sub-Bronzes and Negotiator Co-ordinator were all highly trained ‘crisis negotia-
tors’. It will soon become apparent that, just as important as the role they played on
the day of the actual rally, was the work carried out by the PLT Bronze and his two
bayerl@rsm.nl
86 D. Waddington
The Flashpoints Model of Public Disorder (e.g., Moran and Waddington 2016;
Waddington 1992, 2007, 2010, 2011a; Waddington et al. 1989) provides a general
framework for explaining those contextual factors and dynamic processes, which
help to determine why it is that disorder breaks out or, alternatively, fails to ignite in
any given instance. It incorporates seven interdependent levels of analysis: struc-
tural, political/ideological, cultural, institutional/organizational, contextual,
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 87
situational and interactional. These levels encompass the broadest societal context
to specific patterns of face-to-face interaction. The fundamental premise of the
model is that public disorder cannot be reduced to a single explanatory variable:
“To understand why a ‘spark’ sets off a ‘fire’ we need to analyse the principles of
combustion. It is not the presence or absence of an individual element which is
important so much as how elements fuse and interact” (Waddington et al. 1989,
p. 167).
The first five levels of analysis are concerned with the ‘setting’ in which the protest
took place. The model’s most macro-social structural level refers to the various
forms of material inequality, inferior life chances and political impotence under-
lying the collective grievances in society, which induce protest activity and have the
potential to bring dissenting groups into conflict with the police. The relevance of
this level to the present study is reflected in the fact that SYP preparations for the
rally were predicated on their existing knowledge that the local standing and
popularity of the Lib Dems (and of the Deputy Prime Minister, Nick Clegg, in
particular) had progressively nosedived since the general election, due to the part
they had played in agreeing to massive cuts in public spending and a raising of
university tuition fees. Each of these measures ran contrary to Lib Dem pre-election
promises and were looked upon as treacherous acts of betrayal in a city, which
provides a home for two major universities and whose economy is disproportion-
ately reliant on public sector employment in comparison to other cities of such size.
The model’s second tier of analysis—the political/ideological level—is con-
cerned with the way in which various forms of political and ideological pressure are
influential in shaping police policy towards those sections of society who may be
harbouring such grievances. Sometimes this pressure is implicit, as on those
occasions when the police feel an almost instinctive professional obligation to resort
to firm—and, if need be, confrontational measures—in defence of politically
symbolic ‘occasions, locations and personalities’, such as government buildings,
national monuments, foreign embassies and royal ceremonials. A classic example is
the fortification mentality surrounding the protection of the Internationally
Protected Persons attending world summit meetings. On other occasions, political
pressure is more overtly exercised—as in the form of direct governmental inter-
vention, or where public opinion is brought to bear by (say) local politicians, the
mass media or local pressure groups. It is possible that such policies will be further
guided, and possibly constrained, by relevant aspects of domestic and international
law or pronouncements or documents issued by legal authorities, also obliging the
police to act in particular ways.
Several such overt and more tacit factors of this nature were in evidence in the
build-up to the Lib Dem rally:
bayerl@rsm.nl
88 D. Waddington
Interviews with senior SYP personnel confirm that the force commitment to
adopting a relatively permissive (i.e., facilitating) approach in their handling of the
protest was further influenced by important institutional/organisational factors.
This level of analysis encapsulates a range of formal structures, systems, rules,
regulations and documentation, concerning such variables as the availability and
nature of public order legislation, the degree of police paramilitarism inherent at
local and national levels, the extent and quality of relevant training regimes and
methods and of police accountability and the nature and pervasiveness of any
policing traditions, philosophies or ‘missions’ embodied at national or local levels
of policing.
It was one such formal mission statement—exhorting all SYP staff to do their
utmost to re-establish and uphold public confidence and trust in the wake of the
force’s controversial handling of the 1984-5 miners’ strike and the 1989
Hillsborough stadium disaster (Waddington 2011b)—which, according to interview
respondents, consolidated their enabling approach towards the protesters. There is
no doubt that the abiding influence of this statement was recently reinforced by the
publication of the ‘Keeping the Peace’ manual, which was signed off by the Chief
Constable of South Yorkshire in his capacity as Head of ACPO Uniformed
Operations Business. The chief officer’s personal endorsement of such a liberal
police doctrine was commonly held to have strengthened the local ethos towards a
tolerant style of public order policing.
Equally liable to affect police attitudes and conduct towards protesters are factors
residing at the cultural level of analysis. Here we are concerned with the ways in
which sections of society make sense of the social world based on shared material
conditions, experiences and position in the social structure. This includes not only
people’s definitions of themselves and others, but also incorporates the rules
informing their attitudes to using violence and recipes of action of relevance to
particular situations. For all their underlying similarities, the particular cultural
outlook, which any group of police officers might harbour is likely to be moderated
according to, among other things, generation or career trajectory or more structural
factors such as their rank, assignment and specialisation.
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 89
It speaks volumes about their cultural orientation that, in choosing what they
considered to be the most appropriately coloured bib to wear over their conven-
tional uniform, the PLT universally opted for a ‘softer’ pale blue tabard with the
objective of making it apparent that they ‘were somewhat different in role and
character to their colleagues’ (ibid.).
The contextual level concerns those dynamic communication processes occur-
ring in the build-up to an event, which can serve to elevate or attenuate any
potential for disorder. Examples of this might include a negative history of inter-
action and/or controversial incidents between the police and a dissenting group or
the arousing effects of rumour, media sensitization or threatening statements by one
or both sides. The possibility of disorder is more likely to be averted due to the
presence of advance liaison and negotiation between police and protest organizers.
The model recognises that, when carried out successfully, this process helps to
generate mutual trust, safeguard against the possibility of police over-preparation
and pave the way for a set of mutually understood ‘ground rules’ designed to
accommodate both parties’ objectives. The absence of such dialogue generally
involves the police having to resort to preliminary intelligence and surveillance
gathering (inevitably varying in terms of accuracy and authenticity) and making
contingency plans based on ‘worst case scenarios’ with the accompanying danger
of creating a self-fulfilling prophesy (see also Chaps. 2–4).
It is in this particular regard that the Police Liaison Team was to play such a
highly significant role. The PLT could count itself particularly fortunate in that they
already enjoyed extremely confiding and cordial relationships with local students’
union officials at both main universities. Moreover, organisers of the SACA
coalition were already well-known to, and respected by, the police, and it came as
no surprise when the protest leaders fulfilled their legal obligation by informing
SYP of their intention to stage a march. This presented ample opportunity for the
PLT Bronze commander and two of the trained negotiators to discuss with student
union and SACA representatives the idea of employing officers in such a way as to
liaise between the crowd and their own public order commanders. The marsh
organisers and student officers were entirely receptive to this proposal and were
equally accepting of the need to erect perimeter fencing around the City Hall.
bayerl@rsm.nl
90 D. Waddington
The PLT clearly strove to accommodate and/or facilitate the type of activities
likely to be engaged in by the various protest groups. One potential sticking point
concerned the fact that at least one protest organiser was eager for the march to set
off from the city’s customary gathering point on Devonshire Green and proceed
along Devonshire Street in keeping with local tradition:
And we said, ‘Well, you can’t because that entrance is going to be where the delegates go
in,’ so what I tried to do was to present it as honestly as possible in terms of: ‘Well, I’m
afraid you can’t really go that way. However, if you look at this route, there are some
distinct advantages to it. The roads are much wider, so the police can keep you safe, and
from a photographer’s and TV camera’s point of view, whenever they take a picture or shot
of you, it’s going to look like there are more people here than there are.’ Also, when they
got to Charter Square, which is raised slightly, the photographers would be able to focus
down on them with their cameras and emphasise the length of the march. The other thing I
discussed with them was that, ‘You’re passing the front of the Town Hall, which is the seat
of local democracy, and then you’re passing into the rear of the designated safe area’ (PLT
Bronze Commander).
This host of significant factors residing at the first five levels of the Flashpoints
Model were pivotal to the creation of a favourable context for the protest, which
was highly conducive to the emergence of beneficial instances of situated inter-
action (Waddington 2013). In order to fully understand this assertion, it is necessary
to dwell on remaining variables at the situational and interactional levels of
analysis.
The situational level draws attention to relevant physical, dynamic and sub-
jective aspects of the spatial location or setting in which the event actually occurs.
Most fundamentally, it might relate to the degree to which a particular location
facilitates accurate police surveillance and therefore improves the police capacity to
intervene with due reasonableness and discrimination. Equally, the presence of
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 91
bayerl@rsm.nl
92 D. Waddington
This brings us on to the final, interactional level, which is concerned, as its name
suggests, with the quality of interaction (whether respectful, co-operative,
provocative or restrained) between the parties involved. This is the level of analysis
where ‘flashpoints’ (precipitants of escalatory conflict) are apt to occur. The model
maintains that consistently fraternising and non-confrontational behaviour by police
officers will induce the type of tolerance and co-operation, which will ensure that,
even where police interventions are necessary, wider conflict will not occur:
The turning point is when one side sees the actions of the other as unreasonable. What is
defined as unreasonable on the day depends on what has gone on before. What is reacted to
violently in one setting, with particular structural, political/ideological, cultural, contextual
and situational features, may evoke a less dramatic response in another (Waddington et al.
1989, p. 166).
The activities of the PLT in the build-up to the demonstration clearly had an
important bearing, insofar as they had endeavoured with the help of the organisers
to propagate a set of ‘ground rules’, extensively communicated before and during
the demonstration, which forbade the mounting of the protective barrier. The
solitary arrest that occurred when the protester lit up a flare and scaled the perimeter
fence was in clear violation of these mutual expectations. Thus, it came as no
surprise when both the resulting arrest and a further police intervention when a
second flare was ignited went unopposed by the crowd. Clearly, these outcomes
were a testament to the rapport established between the crowd and the PLT as well
as the overall perceived legitimacy of the police operation.
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 93
It is debatable to what extent the type of police liaison strategy and tactics employed
by SYP can justifiably be regarded as innovative or seminal. Students of public
order policing will no doubt recall the considerable insights provided by Peter
Waddington’s two-year participant observation study of public order policing in the
Metropolitan Police Service (MPS) (PAJ Waddington 1994, 1998). This study
skilfully highlights the methods employed by senior officers during pre-event
negotiations to ensure that, on the day of any given demonstration, groups of
protesters not only obligingly followed the police’s preferred route of the march,
but invariably did so in a peaceful manner, which caused minimum disruption and
inconvenience to everyday city life.
Such outcomes were typically achieved as part of a process whereby, in the
build-up to a protest, experienced police negotiators would draw upon a repertoire
of ‘communicative ploys’—such as displaying spurious friendship towards
organisers, donating helpful guidance and advice or extending apparently uncon-
ditional favours:
Thus, negotiations are conducted with the amicability and good humor [sic] that would
seem more appropriate to arranging a loan from a bank…Such amicability is not the
product of genuine liking for or agreement with the organizers, the campaigns they rep-
resent, or their cause. It is a studied performance designed to dispel any tension, hostility or
antagonism that the organizer might harbour [sic]. Once negotiation begins, the police
stance is one of proffering help and advice—‘How can we help you?’—‘help you,’ that is,
to ‘do it our way.’ Many organizers are inexperienced and so the police ‘organize it for
them.’ They recommend routes along which to march, provide the telephone numbers of
officials in other organizations that need to be contacted and suggest how difficulties might
be resolved (PAJ Waddington 1998, p.120f).
Waddington further emphasises how, on the day of the march itself, the police
assign only their most trusted and experience commanders and ensure that junior
officers are thoroughly briefed beforehand in terms of the requisite ethos and
objectives. Such commanders deliberately exude an ostentatious bonhomie towards
protest leaders and ceaselessly propagate a friendly and collaborative relationship
with civilian stewards and their marshals. Both they and more senior police
strategists are aware that studied benevolence of this nature is fundamental to police
attempts to engaging protest organisers in a position of ‘mutual responsibility’ for
any problems that might occur.
While pointing out that police public order commanders are sincerely committed
to ‘recognising the unquestioned right’ to protest and would automatically ‘recoil
from the suggestion that they are sometimes deceitful’ (PAJ Waddington 1994,
pp. 102 and 129), Waddington nonetheless recognises that, by virtue of the fact that
demonstrations are generally conducted on police terms, the interests of the pro-
testers are apt to be compromised: “Protest is [thus] emasculated and induced to
conform to the avoidance of trouble. In police argot, protest organisers are ‘had
over’” (PAJ Waddington 1994, p. 198).
bayerl@rsm.nl
94 D. Waddington
As planned for and anticipated, this pre-event liaison gave rise to a mutually
beneficial exchange relationship, on the basis of which SYP received such
high-grade intelligence as to enable them to formulate a very good idea of what to
expect on the day of the demonstration and to reassure themselves that the main
groups of protesters were seeking both to avoid and, indeed, distance themselves
from the type of violence that might prove detrimental to the messages they were
hoping to convey:
We certainly had groups who weren’t that open in their communication and were quite
covert in their ambitions, so there was always that element of the unknown. But overall, we
felt pretty secure from meeting their representatives that we knew just how 80 per cent of
the people wanted the protest to turn out… The brief was to come up with a way to
communicate more effectively with the protest groups… to show that, as a police service,
we’d made a measured approach and been sort of proportionate. If people then chose not to
listen to what we were asking them to do to work together with us in what we were trying to
achieve, then we’d at least have some legitimacy for any more robust police action that
might eventually prove necessary (Negotiator Co-ordinator).
On the actual day of the march, the most senior PLT commander exchanged first
names and phone numbers with any organisers and stewards he had not previously
come into contact with. Considerable effort was then devoted to maintaining an
amicable working relationship for the duration of the event. The above sentiments
and activities are very much in keeping with those described by PAJ Waddington,
insofar as they reflect a sincere commitment to upholding the ‘right to protest’,
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 95
whilst ensuring that the event is conducted strictly in keeping with police
objectives.
Other findings of this study are consistent with those of Swedish academics such
as Holgersson and Knutsson (2011) and Wahlström (2007), who highlight feelings
of animosity and resentment on the part of more conventionally deployed public
order officers towards their counterparts in ‘dialogue policing roles’, based on
perceptions that the latter invariably become over sympathetic towards, and far too
tolerant of, even the most unruly of protesters. In contrast to the view shared not
only by their colleagues in the PLT, but also by their Gold, Silver and Bronze
commanders—that a communication-based ‘dialogue’ approach was best suited to
the objective of ‘facilitating the right to protest’—rank-and-file officers in ‘tradi-
tional’ police support units were highly critical of the “over-appeasing attitudes
being extended to protesters, accused their PLT colleagues of implicit disloyalty,
and objected to being asked to stand around while sections of the public were
allowed to behave in a sometimes unlawful and atrocious manner” (Waddington
2016, p. 41).
Related British studies highlight an enduring reticence within UK police forces
to cede the requisite degrees of operational authority and autonomy to dialogue or
liaison teams resembling those deployed in Sheffield, with the result that such
initiatives have been consistently ineffectual (Gorringe et al. 2012a and b). In the
minority of cases where more latitude has been allowed, most notably in the cases
of the MPS and Sussex constabulary, police liaison methods have contributed
significantly to more effective police decision-making and simplified the task of
defusing potential conflict (Stott et al. 2013).
Even the most ardent proponents of police liaison methods would not regard
their distinctive approach to public order policing as somehow utopian—a panacea
in itself. Rather, they would prefer to look upon their relevant skills as comple-
mentary to more traditional forms of managing protest and disorder. Few if any of
the officers we interviewed would object to the presence of adequately equipped
riot-trained colleagues, available on stand-by; neither would they contest the right
of conventional public order commanders to assume ultimate authority in the
context of political protests. Indeed, PLT officers accept that a large part of their
function is to help establish and constantly remind protesters of the existence of
‘lines in the sand’, which may be used to legitimise and politically justify
uncompromising police interventions (cp. Chaps. 3 and 4).
These final remarks are generally in accordance with the conclusions drawn by
Baker (2014 p. 100) who maintains that liaison-based public order policing typi-
cally “creates the context for a better understanding, a greater chance of negotiated
outcomes, and protester compliance, and enhanced predictability for the parties
involved.” This comment clearly re-emphasises the value of adopting a Community
Policing orientation in the handling of large-scale public protest.
bayerl@rsm.nl
96 D. Waddington
References
bayerl@rsm.nl
7 Police Liaison Approaches to Managing Political Protest … 97
Waddington DP (2013) “A kinder blue”: analysing the police management of the Sheffield anti-
“Lib Dem” protest of March 2011. Policing Soc 23(1):46–64
Waddington DP (2016) From iron fists to “bunches of fives”: a critical reflection on dialogue (or
liaison) approaches to policing political protest. Eur Police Sci Res Bull Spec Conf Ed Number
1:30–43
Waddington DP, Jones K, Critcher C (1989) Flashpoints: studies in public disorder. Routledge,
London
Waddington PAJ (1994) Liberty and order: public order policing in a capital city. UCL Press,
London
Waddington PAJ (1998) Controlling protest in contemporary historical and comparative
perspective. In Della Porta D, Reiter H (eds) Policing protest: the control of mass
demonstrations in western democracies. University of Minnesota Press, Minneapolis MN
Wahlström M (2007) Forestalling violence: police knowledge of interaction with political activists.
Mobilization 12(4):389–402
bayerl@rsm.nl
Chapter 8
Community Policing and Public
Perception: Belgian Expectations
and Images of the Police
Isabel Verwee
8.1 Introduction
I. Verwee (&)
Faculty Law and Criminology, Department of Criminology, Vrije Universiteit Brussel,
Brussels, Belgium
e-mail: Isabel.verwee@vub.ac.be
bayerl@rsm.nl
100 I. Verwee
This chapter presents research results of the expectations and images people
have of the police in Belgium. By means of interviewing 120 citizens of different
ages and living in a rural or urban area, we discovered a kaleidoscope of expec-
tations and meanings.
In the nineties, the Belgian government, like in other countries, became more and
more aware of the importance of the perception of the Belgian public towards the
police. This was enhanced by the lack of trust between the public and the police as a
result of major incidents caused by the compartmentalized way of working of the
former police forces. Although there were specific incidents in the mid-nineties that
lead to the CP police structure, there was already a long debate on CP in Belgium.
As in the USA, the UK and other countries, CP in Belgium is a reaction to the
dominant classic police model that is referred to as bureaucratic, centrally organ-
ised, quick response on law enforcement but low on interaction with the public,
reactive, not preventive, etc.
New ideas were improving the relationship between the police and the public
and implementing a more democratic, participative police model. A wider range of
police tasks became equally important (Van den Broeck and Eliaerts 2002).
In 2001, the Belgian police underwent a fundamental structural reform that
created a new police system. By law, the Belgian Integrated Police is organised on
two levels: the local and federal police. Together they provide CP to the public, in
that they provide basic police services (local police) and specialized police service
(federal police). To guarantee a minimum service to the population, Belgian law
specifies seven basic functions for the local police: Community Policing, respon-
siveness, intervention, victim support, local criminal investigation, traffic and
maintaining public order. Community Policing consists of developing neighbor-
hood relations and maintaining police visibility. This mission is not merely one of
maintaining a physical presence, but also of local dialogue, exchange of ideas and
personal relationships.
The community oriented policing model prefers a police organisation in which a
policy is developed related to the needs of the community (Ponsaers 2001). The
new relationship was characterised as, “the relationship between the police and the
public, although a concern since the formalization of the police function, has taken
on added significance under Community Policing with its emphasis on police-
citizen reciprocity. Community policing seeks to build trust between the police and
the communities and influence the perceptions of citizens” (Frank et al. 2005). The
police wants to adjust her functioning to the interests of the society and all her
communities. That is why it is necessary to gather an insight into the expectations
and needs of the community (Frank et al. 2005; Mastrofski 1998).
This resulted, amongst others, in the creation of the Security Monitor. By means
of this monitor people were questioned on police and security topics. For the first
bayerl@rsm.nl
8 Community Policing and Public Perception: Belgian … 101
time, the public was seen as an important partner in the creation of a new vision on
policing, the community oriented police model. Yet, although opinion surveys were
done, they had some problems like surveying people in a quantitative way, which is
not going in sufficient depth (Verwee 2012). This was one of the reasons our
research preferred a qualitative approach by means of interviewing people in depth
on their expectations, meanings, thoughts, emotions, perceptions, etc. of police.
A thorough literature review of police theory and research with regard to the role of
the police points to a rather narrow perspective, wherein the role is often reduced to
three main aspects. The police and what the police are doing are often reduced to
the force for maintaining order and fighting crime. This is considered as a first
reduction, because the police are involved in a much more complex area of tasks,
for example, social tasks. Punch and Naylor (1973) even talk about a ‘social secret
service’.
By pronouncing the importance of the monopoly of violence, the police are
perceived in a very state-centric way. Using the argument of a power monopoly as a
core element with regards to defining police, however, leads to a second reduction.
The police force is considered as the servant of the state, while research points out
that police mainly meets the demands of the people (e.g., Bittner 1980; Brodeur
2007; Eliaerts et al. 1987; Ericson 1982; Hauge 1979; Lundman 1980; Manning
1978, 1997; Newburn 2005; Reiss 1971; Van Altert and Enhus 2009; Verwee 2009;
Wadman 2009). Hence, the tasks police are doing are mainly asked by citizens
instead of the state (e.g., administrative instances). The reactive character of police
work is very large.
A third reduction can be found in research which was putting police tasks as a
central subject. The question ‘what does the police do?’ became an important
research theme, which made it possible to shift from the normative debates (What
should the police do?) to a more neutral study of daily police practice (What does
the police do?) (Bayley 1994; Bittner 1980; Monjardet 1996). The way police corps
are registering tasks and try to define which kind of mission task A or task B is, is
not uniform. In this way it can be considered as a reduction of the reality
(cp. Chaps. 3–5 for alternative perspectives of CP).
Although the three discussed orientations to study the police role suffer in our
opinion from partiality and reductionism, they have provided important knowledge
for understanding the role of police. In the search to tackle the above mentioned
problems, we started from the definition of the role concept. We found answers in a
sociological perspective defining roles as bundles of expectations (Elchardus 2007).
bayerl@rsm.nl
102 I. Verwee
The research, of which some results are presented in this chapter, can be described
as a qualitative research with an inductive character. The goal of this research is to
explore the expectations people have of the police and to offer an insight into the
meanings people give to the police. This helps to understand the implementation of
Community Policing. The central concepts of expectations and meanings need to be
studied in a very profound way, because of the precarious and multi-layered
character of these concepts. This involves doing in-depth research into expectations,
meanings, images, values, norms, etc. In the literature a number of indicators are
described, which influence citizens’ attitudes towards the police: demographic
characteristics, the contact one had with the police and neighbourhood character-
istics (Schafer et al. 2003). These indicators influenced the decision process of
which kind of people would be interviewed.
A disproportional stratified sample was drawn in a rural and urban area. The
stratum on which was stratified was age. Three age categories were distinguished:
young people (between 16 and 20 years), middle aged people (between 40 and
50 years) and elderly people (between 65 and 75 years). We did not have any other
bayerl@rsm.nl
8 Community Policing and Public Perception: Belgian … 103
information such as language1 or experience with the police in advance. In total 120
people were interviewed in a face-to-face way. Table 8.1 represents the number of
respondents, which were interviewed differentiated in terms of age and living in a
rural or urban area.
The questions asked to respondents were based on a checklist. We asked open
questions (e.g., What do you expect of the police? What does the police mean for you?
Which symbols do you think about?) and closed questions (e.g., Which police tasks are
the most important ones? Do you make a difference between local and federal police?
How do you evaluate the functioning and behaviour of police?) and presented also
some vignettes with daily police practices and photo material with images of the police.
All 120 interviews were typed word by word and integrated in the software pro-
gramme Maxqda 2. This is a qualitative software programme, which makes it possible
to code text parts of the interviews and analyse them in a very accurate way. The
researchers’ analysis is based on coded text and words, perceptions or emotions
expressed by the respondents. This resulted in following research outcome.
1
The letter which selected people received was made up in Dutch, but contained also a small
French and English explanation.
2
A general remark can be made that it is often not very clear if the respondents are talking in terms
of expectations, which they express with regard to themselves or with regard to others.
bayerl@rsm.nl
104 I. Verwee
TASK
EXPECTATION
Control and patrol Crime figh ng Problem solving When I need the
police, they need to
come
Traffic control
Figure 8.1 represents the task-related expectations. Three main tasks are dis-
tinguished: The police need to provide safety, fight crime and solve problems and
react to emergency calls. By means of exploring what the respondents meant by
concepts like safety, criminality, help, control, patrol, information, communication,
etc., Figure 8.1 was created and these levels were differentiated.
The task ‘safety’ consists of four levels. It involves the fact that the police need to
control and patrol, take care of the safety of citizens, inform and communicate and
control traffic. The respondents not only talked about a safety task, but also about the
idea that the police need to fight crime and solve problems. Lastly, a major police task
is responding to emergency calls. This means that the police need to come when
necessary and/or offer help when people are in an emergency situation. Those who
answered that the police need to do their duty are also placed in this category.
Lastly, a clearly pronounced expectation of the respondents was the contact they
want with the police. Many respondents prefer to have more contact with the police.
This contact is often related to concepts like street visibility, the wish for more
control, more patrolling and more communication. A police, which is communi-
cating with the public is considered very important. Mainly elderly people prefer to
have more contact with the police. The reasons for this are threefold. Firstly, they
prefer close contact because they think it is important; this is not necessarily
associated with problems. Secondly, respondents believed that by having good or
close contact with the police, they are better informed about what is happening in
their local area. Thirdly, the respondents hoped that, by means of close contact, the
police would be able to respond more quickly when problems arose.
bayerl@rsm.nl
8 Community Policing and Public Perception: Belgian … 105
Two expectations which were expressed can be explicitly related to the ideas of
Community Policing, namely the task of safety and the wish for more contact with the
police.
A second major research question was related to meanings people give to the police.
By means of presenting pictures representing different situations with police involve-
ment respondents were asked which picture corresponds with their image of the police.
Five pictures3 were presented to each age group: a traffic situation, a public order
situation, an arrest, a water cannon and two police officers who have a friendly talk
in the park. Three of these five pictures were different and adapted to the age group
(for example, the picture of an arrest given to a youngster was representing an arrest
of a youngster). The reason why pictures were adapted to the age group was to
avoid conversations like ‘it is always youngsters who are driving too fast’ by for
example elderly people.
Fig. 8.2 Typical police behaviours according to respondents 16–20 years of age
3
©federal police.
bayerl@rsm.nl
106 I. Verwee
The question was asked which picture does (not) present the image you have of
the police. The images which are closely connected to the youngsters’ ideas of
police are traffic control and arrest shown in Fig. 8.2 (pictures with a green border).
The reason why traffic control was chosen is because youngsters often see and meet
police in a traffic situation. The arrest was chosen, because it corresponds to their
expectations towards the police: youngsters want a more reactive and repressive
police.
Their image does not correspond with a police who is friendly and talks in a
more spontaneous way to people (picture with the red border in Fig. 8.2). They
consider this activity as strange, and some youngsters even talked about ‘a waste of
time’. “They need to catch criminals instead of walking in the park”, was said. The
friendly talk is not representing the model of Community Policing as such, although
the close and good contact between the public and the police is an important factor
of the Community Policing model. This research result suggests that the youngsters
who were interviewed do not want a police, which is investing into the relationship
between the public and the police. The question arises if the ideas of Community
Policing are sufficiently related to what young people want from the police.
Within the age category of 40–50 a lot of respondents indicated the picture of
traffic control as the picture, which is closely connected to their police image
(Fig. 8.3, picture on the top left with green border). The traffic task is dominating
the other tasks as on overall widely present image one has of the police. This can
not only be concluded from the picture question, but also in the open questions
traffic was almost a synonym of the police. In the eight months of participant
observation we did in two local police corps,4 the traffic task was often a part of
discussions amongst police officers and the researcher. Police officers think people
perceive the police as a very negative instance, which is pre-occupied with giving
fines. In the open questions related to the image of the police, there were indeed a
lot of traffic related answers. Though this was not only related to fines; traffic is
more than fines and related to aspects such as traffic accidents, control of papers,
alcohol or drug control, safety of their kids, etc. Besides the traffic picture also the
friendly talk was indicated as an image this age group has of police (Fig. 8.3,
picture on the top right with green border). A very remarkable thing in general is
that more than half of the respondents of all age categories are looking for a
negative aspect in the friendly talk picture. They actually do not expect the police to
be busy with ‘positive’ things. The picture which is not representing the image of
40–50 year olds is the one of the arrest (Fig. 8.3, picture with red border). It can be
related to the gender issue, namely that a woman is arrested. The arrest picture was
the one closely connected to the youngsters’ image. A clear difference is thus found
in how the two age groups perceive the police.
For the age group of 65–75 again the picture of the traffic control is seen as the
picture, which presents the police (Fig. 8.4, picture on the top left with green
border). One of the reasons was that a lot of elderly people have already met a
4
During the preparation of the interviews phase, we observed 8 months in two local police corps.
bayerl@rsm.nl
8 Community Policing and Public Perception: Belgian … 107
Fig. 8.3 Typical police behaviours according to respondents 40–50 years of age
police officer who is busy in traffic: accidents, control, fines, etc. A remarkable
discourse is taking place: on the one hand elderly think there is enough control and
on the other hand they want more control, for example, on youngsters who are
driving too fast. The friendly talk is the second picture which was marked by 13
respondents in this age group (9 of them living in the city) as their image of the
police (Fig. 8.4, picture on the top right with green border). While youngsters say
they never saw this kind of task, elderly participants considered this as a task, which
is often seen and closely connected to their police image and to the expectations
they have of police. Elderly people start to talk about the fact that it was better in
earlier days, when a police officer knew everybody, had a chat, had a coffee, had
some time to talk with people and prevented problems in this way. In general a lot
of the expectations of this age group are related to the wish for more contact
between citizens and the police. This contact-issue is central in the CP model. The
question rises if the CP model is only serving the elderly people? The picture with
red border in Fig. 8.4 was the picture, which did not correspond to the idea of the
police of this age group, i.e., this age category does not prefer a too reactive police.
A remarkable difference is noticeable between respondents living in the city and
those who are living in rural areas. While the people who are living in rural areas
preferred the traffic picture, respondents from the city referred to the friendly talk
picture as their image of the Belgian police. Are police officers more occupied with
traffic in the rural area than in the urban area? Are police inspectors more occupied
with a friendly talk in the city than in the country? Or is it what people do not have,
what they want more of?
bayerl@rsm.nl
108 I. Verwee
Fig. 8.4 Typical police behaviours according to respondents 65–75 years of age
bayerl@rsm.nl
8 Community Policing and Public Perception: Belgian … 109
prefer a police that is fighting crime and consider the police as a traffic service. The
picture of traffic corresponded to the image youngsters, middle age people and
elderly people have of the police, so there was a consensus on the traffic issue
amongst the interviewees. The friendly talk in the park corresponded more with the
idea of people between 40 and 50 year and even more with the image of people
between 65 and 75 years. The friendly talk picture did not at all correspond to the
image youngsters have of the police. Some considered communicating, contacting,
talking, etc. with people as a waste of time. This result is not only based on the
meanings expressed by the interviewees, but corresponds to the contact-related
expectations. This communication and contact issue is important from a CP per-
spective, but does not fit into the idea of the interviewed youngsters. The question
arises, if the CP perspective is adapted to all communities? Besides, it generates
questions for the implementation process of CP: If it is not adapted to the needs of
the community, it will be difficult to implement the CP model.
To make it even more complex, we point out that this kaleidoscopic view is
influenced by many factors: age, gender, rural or urban living area, context, situ-
ation, contact, life stage, meaning of the police, etc. Some expectations and
meanings are expressed, which can switch depending on one of these factors into
another expectation or meaning. This study of expectations and meanings suggests
a complex story which can be influenced by a lot of factors (Verwee 2012). By
means of studying the role from a basic perspective, we want to encourage dis-
cussions and debates in this context.
References
Bayley DH (1994) Police for the future. Oxford University Press, Oxford
Bittner E (1980) The functions of the police in modern society. Oelgeschlager, Gunn and Hain,
Cambridge
Brodeur JP (2007) An encounter with Egon Bittner. Crime, Law and Social Change 48:105–132
Elchardus M (2007) Sociologie, Een inleiding. Pearson Education Benelux, Amsterdam
Eliaerts C, Enhus E, Hendrieckx C (1987) De relatie bevolking—politie. Vrije Universiteit
Brussel, School voor Criminologische Wetenschappen, Brussel
Ericson R (1982) Reproducing order: a study of police patrol work. Oxford University Press,
Toronto
Frank J, Smith BW, Novak KJ (2005) Exploring the basis of citizens’ attitudes toward the police.
Police Q 8(2):206–228
Hauge MR (1979) Attitude à l’égard de la police et de son rôle préventif. Conseil de l’Europe,
Strasbourg
Loader I (1997) Policing and the social: questions of symbolic power. Br J Sociol 48(1):1–18
Lundman R (1980) Police behavior, a sociological perspective. Oxford University Press, Oxford
Manning PK (1978) The police: mandate, strategies and appearances. In: Manning P, Van
Maanen J (eds) Policing: a view from the street. Random House, New York
Manning PK (1997) Police work, the social organisation of policing. Waveland Press, Long Grove
Mastrofski SD (1998) Community policing and police organisation structure. In: Brodeur JP
(ed) How to recognize good policing, problems and issues. Sage, London
bayerl@rsm.nl
110 I. Verwee
Monjardet D (1996) Ce que fait la police: Sociologie de la force publique, Collection Textes a
l’appui, Serie Sociologie, La Découverte, Paris
Newburn T (2005) Policing: key readings. Willan Publishing, Portland
Ponsaers P (2001) De ontwikkeling van community (oriented) policing en de verhouding tot
andere politiemodellen. Handboek Politiediensten 57:21–62
Punch M, Naylor T (1973) The police: a social service. New Society 24(554):358–361
Reiss AJ (1971) The police and the public. Yale University Press, New Haven
Schafer JA, Huebner BM, Bynum TS (2003) Citizen perceptions of police services: race,
neighbourhood context and community policing. Police Q 6(4):440–468
Van Altert K, Enhus E (2009) De twee gezichten van de politie: interventie versus wijkwerking,
In: Verwee I, Hendrickx E, Vlek F (eds) Wat doet de politie? Cahiers Politiestudies, Maklu,
Antwerpen
Van den Broeck T, Eliaerts C (2002) Evaluating community policing. Politeia
Verwee I (2009) Wat doet de politie? Onderzoek naar de dagelijkse politiepraktijk, In: Verwee I,
Hendrickx E, Vlek F (eds) Wat doet de politie? Cahiers Politiestudies, Maklu, Antwerpen
Verwee I (2012) De rol van de politie bekeken door de bril van de burger. Een caleidoscoop van
verwachtingen en betekenissen, Reeks Politiestudies, Maklu, Antwerpen
Wadman RC (2009) Police theory in America: old traditions and new opportunities. Charles C.
Thomas Publisher, Springfield
bayerl@rsm.nl
Chapter 9
Joining Forces for Our Security
in Austrian Community Policing
bayerl@rsm.nl
112 B. Pusca et al.
1
Initiative Gemeinsam Sicher in Eisenstadt vorgestellt, (BMI Website Artikel Nr: 13567), 2016,
http://www.bmi.gv.at/cms/bmi/_news/bmi.aspx?id=3763346E502F54636C514D3D&page=
0&view=1. Accessed 5 July 2016.
2
See Bundesministerium für Inneres, Innen Sicher. Für Sicherheit. Für Österreich. 2013, Wien
(2013).
3
See Sect. 25 Public Security Police Act, „Bundesgesetz über die Organisation der
Sicherheitsverwaltung und die Ausübung der Sicherheitspolizei (Sicherheitspolizeigesetz SPG)
StF: BGBl. Nr. 566/1991 idF BGBl. I Nr. 5/2016 §25“, https://www.ris.bka.gv.at/
GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10005792. Accessed 6 July
2016.
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 113
Community policing was introduced in Austria after international projects had been
evaluated and pertinent expertise had been obtained from countries with experience
in Community Policing such as Canada, Great Britain, Hungary, the Netherlands,
France and the USA. The results of this evaluation were integrated in the findings
made in Austria. In April 2016 a Community Policing pilot project styled ‘Joining
forces for our security in Austria’ was set up and implemented in the following
Austrian regions: Mödling, a populous administrative district, selected urban dis-
tricts in the city of Graz, Schärding, a rural border district, and the provincial capital
of Eisenstadt. In July 2016 the Austrian capital Vienna was included. All of these
regions take part on a voluntary basis. This pilot project has been academically
supervised and evaluated.4
The project was given a legal basis and built around the principles of transparent
information and voluntary participation of civil society in maintaining public
security. The focus is on institutionalizing a dialogue between state and citizens at
local level as far as security in their living environment is concerned, rather than the
state imposing and the citizens resisting. This dialogue involves building confi-
dence and collaborating in finding solutions for local and regional security issues
and is considered a cornerstone of Community Policing in Austria.5
4
See Richtlinie für die Aufgaben, Organisation und Vollziehung des Probebetriebes Gemeinsam
Sicher in Mödling, Schärding, Graz Stadt und Eisenstadt – Bundesministerium für Inneres
Generaldirektion für die öffentliche Sicherheit, Wien (2016), p. 1ff.
5
See Ibid., p. 2ff.
bayerl@rsm.nl
114 B. Pusca et al.
6
See Ibid., p. 1.
7
See Bundesministerium für Inneres, Bericht der Kriminalprävention, 2015, Wien (2016), p. 8.
8
See Richtlinie für die Aufgaben, Organisation und Vollziehung des Probebetriebes Gemeinsam
Sicher in Mödling, Schärding, Graz Stadt und Eisenstadt – Bundesministerium für Inneres
Generaldirektion für die öffentliche Sicherheit, Wien (2016), p. 4ff.
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 115
A core element of the on-going Community Policing project is the creation and
expansion of responsiveness to citizens at grassroots. In addition to tried-and-tested
methods of communication such as meetings, appointments and platforms, social
media like Facebook are used for communication between the police and the
general public, reflecting modern communication behaviour and the modern
self-conception of the police.
In 2010 the Criminal Intelligence Service started using the private network
Facebook, which is a key communication tool of the twenty-first century, especially
for young people. Social media bring added value, because citizens interested in
public security need no longer make great efforts to find pertinent information, but
can retrieve it directly through their Facebook accounts. The only requirement is
that they are registered Facebook friends of the Criminal Intelligence Service.
Facebook had been used previously for prevention purposes, as it facilitates com-
municating with members of the public (see Chaps. 11 and 13).
Within the framework of the project ‘Joining forces for our security in
Austria/Community Policing’ a Facebook profile named ‘Joining forces for our
security in [name of district]’ is created for each participating district, so that each
community police officer can make regional information available for the Facebook
community and thus to the general public.
In June 2013 the Criminal Intelligence Service made available a police app for
the most common smartphone and tablet hardware and operating systems (Apple,
Android, Windows). Initially, it contained the following functions: news, wanted
persons/stolen items, police finder, prevention, reporting, feedback and crime
map. In future, ‘Joining forces for our security in Austria’ will be included in the
app as an additional function. It will provide users with information on Community
Policing activities and contact persons in their region. At a later stage, it is
envisaged to integrate WhatsApp groups as a direct communication gateway
between community police officers and security citizens ensuring smooth time
scheduling and easy information sharing. Furthermore, it is planned to use the video
portal YouTube as a communication and information channel. According to recent
9
See Ibid., p. 1ff.
bayerl@rsm.nl
116 B. Pusca et al.
statistics the uploading of video clips on the YouTube platform has risen from an
average of 48 clips per minute in May 2011 to 400 clips per minute in July 2015.10
This is an increase of more than 670% in five years. Given this five year increase,
there is every reason to expect a further increase in the years to come.
Consequently, short films and video clips will be placed on YouTube, so as to
provide the public with information about Community Policing in general and the
implementation of the strategy in Austria in particular. In addition, information on
Community Policing and crime prevention is available on a dedicated Website.
10
See Upload of videos on YouTube per minute from May 2008 to July 2015 (in hours), (Statista)
(2016), http://de.statista.com/statistik/daten/studie/207321/umfrage/upload-von-videomaterial-bei-
youtube-pro-minute-zeitreihe/, (accessed 6 July 2016).
11
Was bedeutet Bürgerbeteiligung, (Landeszentrale für politische Bildung Baden – Würtenberg)
(2016), http://buergerbeteiligung.lpb-bw.de/begriff.html, (accessed 6 July 2016).
12
See Richtlinie für die Aufgaben, Organisation und Vollziehung der Kriminalprävention–
Bundesministerium für Inneres (GZ.: BMI-EE1500/0017-II/2/a/2005), Wien (2005), p. 4ff.
13
See Sect. 25 Public Security Police Act, “Bundesgesetz über die Organisation der
Sicherheitsverwaltung und die Ausübung der Sicherheitspolizei (Sicherheitspolizeigesetz SPG)”
StF: BGBl. Nr. 566/1991 idF BGBl. I Nr. 5/2016 §25, https://www.ris.bka.gv.at/GeltendeFassung.
wxe?Abfrage=Bundesnormen&Gesetzesnummer=10005792, (accessed 6 July 2016).
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 117
Security citizens are invited to take part in public briefing sessions and to act as
multipliers, passing on the information obtained to other citizens. When security
citizens approach the police with criminal information, the principle of ex-officio
prosecution applies.14
The role of security citizens is not conclusively defined in the directives for the
trial operation ‘Joining forces for our security in Austria’ in Mödling, Schärding,
Graz Stadt and Eisenstadt. However, they clearly stipulate that confusion and
uncertainty among the population and the creation of private patrolling groups are
to be avoided. They state that security citizens are
multipliers who present the security-related concerns of the population to community police
officers and who receive crime prevention information from the community police officers
and the Community Policing coordinators, which they pass on to their fellow citizens on a
voluntary basis and in a targeted way.15
In what follows the different selection procedures for security citizens in the four
trial districts of the project ‘Joining forces for our security in Austria’ are described.
In the few months since the project has started some measures have already been
carried out and successfully completed. One measure for each district will be
described. For our study the single case study was chosen as analysis tool. This
research design is characterized by the fact that a contemporary phenomenon is
investigated in depth, using a real-life social unit, which may be a person, a group,
an organization, a political party or a behavioural pattern and which is observed at a
single point in time or over some delimited period of time (Lamnek 2010). In this
particular instance, the security citizen was chosen as the object of investigation,
because citizen participation is a key element of the Community Policing strategy.
Reports forwarded by the community coordinators to the Austrian Criminal
Intelligence on a monthly basis were used as material for the analysis.
14
See Richtlinie für die Aufgaben, Organisation und Vollziehung des Probebetriebes Gemeinsam
Sicher in Mödling, Schärding, Graz Stadt und Eisenstadt – Bundesministerium für Inneres
Generaldirektion für die öffentliche Sicherheit, Wien 2016, p. 7.
15
Ibid., p. 6.
bayerl@rsm.nl
118 B. Pusca et al.
A successful operative measure that was implemented in the trial district Mödling
are ‘regional security meetings’ attended by the mayor, a member of the local
council, the security councillor, the district police commander and his deputy, the
Community Policing coordinator, the community police officer, the commanders of
the police stations, all active security citizens and local stakeholders. The current
security and crime situation and crime statistics are presented and topical security
problems are addressed. Recent topics were the sociocultural challenges linked to
the sharp rise in the occupancy of the reception centre for refugees located in the
district and the fact that most asylum seekers come from African and Arab countries
and have cultural peculiarities and display special behaviour patterns. The cultural
differences have resulted in an increased feeling of uncertainty among the local
population.
The general objective of the regional security meetings is networking among
local stakeholders. In addition, they are intended to give a realistic picture of the
security and crime situation and the police activities related to it and to rectify any
distorted image created by the media with a view to bring the participants
up-to-date and to reduce fears. When there are specific problems, the participants
are invited to contribute to problem-solving.
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 119
In Eisenstadt a call to become a security citizen was published in the official gazette
of the town and in local printed and broadcast media and was additionally made
during a public information session. Likely candidates were approached directly.
For the actual selection of candidates hearings were conducted and subsequently a
workshop was organized for the future security citizens. Strong emphasis is placed
on the communicative and social skills of the candidates. Selection criteria are
voluntariness, sociableness, reliability and seriousness. Most candidates attached
great importance to having their tasks specified and not to be considered a kind of
‘acting sheriffs’.
Two landholders from Eisenstadt applied to their community police officer and
reported an increasing instance of disturbance of the peace. They alleged that
homeless people were making unauthorized use of a decrepit garden shed on their
land and would steal vegetables from a neighbouring plot of land. A number of
talks between the property owners and the community police officers took place and
revealed that the decrepit garden shed was no longer needed and could be pulled
down. The community police officer also talked to the homeless people, who were
subsequently referred to social institutions. This was a typical Community Policing
approach leading to the restoration of public order and the feeling of safety among
local residents.
In Schärding a two-stage procedure was used for recruiting security citizens: First,
the mayor proposed potential security citizens to the Community Policing coordi-
nator, then the mayor and the Community Policing coordinator jointly conducted
interviews with the candidates and met with them again to collect contact details
(e-mail addresses, mobile phone numbers, etc.) and to define the tasks for the
security citizens in the following months. The mayor often proposes local
bayerl@rsm.nl
120 B. Pusca et al.
government employees, because they are in regular contact with citizens and are
actively involved in community life and enjoy the confidence of the local popu-
lation. In an increasing number of instances civil defence commissioners are
proposed.
Candidates sought clarification of their tasks and roles, expenditure of time and
were afraid to be labelled as police informers or deputy sheriffs. One volunteer was
rejected, because he seemed to have a radical political attitude. Experience has
shown that it is important to involve all those with responsibility when selecting
security citizens and to conduct interviews following a presentation at a briefing
session.
A security citizen contacted his community police officer and informed him of a
road safety problem. At a road intersection the insufficient mounting height of a
traffic mirror had brought about a situation in which visibility was obstructed for
motorists. The informer and the community police officer advised the mayor of the
problem, who immediately arranged for a higher mounting position of the traffic
mirror. This measure resulted in improved visibility at the intersection and thus in
enhanced traffic safety.
In these districts verbal propaganda and word of mouth in social media were used to
present the concept of security citizens to the public, yet no permanent security
citizens were appointed. Instead, they are selected on a case-by-case basis.
Whenever a security concern is reported to the police, an investigation is opened
and the stakeholders are contacted when the concern proves to be a security
problem. Subsequently, they are involved in identifying the cause of the problem
and possible solutions and in implementing measures. From then on the persons
involved are considered security citizens. They include municipal councillors,
county commissioners, members of senior citizens’ associations, residents of large
settlements, educators, school spokesmen, representatives of religious institutions
as well as private company staff and members of the Graz municipal fire brigade.
The following checklist has been drafted for solving problems:
• What is the (alleged) problem?
• What are its causes and impacts?
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 121
Recently, a resident reported to the police that there was a growing number of
unemployed adolescents loitering in his vicinity and approaching passers-by
without reason. Particularly elderly citizens and women felt uncomfortable in this
situation. Community police officers brought the issue forward at a meeting of the
youth network in Graz and discussed possible corrective measures including the
creation of common facilities and employment measures for young people. The
community police officers try to establish a relationship of trust between youth
welfare workers and young citizens to enhance the subjective feeling of safety
among local residents and to exchange different worlds of experience.
The capital Vienna is composed of 23 districts and has more than 14 CID offices
and police commands, five of which take part in the present Community Policing
project. The security citizens are appointed by the county commissioners for each
district, who have proved to be competent and reliable cooperation partners in
public security matters. The security citizens selected are chiefly local government
councillors, but also other citizens. Their tasks are outlined in a decree issued by the
Vienna Police Directorate:
bayerl@rsm.nl
122 B. Pusca et al.
Security citizens act as seismographs for ensuring a general feeling of safety and are
required to report observations, to make suggestions, to provide feedback to the police and
to help solving problems and ensuring safety in their local environment.16
The party spokesmen on public security in the regional parliament are consid-
ered security councillors, because they permanently deal with public security issues
in the city of Vienna.
More than 400,000 people from 170 countries live together in social housing
complexes in Vienna. In 2014 this situation led to increasing neighbourhood
conflicts and a declining feeling of safety there. The housing cooperative contacted
community police officers—then called networking officers—within the Vienna
police. The latter found that the problem could only be solved by a package of
measures: networking with the general public, information sessions, increased
police patrolling, preventive measures and an early warning system for adminis-
trative, criminal and security-related problem areas. Advertisements were placed in
the printed media and on television calling for mutual courtesy and respect for other
cultures and lifestyles. Although the police measures offered were only reluctantly
accepted, a significant, lasting reduction in police operations was recorded (in a
particular residential complex police operations decreased by more than 60%).
The Vienna Police Directorate is conducting a dialogue with a major German
coffee house chain about the organization of regular security sessions in their
branches for interested citizens to exchange and obtain information from local
community police officers and security citizens in matters relating to public security
in the districts.
9.5 Outlook
A broadly positive assessment can be reached from the three months trial operation,
the monthly evaluation reports, numerous personal conversations and project
activities so far, both inside and outside the law enforcement services. Community
Policing has proved to be an added value for both police officers and members of
the public. The joint measures taken have resulted in enhanced mutual acceptance,
legitimacy and understanding for the Community Policing strategy among the
16
Kurzbrief LPD Wien “GEMEINSAM SICHER Aufgaben, Organisation und Vollzug des
Probebetriebs bei der Landespolizeidirektion Wien”, GZ P4/157530/2016 (2016), p. 4.
17
Note: The Vienna Police Directorate is still in the preparation phase for the projects and no op-
erative measures have been taken yet. Therefore, the authors draw on an example outside
the project, where the Community Policing strategy has been partly applied.
bayerl@rsm.nl
9 Joining Forces for Our Security in Austrian Community Policing 123
population and within the police forces. The guiding and coordinating role of the
police makes it a key actor in the field of public security.
From the outset the project was academically supervised and evaluated by stu-
dents from the Wiener Neustadt University. In addition, it is evaluated by the
Project Office within the Austrian Criminal Intelligence Service. The findings will
be incorporated in the planning process for a nationwide implementation of the
project ‘Joining forces for our security/Community Policing’. In fact, based on the
positive experiences it is envisaged to terminate the trial operation in late 2016 and
to incorporate the Community Policing strategy in the police organization in 2017.
The Director of Public security Konrad Kogler has emphasized the commitment to
Community Policing during a ‘Joining forces for our security in Austria’-themed
event as follows:
We would like to see our citizens approach the police with their concerns. The community
police officers will make sure that these concerns are dealt with in cooperation with the
competent bodies and the security citizens.18
References
18
Gemeinsam Sicher in Eisenstadt – Landeshauptstadt Teil des Pilotprojektes des
Innenministeriums, (Eisenstadt Landeshauptstadt) 2016, http://www.eisenstadt.gv.at/home/news/
details/article/gemeinsam-sicher-in-eisenstadt.html, (accessed 7 July 2016).
19
Ibid.
bayerl@rsm.nl
124 B. Pusca et al.
bayerl@rsm.nl
Chapter 10
Security as the Basis Behind Community
Policing: Croatia’s Community Policing
Approach
10.1 Introduction
Security is of vital interest, not only for those dealing with it professionally, but also
for laymen around the world. It covers every aspect of life, and its importance can
be seen in its wide-spread use in daily life and in a range of scientific disciplines.
The need for citizens’ security is shared by all cultures. Security means the range of
measures taken to protect humans and property from danger such as accidents,
disasters or crime, while safety is the state in which someone or something is safe
from danger or harm (Coursen 2014). Security is the process of ensuring our safety,
or more accurately the measures performed to maintain our protection and to
prevent danger, so we can enjoy the feeling of safety. However, the fact is that the
security standard has become the central and fundamental value in society and is
accompanied by political measures, technology, rights and insurance (Čaldarović
2011).
Every society, including Croatia, has its own culture, its specificities and men-
tality, all of which reflects upon the cooperation between the police and citizens. In
democratic societies, security is based on the protection of social values and the
fundamental rights and freedoms of its citizens. Those dealing with the issues of
security—or the lack thereof—agree that it is necessary to consider the broadest
social changes, which are the consequence of the recent globalisation of society. If
security is jeopardised at the global level, it will also be jeopardised to a certain
extent at the local level (Giddens 2007). In 2010, the European Union adopted the
R. Karlović (&)
Croatian Police Academy, Zagreb, Croatia
e-mail: rkarlovic@fkz.hr
I. Sučić
Institute of Social Sciences Ivo Pilar, Zagreb, Croatia
e-mail: Incs.Sucic@pilar.hr
bayerl@rsm.nl
126 R. Karlović and I. Sučić
Internal Security Strategy in Action: Five steps towards a more secure Europe. This
Strategy is based on the values of the European Union and lists all areas that should
be integrated in order to face specific security challenges: law enforcement, justice,
border management and civil protection (EU International Security Strategy in
Action 2010, 2015). However, security is a multi-dimensional construct (Ziegleder
et al. 2011) and also a subjective category, as it is subject to constant change that
implies the feeling of security or the absence of fear or threats to the values of a
society. Social changes, such as the political situation, cultural processes, popula-
tion, migration, other needs and issue of modern society (e.g., alienation in big
cities, anonymity) affect police work. The mechanisms of informal social surveil-
lance are failing and are becoming weaker due to the present day lifestyle and are
even disappearing in large cities (cp. also Chap. 8).
Today’s society is marked as an unsafe society and is characterised by risk (Beck
2004). In the context of personal security, which refers to the creation of conditions
in which people do not suffer threats such as crime, violence or discrimination, the
partnership between police and the community has been recognised. In a survey
conducted by the Special Eurobarometer (2015), a sample of 28,082 respondents
from different social and demographic groups in all EU Member States were
interviewed face-to-face at home in their mother tongue. About nine in ten
respondents stated that they felt the police and the judicial system were chiefly
responsible for ensuring the security of citizens. Data from surveys conducted in
2014, 2015 and 2016 on nationally representative random samples of adults in
Croatia (1,000 in 2014 and 2015; and 750 in 2016) showed that citizens when asked
how much they trust each of the eight institutions army, president, police, UN,
European parliament, legal system, Croatian parliament, government and political
parties have relatively stable levels of trust in police over time, and that they only
trust the army and the president more than police. But since levels of trust of
Croatian citizens in institutions is generally relatively low, they actually neither
trust nor distrust police (Pilar’s barometer of Croatian society 2014, 2015, 2016).
It is possible that such an ambivalent attitude towards the police is more the
consequence of the prior, strictly traditional work of the police in which the police
had a more distant stance towards citizens. Therefore, the concept of Community
Policing, as a modified model of police work, facilitates the return of citizen faith in
the police. The modified role of the police in Croatian society has been based on
cooperation with citizens and creating better conditions for life without fear for
one’s personal safety. Police aim to include citizens, so as to work together to
contribute to designing and implementing prevention measures and activities, to
reduce problems and the crime rate and to create a stronger sense of personal
security among citizens, which in turn improves the overall quality of life of the
community as a whole (see Chaps. 2 and 3). The development of Community
Policing in Croatia together with the most relevant programs is presented in this
chapter.
bayerl@rsm.nl
10 Security as the Basis Behind Community … 127
In Croatia, the police, as part of the Interior Ministry, is traditionally responsible for
public safety, and its tasks above all are the protection of life, rights, liberty and
security of persons, protection of property and protection of public order and peace
(OG 76/09, 92/14). In terms of organisation, the Police Directorate has been
established at the national level and police administrations at the regional level for
the performance of police tasks. Police stations are responsible for citizen security
at the local level and for the resolution of local issues.
The democratisation of Croatian society, in the sense of changes to the political
system from a Socialist regime to a democratic system, began in 1990. The new
democratic Constitution of the Republic of Croatia was adopted in December 1990.
In addition to changes to the political system, the democratisation of society also
implied the establishment of democratic institutions. The basis for this new
approach to the work of police were laid down in 2000 with the new Police Act,
which introduced new provisions defining the cooperation of police with local
government bodies in order to achieve the security of persons and property. The law
also prescribes that police are required to cooperate with other bodies, organisa-
tions, citizens, associations and self-organised citizen groups, in order to develop
cooperation aimed at preventing or detecting illegal behaviour. Therefore, the 2000
Police Act (OG 34/11, 130/12, 89/14, 151/14, 33/15) laid the foundations for the
work of the police in the local environment. These legal provisions gave certain
guidelines for the creation of tighter bonds between the police and society, the local
community or city. Today this is present in Article 8 of the Police Duties and
Powers Act (OG 76/09, 92/14).
The Strategic Plan of the Interior Ministry of the Republic of Croatia, which
encompasses the work of police and other institutions for the purpose of protection
for the period 2014–2018 outlines that the scope of the Interior Ministry and other
institutions in the function of protection comprises tasks of maintaining public order
and security (Strateški plan MUP-a 2016). The Legal Dictionary (2007) defines
public security (Croatian: javna sigurnost, German: öffentliche Sicherheit, French:
sécurité publique) in a narrow sense (state, divided into internal and external) and a
wider sense (situation free of illegal activities and actions that can have a conse-
quence of jeopardizing the fundamental rights and freedoms and fundamental
factors of the public social order) and finally states that pursuant to the Act on the
Organisation and Scope of Central State Administration Bodies and the Police Act
public security affairs imply police duties.
The objectives of the Strategic Plan are to improve the prevention of criminal
behaviour, improve the combatting of crime, increase road safety, strengthen the
security of state borders in air transport and navigation, improve services to citizens
in administrative matters, improve relations in the internal and foreign spheres, etc.,
while the prevention of crime is listed as a specific objective.
The Strategic Plan states that for every society the prevention of criminal
behaviour is more economic than combatting crime or dealing with the
bayerl@rsm.nl
128 R. Karlović and I. Sučić
consequences of criminal behaviour. For this reason, the Croatian police has
increased its proactive principles in its activities. The bodies of the Interior Ministry
responsible for prevention and the bodies of other organisational units are entrusted
with the implementation of the objectives of the Strategic Plan and for the pre-
ventative activities as listed in other strategic national documents of the
Government of the Republic of Croatia that include the Interior Ministry. Therefore,
all organisational units are obliged to focus on the prevention of crime within the
scope of their authorities.
In terms of the organisation, the Crime Prevention Service was established in the
police within the Police Directorate in the year 2010 and is primarily entrusted with
the prevention of crime. This service is in fact a successor of the Community
Policing Strategy that was adopted in 2003 (Cajner Mraović et al. 2003).
Community police officers were introduced to police organizations with the addi-
tion of two positions added to the police work force, i.e., the community police
officer and the police officer for prevention.
The activities by which the Crime Prevention Service plans to strengthen the
prevention of crime in Croatian society include strengthening and improving the
work of the Council for Crime Prevention at the local level, initiating the foun-
dation of new councils within local communities, continuing the implementation of
prevention programmes at the local level, improving the capacity of information
centres for crime prevention, educating police staff with secondary school qualifi-
cations about the content and tactics for crime prevention, adopting the good
practices of other police services in crime prevention, etc. The public order service
within the police administrations lists certain activities for the prevention of crime
and other illegal activities. This includes the monitoring and analysis of objective
safety indicators relating to the security of persons and property, certain subcultural
groups, intensive collection of operative information and accordingly proposing or
taking preventative measures to remove threats.
In the Republic of Croatia, there is no national crime prevention strategy, though
for the purpose of achieving the set goals in the area of public security, there are
national strategies and programmes in which the Ministry of the Interior participates
as the leader or sub-leader in the implementation of measures and activities. Based
on these, the Prevention Department within the General Police Directorate under-
takes prevention activities. There are several such strategies: the National Strategy
to combat domestic violence, National Road Safety Program, National Roma
Inclusion Strategy, National Strategy for the Prevention of Drug Abuse, National
Strategy to Combat Human Trafficking and others (MUP RH 2016).
A decade after the adoption of the document ‘Community Policing Strategy’, the
Police Directorate adopted the Guidelines for Crime Prevention. These guidelines
describe the premises for crime prevention, the leaders in crime prevention in the
police, cooperation with external partners at the national and international level, etc.
It should also be stressed that the Croatian police is centralised in terms of its
organisation, meaning that organisational units for prevention in police adminis-
trations must request the consent or opinion of the Prevention Service of the Police
Directorate for all prevention activities that include work with the media, for the
bayerl@rsm.nl
10 Security as the Basis Behind Community … 129
Fig. 10.1 The concept map of the Croatian community policing approach
bayerl@rsm.nl
130 R. Karlović and I. Sučić
interaction with citizens and to facilitate police work (reducing the amount of time
police officers spend doing paperwork). An example of these new technologies is an
application called the e-reporting application (webmup 2015). In general, for dif-
ferent countries and organisations it makes sense to include technological advances
into the community in form of Community Policing applications to enhance and
strengthen bonds between the police and communities, because in the community
most individuals will have a smartphone (James et al. 2016).
The functional level of the Croatian Community Policing approach is seen in the
fact that Community Policing consists not solely of contact police officers and
prevention officers, but that it is an overall modification of the traditional model of
the Croatian police into the model of Community Policing. In other words, the
relationships result in changes in the organisational culture and the individual
conduct within the organisation. Community policing is a contemporary method of
performing police duties, and it is a demanding method. The work model for
community policy propagates the proactive work of the police and the community.
In the relationship between proactive and preventative, the proactive is a form of
preventative action that aims to minimise the appearance of the fundamental risk
factors for criminal behaviour.
The range of proactive action in crime potential is very broad: from various
educational activities for children and youth to various projects directed at
empowering children and youth in order to prevent their readiness for criminal
conduct to participating in urban planning and creating urban infrastructure and
architecture (Karlović 2012). This is perhaps the reason why some police officers at
all levels continue to feel uncomfortable with and show resistance against the
further development of Community Policing. It is possible that they are bothered by
the idea of ‘community police’, since at a superficial level it may have an associ-
ation of police that deal with exclusively non-police tasks and are more involved in
the work areas of other services.
However, cooperation with the community and mutual trust based on integra-
tion, responsibility and partnership is necessary, because otherwise citizens will not
provide information to the police. In today’s technologically advanced society
information is a key instrument in police work. For example, the most offending
criminal acts (murder, rape, assault, burglary) are rarely discovered by police
patrols. Police spend the majority of their time in passive patrolling and responding
to emergency calls. A rapid appearance at the scene after a call does not signifi-
cantly raise citizen satisfaction, as citizens expect the police to, above all, prevent
crime and then to arrest offenders. The perpetrators of criminal acts are most often
revealed when and if police receive useful information from witnesses who have
observed an important detail. If the police do not receive such information, there is
only a 1:10 likelihood of discovering the perpetrator. Therefore, the police must
bayerl@rsm.nl
10 Security as the Basis Behind Community … 131
improve relations with residents, victims and witnesses in order to obtain infor-
mation and to be able to better prevent crime (Palmiotto 2000).
In the context of implementing Community Policing in Croatia, in cooperation
between the police force of the Federal Republic of Germany and the Istrian Police
Administration in Croatia, the typical tasks of Community Policing were described
in detail. These include: contact with citizens, resolving local issues, monitoring the
state and trends of crime, providing assistance to victims of criminal acts, emer-
gency situations, etc. Another important point discussed regards the fundamental
conditions for performing these tasks, which are: constancy of contact, support of
superiors, motivational contact of police and the support of the local community
(Borovec et al. 2013). Of course, all local centres have their specificities and
problems, and police officers are required to modify their work accordingly.
As the most important resource in the implementation of the Community
Policing strategy, police officers are mostly responsible for the success they
achieve. In other words, the competency and selection of police officers is of critical
importance, not only in the explanation of Community Policing in these three
dimensions, but also for the protection of other police officers and for the purpose of
protecting the communities they serve (Coutts 1990). Orlović (2013) stresses that
supervisors, in the context of managerial functions, have standards at their disposal
as instruments that can act on the motivation of the employees within the Croatian
police.
The partnership dimension implies the development of mutual relations among all
interested parties: the police, government institutions and citizens and cooperation
at the international level (IPA HR 2008 IB JH 04 TL 2013). Different authors stress
that there is no unified definition of community policy, though there are some
definitions that are commonly used (cp. Chap. 4). In the Community Policing
Strategy, the Croatian experts refer to the definition of Trojanowicz and
Bucqueroux (1990): “Community policing is a new strategy of the police action
based on the idea that the police officers and community members work together,
and they use different innovative ways to solve ongoing problems at the local
community level in connection with crime, fear of crime and other different social
deviations. Achieving these goals requires from the police the development of new
relationship with law abiding citizens, in which they will get the opportunity to
define priorities and to include themselves in different activities in order to improve
the quality of life in their neighbourhood. So, the Community Policing moves the
focus of the police work from reacting to incidents to proactively solving the
problems” (cited in Cajner Mraović et al. 2003).
The new work model for uniformed police officers has been implemented in all
20 police administrations with about 700 community police officers in the field and
some 60 police officers working on prevention. As part of the project ‘Organising
bayerl@rsm.nl
132 R. Karlović and I. Sučić
prevention in the local community’ 225 Prevention Councils have been established
in Croatia, of which 114 councils were formed at the city or county level and 111 at
the municipality or neighbourhood level (Buchheit and Karlović 2015).
bayerl@rsm.nl
10 Security as the Basis Behind Community … 133
As a new European Union Member State since 2013, Croatia has become an
active and equal member of EUCPN. As such it is worth mentioning several of the
projects that have been implemented, particularly those for which the Croatian
police won awards from the European Crime Prevention Network.
The project started in 2007 and is ongoing.‘Less Arms, Less Tragedies’ is a national
prevention campaign initially carried out in collaboration with the UNDP and now
implemented in cooperation with local and regional governments and relevant
entities.
It is conducted throughout the territory of the Republic of Croatia, especially in
areas where there is a certain risk of unexploded explosive devices. The project also
aims to raise awareness of the dangers of improper handling of weapons, mines and
explosive devices.
The aim of the campaign is to encourage citizens to voluntarily hand over any
weapons they have in their possession. During its implementation, over 50,000
pieces of different types of weapons and explosive devices were collected from
citizens in a one-year period. With education carried out by police officers for
prevention in cooperation with police officers from the Bomb disposal department,
organized in certain areas in the Republic of Croatia, the project aimed to raise
awareness among citizens, especially parents and children, of the potential dangers
of mines and explosive devices left behind in their surroundings.
The campaign message is that illegal weapons endanger human lives, leave
lasting consequences and represent a potential tragedy that could happen to anyone,
especially children. An educational comic book was created for children and a
number of public events were held to introduce these risks and procedures to take if
such a weapon was encountered.
It should be emphasized that one of the EU’s strategic priorities is ‘Reducing the
risk of firearms, including combatting illegal arms trafficking’, which is precisely
the goal of this campaign. Meanwhile, the project contributes to the fulfilment of
policy measures on the EU scene in this area as follows: ‘Strengthening prevention
by building awareness, collaboration and sharing best practices and knowledge
between all interested entities.’ More specifically, since the launch of the campaign
in September 2007 until 31 December 2015, the following amounts of weapons
were collected:
• 3681.32 kg of explosives
• 10,385 pieces of firearms (rifles and short-barrelled weapons)
• 95,534 pieces of various explosive devices
• 4,340,820 pieces of ammunition of different calibre
bayerl@rsm.nl
134 R. Karlović and I. Sučić
The national prevention project ‘Healthy for 5’ was launched in 2012, and since
2013 it has been implemented in partnership with the Ministry of Science,
Education and Sports, the Ministry of Health (Croatian National Institute of Public
Health) and the Ministry of Environment and Nature Protection. The project is
designed and adapted for children and youth aged 14–16 years. Its goal is to
prevent addition to alcohol, drugs and gambling and to raise awareness of the
importance of environmental protection and nature with the promotion of healthy
lifestyles.
The police, doctors and teachers are working together to implement the project
activities in all educational institutions across the Republic of Croatia with edu-
cational lectures and interactive workshops with students aged 14–16 years. In
addition to education, children are participating in public events designed to raise
awareness on the preservation of the health and safety of ourselves and others. To
date, 70,000 students have taken part in the project, and the joint national survey
has been conducted among students about their habits and attitudes regarding the
harmful effects of alcohol, drugs and gambling.
bayerl@rsm.nl
10 Security as the Basis Behind Community … 135
10.3.4 ‘Together’
The project started in October 2013 and is ongoing. The Ministry of Interior in
cooperation with other competent government bodies, institutions and NGOs is
strongly focused on the establishment of an efficient national referral mechanism of
prevention and repression of trafficking of human beings (THB) as a part of
organized crime. Coordinated, proper and targeted education, awareness raising and
systematic prevention are the crucial and most efficient instruments in resolving this
issue, which are incorporated within the preventive project ‘Together’. It combines
numerous relevant expert institutions, NGOs and the private sector, which con-
tribute jointly within the scope of their competences to achieve the planned
objectives.
The project activities and target groups are, in accordance with the character-
istics of each county (defined as critical points with respect to THB recruitment,
transit and/or exploitation), determined for each police administration separately
through 20 components containing different preventive measures and are always
accompanied by the application of four key modules:
• Module 1: Police officers should be proactive
• Module 2: Together in the community
• Module 3: Knowledge is power
• Module 4: Don’t be passive
The primary objective of this project was to connect the key components of
society and to motivate them to act jointly to prevent THB through a
multi-disciplinary and alternative approach, alongside developed cooperative and
targeted initiatives and the systematic activity of all relevant participants. Secondary
objectives encompass striking the dark number in terms of ensuring a timely
reaction of responsible institutions, NGOs and the private sector, thus having real
insight into the actual situation and types of crime, elimination of potential critical
points, motivation of passive individuals and social subjects to react to socially
unacceptable behaviour and empowerment of potential victims in terms of
enhancing their self-protection.
The evaluation of the project showed that the project and its activities were well
received with positive results. Of particular note is the evaluation that was con-
ducted among the adolescent population aimed at determining the position of
secondary school students on the role of the police in daily life and in the pre-
vention programmes the Zagreb Police Administration implemented in conjunction
with the City of Zagreb in primary and secondary schools in the city. Among the
population of first grade students in Zagreb’s secondary schools (n 11,200), a
sample of 1705 young men and women participated in the survey. In general, the
position of students on the role of the police was very positive. A large majority
(78%) mostly or completely agreed with the claim that “The police help to prevent
crime”, 71% agreed with the statement “The police is an important part of society”
and 73% with the statement “The police protect citizens.” A similarly high
bayerl@rsm.nl
136 R. Karlović and I. Sučić
percentage (60%) stated that they believe that “A community police officer would
really do something if approached with a problem.” However, only 46% of the
students surveyed mostly or completely agreed with the statement that “Community
police officers are important in my neighbourhood.” It can be observed that the
youths feel that community police officers have a role and would do something to
help if approached with a problem, but that a significantly smaller number considers
community police officers to be an important and useful part of their own neigh-
bourhood (Razum et al. 2015).
10.3.5 ‘Tours’
10.4 Conclusions
The objective of this chapter was to provide an overview of key changes in the
work of the Croatian police after the implementation of the Community Policing
Strategy. Security is the reason for the existence of the police, and security is the
state that all societies strive for and an essential need for all individuals with the
exception of those who place other priorities before their own security. Reforms to
police work in the Republic of Croatia began after the transformation of the political
system from a Socialist region into a democratic system. In order to resolve the poor
characteristics of the pseudo-military model of the former police system, which was
marked by a large distance between police and citizens, the experts in the Croatian
police developed the Community Policing strategy, which has since become an
official document.
The concept of Community Policing was primarily developed in democratic
environments, and the introduction of this model into the Croatian system, still a
young democracy, has truly proven to be an ongoing process. Community policing,
as a modified model of police work in comparison to the traditional model, differs
bayerl@rsm.nl
10 Security as the Basis Behind Community … 137
References
Beck U (2004) Moć protiv moći u doba globalizacije. Školska knjiga, Zagreb
Borovec K, Ezgeta I, Oršulić M, Kirin B, Veber S, Balgač I (2013) Policijski rad okrenut zajednici.
Grafocentar d.o.o, Sesvete, Zagreb
Buchheit F, Karlovic R (2015) Prevention connects! The twinning-light Project “Strengthening
Capacities of the Ministry of Interior for Crime Prevention” (Croatia—Baden—Württemberg.
In: Coester M, Marks E (eds) International Perspectives of Crime Prevention 7. Forum Verlag
Godesberg GmbH, Mönchengladbach, pp 135–145
Cajner Mraović I, Faber V, Volarević G (2003) Strategija djelovanja policija u zajednici.
MUP RH, Zagreb
Čaldarović O (2011) Urbano društvo na početku 21.stoljeća: osnovni sociološki procesi i dileme.
Jesenski i Turk, Zagreb
Council Decision 2009/902/JHA of 30 November 2009 http://eur-lex.europa.eu/legal-content/EN/
TXT/?uri=URISERV%3Ajl0033
Council Decision of 28 May 2001 setting up a European crime prevention network
(2001/427/JHA). Available at http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%
3Al33133
Coursen S (2014) Safety versus security: Understanding the Difference May Soon Save Lives.
Available at https://www.linkedin.com/pulse/20140831152519-11537006-understanding-the-
difference-may-soon-save-lives-safety-vs-security
Coutts LM (1990) Police hiring and promotion: methods and outcomes. Can Police Coll J 14
(2):98–121
EU International Security Strategy in Action: Five steps towards a more secure Europe (2010,
2015). Available at http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=URISERV%3Ajl0050
EUCPN (2016). Available at http://eucpn.org/search/knowledge-center/CRIME%20PRIORITIES
bayerl@rsm.nl
138 R. Karlović and I. Sučić
bayerl@rsm.nl
Chapter 11
Community Policing Case Studies:
Proposing a Social Media Approach
11.1 Introduction
Community policing (CP) is not a general and coherent model, but rather an
ambiguous concept, not adequately defined and open to multiple interpretations.
The lack of clarity has led to a marked diversity in its application in different
contexts and has contributed to misunderstandings, frustrations and confusion in the
implementation of CP reforms (cp. Chaps. 4 and 5). From one perspective CP is a
strategy of the police, which facilitates intelligence gathering; from another, it is a
philosophy, which is based upon accountability and public participation in the
setting of policing agendas. Whilst the former perspective focuses upon increasing
the productivity of existing institutions, the latter necessitates a fundamental
transformation of governance provision where communities have a normative voice
in how they are policed. Both perspectives will be studied with a number of selected
case studies.
A case study is defined as “a process or record of research into the development
of a particular person, group, or situation over a period of time”1 and is recognised
as a research tool in community based problems (Johnson 2006). As a method it
enables researchers to closely examine data related to the CP context. In most cases,
1
http://www.oxforddictionaries.com/definition/english/case-study.
bayerl@rsm.nl
140 G. Leventakis et al.
a case study method selects a small geographical area or a very limited number of
individuals as the subjects of study. Yin (1984) defines the case study research
method “as an empirical inquiry that investigates a contemporary phenomenon
within its real-life context; when the boundaries between phenomenon and context
are not clearly evident; and in which multiple sources of evidence are used” (p. 23).
The examination and documentation of each test case is based on work com-
pleted as part of the INSPEC2T research project.2 Data was collected through desk
research of documents, online surveys aiming to capture citizens, academia, police
practitioners and their trainers’ views, focus group discussions, reports and other
available written materials and through follow up meetings and interviews with
members of an external advisory board made up of experts in CP topics like police
practitioners, CP visionaries, criminologists and neighbour watch associations. The
external advisory members are currently involved with CP practises and have a
sound concern in ethical, legal, societal and data privacy topics sourced from the
application of different CP approaches.
11.2 Methodology
The eight case studies in this chapter will look at existing CP implementations for
different CP approaches and for a variety of residential environments. The purpose
is to extract valuable knowledge from the study of real life CP implementations and
understand the conditions of why and how a CP project was/was not successful and
how it met the intended outcomes. Central to this will be an understanding of how
the various actors involved in a CP project define its success and how their different
interests intersect and produce a change process.
Wherever possible, the most diverse examples of CP implementations will be
selected for investigation in order to highlight the variety of practices. The case
studies will be situated within the broader policing context of the country. Specific
focus is important in allowing researchers to examine in depth the political, societal,
economical and other underlying factors of why community–police relations are
formed the way they are and what is required from national/local governments,
police and communities to improve those relations. Specifically, for a small number
of case studies an overview of the following (where data are available) will be
attempted:
• How are community–police relations defined?
• What are the objectives of the various actors involved in a CP program?
• What does the Community Policing practice/initiative look like/involve?
• What is the effect of the Community Policing practice?
2
http://www.inspec2t-project.eu.
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 141
The Belgium West Coast case study was selected as a good example to showcase
that implementing a successful and recognised CP methodology is not enough. The
special context is affecting the implementation and its success. A well performing
CP initiative was adapted and enriched with nodal orientation. Although the case
study was successful, it outlines a number of ethical, societal, legal and data pro-
tection issues that should be addressed.
Next, three pre-reform case studies from Scotland CP projects are presented to
highlight a number of concerns arising from CP initiatives. The subsequent case
study from Netherlands showed similarities with the case studies from Scotland
regarding the CP officer’s role, responsibilities and overlapping duties with front
line policing officers. However, the case study in the Netherlands presents a
policing transformation and an approach to overcome the aforementioned restric-
tions. Next in sequence are two case studies from England. The case study from the
Manchester police in the UK is about the successful implementation of a com-
munity based strategy. The case study presents the results of an ambitious program
to restore the feeling of safety and increase the security in a dense urban area. The
case study from Lancashire constabulary, UK which in 2015 was rated as ‘out-
standing for CP’, is focused on the use of social media in a modern Community
Policing program.
The final case study presents an EU-funded research initiative for a next gen-
eration and social media based Community Policing project.
The first case study is focused on CP impacts resulting from the Schengen agree-
ment. The reduction and removal of barriers between national borders in order to
facilitate the flow of goods, capital, services and labour has demographic impacts.
This case study examines the seasonal variation of population and how it affects the
CP program.
Belgian police during the 1998–2001 reforms decided to adopt the UK and the
Dutch Community Policing model. CP demands that police departments reform
their relationship with local communities and that police officers change their
attitudes and behaviours toward citizens and police work (Law Library, n.d.). In this
respect, the West-Coast Police Department (WCPD) has implemented a CP pro-
gram, which has proven successful. The police department’s jurisdiction spans
across three municipalities and serves a population of 44,000 residents. The
majority of them are senior citizens (60% of the population is older than 55 years).
Given the location of the area (the border with France is located 20 km away)
during the summer months hundreds of thousands of tourists visit the area on a
daily basis to enjoy themselves. Furthermore, the area also serves as a transit zone,
bayerl@rsm.nl
142 G. Leventakis et al.
as the motorway A18 is part of the European route E40 that connects Northern
Europe with the United Kingdom via the tunnel in Calais, France. Therefore, there
is a seasonal variation of the community population, mainly in the summer months,
with the number of visitors outnumbering the local population.
The fact that the local community is dependent upon tourism makes it extremely
important to effectively combat safety and security issues with a recognised CP
program. For a uniform type of population the CP model works properly, as the
local community is enjoying their life in a nice and tranquil environment. However,
on a seasonal basis, when the number of seasonal residents outnumbers the local
community, the results of the CP program are questioned. Frequently both the
criminals and victims are only visiting the area for a limited time (often a few
hours); therefore it becomes extremely difficult to proactively address safety and
security issues effectively. For example, consider the theft of a purse of a tourist by
a hit-and-run criminal who is most likely commuting across the Schengen area. If
both the perpetrator and the victim do not linger at the crime scene, it becomes
extremely difficult to prevent or even solve this crime.
To overcome the underperformance of a well-known to work CP model, the
WCPD decided to compliment and enrich their activities with the introduction of
Nodal Orientation Policing (van Sluis et al. 2010). Nodal orientation offers
awareness of the incoming and outgoing citizens and vehicles and information
about their movement within a monitoring area. The nodal orientation introduced at
WCPD consists of the following steps: (1) monitor flow of vehicles, (2) identify
vehicles of potential criminals, (3) evaluate information and (4) take appropriate
action (Acknowledge—Do not take action, Intercept, Monitor).
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 143
5. There is a number of Data Privacy, Ethical and Societal issues that need to be
addressed on the local, regional and continental level considering the possibil-
ities of misuses of such a system to minimise the possibility of evolving into a
police state. However, if closely monitored, this can be detected at an early
stage, so that corrective action can be taken.
Over the last decade, developments in Scotland have brought CP to the forefront of
the government and policing discourse. The Public Reassurance Strategy (ACPOS,
2007) had considerable influence on the direction taken both by individual Scottish
forces and national policies. The Scottish Parliament Justice Committee report
(2008) on its inquiry into CP in Scotland set out3 how CP could be improved and,
in light of the Committee’s view that the majority of the eight forces did not have
clear CP strategies, made more consistent across Scotland. The publication of the
Scottish Community Policing Engagement Principles4 aimed to establish this level
of consistency and called for each police force to produce its own Community
Policing engagement standard based around the seven principles listed below:
1. Being visible, accessible, present and readily identifiable in the community and
discrete when that is appropriate
2. Communicating as widely as possible using all appropriate means
3. Consulting, listening and responding
4. Recognising individual needs and prioritising support to those groups of people
most vulnerable to harm
5. Working closely with other public and voluntary services and businesses to
encourage people to take responsibility for their actions and how they affect
others
6. Being involved in a problem solving approach to local crime issues and
accountable to communities for local policing
7. Working in partnership with other public and voluntary services and businesses
on the ground to make people feel safer.
These principles appeared to generate a significant amount of re-organization of
CP activity around Scotland and an expansion in the number of officers involved in
CP.
3
http://www.sipr.ac.uk/downloads/Research_Summaries/Research_Summary_18.pdf.
4
Scottish Government, 2009. http://www.gov.scot/Resource/Doc/254432/0081965.pdf.
bayerl@rsm.nl
144 G. Leventakis et al.
11.3.2.2 Grampian
11.3.2.3 Strathclyde
There was a combination of roles and duties within all the case studies’ police
departments. Where local policing was delivered by separate response and CP
teams, there was a lack of understanding of the community role. As a result, police
forces failed to cooperate internally and approach the local community. Another
source of conflict was the time spent on foot patrolling between the operational and
CP officers. In conjunction with the coexistence of operational and CP officers in
the force, the conflict extended to the use of vehicle over foot patrol. A number of
factors such as tenure, staffing levels and time spent on paperwork were seen to
constrain local policing activity. No CP training was offered to assigned police
officers, nor were CP training requirements defined.
In all case studies, police officers conveyed different inputs about the community
expectation from a CP program. Moreover, there was no indication that the
effectiveness or the achieved results of the CP program were communicated to
participants (CP officers and residents).
Policing within local communities has again become a central focus of attention
in the new single force. These case-studies demonstrate that there is much good
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 145
practice on which Police Scotland can build. However, the constraints imposed by
the need for cost reduction and the tendency towards standardization of policing
styles generated by national strategies pose significant challenges in this crucial area
of police work.
As seen in the previous case studies, there are different policing structures with
respect to the integration of the role of CP officers. In many police departments CP
officers are part of the basic unit, while in others they operate as rather isolated
individuals or as part of a neighbourhood team. Another common difference is that
in a number of police departments, community officers only perform specific CP
tasks, while in others their job includes front line policing tasks like criminal
investigations and emergency assistance.
Over the years, the image of the CP model in the Netherlands (van Sluis et al.
2013) has changed substantially. The new vision of CP was articulated in the
strategy document called the Police in Evolution5 (PIE). According to PIE, CP
officers not only have to act as sources of information for criminal investigations,
but they have an important ‘signalling and advice’ function in that they are
responsible for providing administrative authorities with information and early
warnings about significant societal trends, emerging problems, signs of terrorism
and radicalization. Moreover, CP officers frequently deal with social disorder
caused by youths, road safety issues and petty crime. The CP officers are now seen
more as police officers and not as social workers. They contribute to law and crime
investigations by taking on criminal investigations, enforcement and emergency
services as well as by working on prevention and problem solving. Furthermore,
intelligence-led policing has been incorporated in the CP officers’ duties.
The latter of the new CP assignments (intelligence-led policing) comes into
conflict with their mandate to solve problems by cooperating with representatives of
the community. Their role as law enforcers means that they are obliged to pass
privileged and sensitive information to other police departments for purposes often
outside of why it was provided to them. Community officers often report that this
dual role harms the relations they have developed in their neighbourhoods.
Furthermore, CP officers experience disappointment when they have to penalizing
the residential areas there are engaged in.6
Another topic, which required corrective actions is the ratio of time spent on CP
activities over the non-CP related police work. The PIE planned that CP officers
should spent approximately one fifth of their time on tasks related to neighbourhood
5
Retrieved from http://hdl.handle.net/1765/50960.
6
International Police Executive Symposium, Geneva Centre for the Democratic Control of Armed
Forces, Working Paper no 25.
bayerl@rsm.nl
146 G. Leventakis et al.
policing. It has emerged that CP officers are one third of their shift hours (32%)
occupied on duties related to emergency response, surveillance and other front
policing tasks. Therefore, efforts planned and allocated to CP duties including
administrative tasks like maintaining contact through email or writing a weblog to
keep in contact with their neighbourhood is allocated to non-CP related activities
(see Chap. 13 for other examples in the context of Netherlands).
CP officers should have a good understanding of the concrete results they want to
achieve and perform their duties accordingly. This is required to set realistic
expectations and demands from their partners and the public. To this end, detailed
information about what is going on in communities is crucial. This is especially so
in efforts to fight radicalization and terrorism (cp. Chap. 6). CP officers are the first
link in the safety chain because they have ample access to community intelligence,
and it is through them that CP can effectively be combined with front line policing.
Special crime investigation units were assembled in most police districts in order to
improve the current level of collaboration and exchange of information between
front line police and CP officers as well as to deal with all kinds of petty crime. This
approach integrates better criminal investigations with CP.
There are some specific demarcations between the roles of the community officer
and specialists. As a rule, neighbourhood teams only deal with criminal offenses
that do not require imprisonment (so-called 6-h cases); however, CP officers also
serve as experts in community affairs during criminal investigations. Despite these
initiatives, only 12% (instead of 20%) of the CP officers’ time continues to be spend
on criminal investigations.
Manchester’s reputation as a tolerant and welcoming place for new arrivals results
in its growing population from 423,000 in 2001 to 518,000 in 2014. Although, this
is an indicator of the city’s development it brings additional challenges such as the
increasing pressure on school places and an enlarged demand for community ser-
vices. Furthermore, tensions can develop in communities that undergo rapid
demographic change, and these must be effectively managed. The city’s growing
population is also becoming younger, with a major increase in the number of
working-age residents.
The Manchester’s Community Safety Partnership (CSP) brings together the local
Council, Greater Manchester Police, Offender Management Services, GM Fire and
Rescue Service, Public Health Manchester, the universities, housing providers and
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 147
community and voluntary organisations. Collectively, the agencies of the CSP work
with one overriding objective—to make Manchester a safe place to live, work and
visit (Manchester City Council 2014). When Manchester city council produced
their first community safety strategy back in 1999, they managed to reduce crime by
45%, with the total number of crimes falling from 94,829 in 1998/99 to 51,828 in
2013/14. The new CSP strategy (Communities and Equalities Scrutiny Committee
2016) is focused on the following eight strategic objectives:
1. Tackling anti-social behaviour (ASBO)7
2. Tackling alcohol and drug related crime
3. Changing offender behaviour
4. Protecting vulnerable people
5. Tackling serious and organised crime
6. Tackling the crimes of highest impact
7. Tackling hidden crime
8. Making the city centre safer.
The CSP worked closely with the Ministry of Justice to develop a toolkit and set of
principles around neighbourhood justice panels. These panels aim to address
low-level offending behaviours and bring together the victim and offender of certain
crimes to agree a remedy to repair harm caused. Local vulnerability panels were
also established to prioritise and respond to cases that cause the most harm to
vulnerable people. The aim of the panels is to support victims and bring perpe-
trators to account, thereby increasing resilience and confidence in neighbourhoods.
Lastly, there is a strong emphasis on encouraging people to resolve differences and
conflicts through communication and mediation, rather than relying on public
agencies to intervene in minor disputes.
Violent crimes such as assault and domestic violence and abuse often involve
alcohol. Drug misuse and crimes such as burglary and robbery are closely linked,
and ASBO can also be related to alcohol and drug misuse. The CSP will develop
and implement the Local Alcohol Action Area (LAAA) program and ensure that the
LAAA supports the most effective services.
Reducing the number of offenders and the number of offences they commit
remains a significant priority and a significant challenge. This work stream is led by
three organisations: Manchester Youth Justice, the National Probation Service
(NPS) and the Cheshire & Greater Manchester Community Rehabilitation
Company (CRC). Collectively these three organisations are responsible for:
(1) reducing the harm caused to victims, offenders’ families and the wider com-
munity, (2) reducing re-offending amongst offenders, (3) ensuring that initiatives
7
https://www.gov.uk/asbo.
bayerl@rsm.nl
148 G. Leventakis et al.
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 149
bayerl@rsm.nl
150 G. Leventakis et al.
The LC is continuing to see rapid growth in the use of its social media channels
with an on-going increase in likes and followers. LC is opening new accounts,
particularly Twitter accounts, to meet engagement gaps/needs (e.g., rural crime
issues, football supporters), and they are also exploring the use of new channels to
extend their reach and address specific issues; for example, an Instagram account to
target the younger demographic. The below are indicators of the achieved digital
media engagement:
1. LC social media channels are still seeing significant growth with no current
indication that they are reaching saturation point. Total Facebook likes grew by
over 50% in the 12 months from September 2014 to September 2015, whilst the
number of people following LC on Twitter increased by 80%.
2. LC regularly reaches around 5–6 million people on Facebook each month with
approximately 15% of people on average engaging with LC posts in some way.
In addition, over two million people see LC tweets each month (September
2015: 1.8 million; October 2015: 2.5 million). The regular increase in likes and
8
http://lancashire.police.uk/.
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 151
This section aims to provide a foresight about the new trends in Community
Policing. Next generation Community Policing (NGCP) approaches do not con-
stitute a case study in the traditional sense, since the proposed practices to adapt
Community Policing efforts into the 21st century have not yet produced any
transformational impacts and case study outcomes. The proposed NGCP systems
are structured from best practices, lessons learned and the collaboration and part-
nership between law enforcement and other community stakeholders. NGCP
solutions9 aspire to provide modern, innovative and cost-effective means to CP via
leading technologies and social media platforms.
The EU via the funded second topic of FCT-14 research call is actively involved
with ‘Enhancing cooperation between law enforcement agencies and citizens—
Community Policing’. A number of proposals10 was selected to develop a tech-
nology, which will facilitate, strengthen and accelerate the communication between
the police and communities by making it possible for community representatives to
identify risks and immediately report them to police forces. The actions necessitate
that community representatives and law enforcement agencies should be actively
engaged in the research to ensure that their perspectives are well embedded in the
design of new technology and innovation. Further to the above, trainings for law
enforcement agents by means of serious games or simulations as well as on
awareness raising activities about Community Policing for all stakeholders should
complement the proposed NGCP solution.
One of the funded proposals is the INSPEC2T initiative,11 which bases its
conceptual foundations on EU crime prevention and member states’ specific
internal security policies and best practices from cooperation between police and
local, regional and national communities. The INSPEC2T consortium composed of
CP researchers, ELS experts, police academia, European police forces and tech-
nology pioneers after desktop research, online surveys and interaction with
9
http://www.iacp.org/Portals/0/documents/pdfs/AnnouncementofGrant.pdf.
10
http://cordis.europa.eu/programme/rcn/666332_en.html.
11
http://inspec2t-project.eu/en/.
bayerl@rsm.nl
152 G. Leventakis et al.
stakeholders established the operational framework of the project. The review of the
research literature served as reference to design online surveys aiming at specific
beneficiaries of the NGCP system. Four online surveys were conducted, compliant
with EU Directive 1995/46/EC for data protection and handling. Each survey was
structured to aim at specific stakeholder groups.
The first survey was launched aiming at users from the ‘general public’. Citizens
across European countries are considered as potential users of the INSPEC2T
platform, so it is imperative to capture their needs and wants and understand the
reasons behind them. A second survey was aimed at NGOs, community workers,
city administrators and other actors who either professionally or on a voluntary
basis are involved with security and safety in communities. The participants were
asked to provide their experiences about CP and the use of social media. The third
and fourth survey sought to capture the views of police
colleges/universities/academies involved in the training of police students and
active CP practitioners from EU member states.
Further to the online surveys, focus group discussions and interviews were
conducted. These physical sessions were divided into two phases to assist
researchers in capturing experiences, lessons learned, best practices and also
recording suggestions. The focus group discussions took place in Greece, UK,
Cyprus, the Netherlands and Spain. The participants were selected from two distinct
groups: (1) the ‘official’ CP practitioners, which are LEAs assigned with CP tasks
and received appropriate training and (2) the general public consisting of citizens
with diverse backgrounds who may or may have not been accustomed to CP terms
and applications.
In addition to the online surveys and the focus groups, INSPEC2T utilised a
Stakeholder Advisory Group committee (SAG). This committee is made up of
LEAs (at national and EU level), government organisations, active citizen groups,
community organizations, commercial associations and CP visionaries. The well
experienced CP committee members participated in a workshop and discussed with
researchers the findings of the online surveys and the focus groups interviews.
Furthermore, they conveyed their professional view on certain CP topics via a
questionnaire and shared their vision for the Next Generation CP (NGCP) roadmap.
The result of the above was that against the background of cultural and ethnic
diversity the spread of new technologies injects an element of homogeneity and
seemingly a level playing field. Using social media for CP purposes provides the
opportunity to interact with all members of a community. However, differences
have to be taken into account with regard to language, technology, relations with
and image of the police and cultural understandings of crime, police, law and order.
Driven from accommodated transnational and multicultural best practices, it
adheres to an approach where social, cultural, legal and ethical dimensions are
embedded into core user-centric design specifications and implementation proce-
dures. Its conceptual architectural view is shown in Fig. 11.1.
The architecture of the INSPEC2T system is modular, expanding easily, while
information is not lost even if some internal process does not succeed or a pro-
cessing subsystem fails. The system operators are offered the maximum information
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 153
in real-time at each stage of processing and maintain total control on the infor-
mation to be published. Additionally, the operators have access to offline infor-
mation for investigating incidents ‘a posteriori’, perform data correlation, issue
reports and build expert knowledge for future alertness and CP actions.
Additionally, the system is designed to drop pseudo evidence, ‘decoy’ attempts and
to present information, alerts and maps. The differentiating factor of the system,
compared to commercial and enterprise social and data analytics platforms, is the
extensive and real-time handling and presentation of GIS (location, areas, naviga-
tion, maps) and multimedia (text, voice-audio, pictures, video) data. This is a core
functionality, embedded in a unified environment all over system blocks.
One of the key lessons learnt during the stakeholder requirements analysis and
architectural specification phase was that it is rather difficult to apply a single,
unified solution to all contexts or environments. There are a number of legal,
ethical, social and cultural factors that make a single approach difficult to apply, for
example, across the whole of the EU. This is why the INSPEC2T solution follows a
modular approach. The platform’s modularity allows various components to be
plugged and unplugged depending on the context applied. For example, the exis-
tence of a multimedia analysis component to process registered or unregistered user
supplied data within their reports, taking advantage of relevant technologies, may
not be specified in a legal framework for a given country or province. The
respective component will be disabled, while the remaining subsystems would
continue to interconnect and operate as per their design.
bayerl@rsm.nl
154 G. Leventakis et al.
bayerl@rsm.nl
11 Community Policing Case Studies: Proposing a Social Media Approach 155
11.4 Conclusion
A selection of case studies was introduced to make clear that CP initiatives are not
limited to partnerships between the citizenry and the police. Often organizational
and sometimes administrative changes are required to make a CP program effective.
The implementation of successful CP programs is not an assurance that it will
produce the same results elsewhere (cp. Chaps. 4 and 17). For a CP program to be
effective, further to conducting literature reviews before selecting it, it needs to be
adapted to local contexts and take into account factors like the community demo-
graphics, culture and societal issues and the main source of crime (cp. Chaps. 2 and
5). Furthermore, a CP program applied to transforming a community in terms of
population, culture, ethical values, etc. can be very effective if carefully planned and
exercised to produce the desired results.
A CP project also requires police adaptation. Over recent years more people file
reports for crimes such as domestic abuse, child sexual abuse and modern slavery,
which have previously been under-reported. There is an urgent need to do more to
tackle the victimisation of vulnerable people and the devastating impact these
crimes can have (UK Home Office 2016). Furthermore, clear roles and responsi-
bilities should be given to police officers who will be assigned with CP duties, and
special attention should be paid to cases where normal policing duties will con-
tradict the friendly and approachable image of a CP officer. On the other hand, CP
is about partnership for safer neighbourhoods. Over the last 12 years the
Neighbourhood Watch movement has recorded a decline of more than a third in
membership (Neighbourhood Watch 2015). At the moment the movement is not
attracting enough new members, so the EUNWA12 should urgently plan a new
membership retention strategy. As the neighbourhood watch is a supporting
mechanism for many CP initiatives, a transformation program is required.
To conclude, a CP initiative should be based on the outcomes of community
consultative forums to facilitate public input. Any CP introduction will require the
reorganisation of the local police structures to ensure equality within the service and
to facilitate problem solving. Reducing crime and antisocial behaviour is an
important element in improving the lives of residents. Ways to achieve this are
through partnership working, particularly through early intervention and preven-
tion, challenging and changing behaviours and through the use of technology.
Increased openness and transparency are becoming increasingly mandatory—social
media platforms must be as effective when used by the police as they are by those
who seek to evade them. NGCP initiatives should use these new channels to help
identify priorities and targets and understand how well they are responding to
citizens’ needs.
12
http://www.eunwa.org/front_content.php.
bayerl@rsm.nl
156 G. Leventakis et al.
References
ACPOS (2007) Public reassurance strategy. Association of Chief Police Officers, Glasgow (in
Scotland)
Birdsall N, McManus M, Brian D, Boulton L (2015) Surveying lancashire: expectations and
experiences of lancashire constabulary and its associated partners. University of Central
Lancashire
Communities and Equalities Scrutiny Committee (2016) Community safety overview, Manchester.
Retrieved from http://www.manchester.gov.uk/download/downloads/id/22657/community_
safety_strategy.pdf
Johnson R (2006) Decision models for the location of community corrections centers.
Methodologies, Stockholm (in Housing)
Law Library (n.d.) Police: community policing—definition of community policing. Retrieved 05
Aug 2016 from http://law.jrank.org/pages/1648/Police-Community-Policing-Definition-
community-policing.html
Manchester City Council (2014) Community safety strategy 2014–2017. Retrieved from http://
www.manchester.gov.uk/download/downloads/id/22657/community_safety_strategy.pdf
Nadeau SJ (2015) The many degrees of community oriented policing. Columbia Heights Police
Department, Columbia Heights, MN. Retrieved from http://www.ci.columbia-heights.mn.us/
DocumentCenter/View/1821
Neighbourhood Watch (2015) The way ahead for neighbourhood watch, 2–3 Dec 2015. Retrieved
28 July 2016 from http://www.ourwatch.org.uk/wp-content/uploads/2016/07/The-Way-Ahead-
2-3-Dec-2015-Summary-Report-Evaluation.pdf
Scottish Parliament Justice Committee (2008) Report on inquiry into community policing. Scottish
Parliament Archive. Retrieved 02 Aug 2016 from http://archive.scottish.parliament.uk/s3/
committees/justice/reports-08/jur08–18.htm#REPORT
The United States Conference of Mayors (2000, April). Retrieved from https://www.usmayors.org/
bestpractices/community_policing_0401/safer_neighborhoods_2.pdf
UK Home Office (2016) Modern crime prevention strategy, London. Retrieved from www.official-
documents.gov.uk
van Sluis A, Marks P, Bekkers V (2010) Nodal policing in the Netherlands. International Police
Executives symposium of armed forces
van Sluis A, Cachet L, van Os P, Prins R, Marks P (2013) Community policing in the Netherlands
a continuously changing constant. In: Global community policing problems and challenges.
CRC Press, pp 229–248
Yin R (1984) Case study research: design and methods. Sage Publications, Beverly Hills, Calif
bayerl@rsm.nl
Part III
CP in an Interconnected World
bayerl@rsm.nl
Chapter 12
New Crime Landscapes and New
Technologies for Community Policing
12.1 Introduction
Police represents the institution empowered to ensure compliance with the law and
to maintain public order, to prevent, investigate and solve crimes and offenses.
A fundamental aspect of crime prevention activity is represented by police relations
with the community. To prevent crime, police is constantly looking into new ways
of achieving their main objectives, while continuously improving existing methods
in order to ensure greater efficiency. As mentioned in earlier chapters (cp. Part I),
Community Policing is an integrated part of policing focusing specifically on
community. From both a theoretical and a practical point of view, three ways of
delivering Community Policing have been identified:
• Reactive: in response to requests
• Proactive using specific means
• Co-active/interactive: based on community consultations and common actions.
The co-active (interactive) method consists of improving relations between
police and community, leading to true partnerships. This method aims at helping
citizens to better understand police activities, to build trust between citizens and
police, to engage them in supporting the fight against crime and to improve safety
and general well-being of the community.
Community Policing, or community-oriented policing, is a strategy focused on
police forces building ties and working closely with members of the community.
This involvement relies on their willingness to cooperate with all members of the
community to improve quality of social life. While positioning itself as a partner,
along with other organizations, the police is aiming at identifying the issues that the
community is facing and the causes that can lead to committing crimes. Some of the
bayerl@rsm.nl
160 B.V. Dițu
issues identified within these activities may not relate directly to the core police
activities, yet often reveal states of tension, urgent personal problems or simply the
despair of an individual (see Chaps. 2, 3 and 5).
Community Policing is a policy that requires police to have a proactive approach
in addressing public safety concerns. It creates partnerships between Law
Enforcement Agencies and other organizations like government agencies,
non-profit organizations, private businesses, community members and the media.
The media are a very powerful partner, as they afford almost instant interaction with
the community.
From previous experiences in Romania and other European countries, we can
conclude that the main ways of achieving positive results in Community Policing
and crime prevention partnerships, are:
• Initiating national and local programs
• Developing targeted projects on specific issues
• Performing advisory and consultation activities
• Public discussions and interaction through direct meetings or surveys
• Media campaigns on crime prevention.
These steps help the community to be actively involved in the development of
problem solving solutions. The general objectives of such partnerships in general,
and Community Policing in particular, are:
• Reducing the number of crimes, offenses and the degree of hazards
• Lowering the number of participants (victims as well as perpetrators)
• Strengthening public safety
• Greater confidence in the police
• Awareness of tense situations in the community and efforts to prevent degen-
eration into conflicts by attracting the parties involved to a dialogue.
As an integrated part of Community Policing, police provide information, ini-
tiate and participate in programs to prevent crime and ensure the protection of
citizens in cooperation with other institutions. Community Policing partnerships
with other institutions (e.g., schools, church, local authorities) are helpful for citi-
zens, as they build mutual and beneficial cooperation between them (e.g., police can
inform these institutions to ensure immediate action). It needs to be emphasised that
police do not and cannot intent to substitute the activities of other services and
social institutions, but to support their actions. The main criteria regarding such
partnerships are:
• Legality
• Respecting the fundamental rights and freedom of people
• Equal treatment for partners, individuals and institutions involved in crime
prevention activities
• Community consultation in decision making over public and individual safety
bayerl@rsm.nl
12 New Crime Landscapes and New Technologies … 161
Today’s Law Enforcement Agencies are faced with numerous challenges to protect
life and property and to provide community safety. Police professionals must cope
with ever increasing demands including growing communities, tighter budgets and
limited resources to meet their goals. The rapidly changing social, economic and
political environment, both domestically and internationally, complicate these
problems.
bayerl@rsm.nl
162 B.V. Dițu
traffic and community issues. Many agencies are using geographic profiling to
determine the offender’s area of residence or the next crime target based on history
and patterns. Law enforcement managers need the right information at the right
time to deploy resources, to implement plans and to manage the incidents as they
unfold. GIS is used around the world in order to develop technology that vastly
improves the efficiency of law enforcement. It integrates and visualizes data to help
provide a comprehensive understanding in all types of emergencies.
GIS in law enforcement and Community Policing is not just about creating
attractive layouts for the annual report or slides for the budget presentation; it is
about helping agencies in their core mission of maintaining public safety, in which
Community Policing plays an important role. Geographic crime analysis enhances
the efforts of officers on the street and helps them do a better job. Additionally, Law
Enforcement Agencies can enhance the safety of their personnel not only through the
real-time tracking, for instance, of responding vehicles, but also by real-time
tracking of an individual officer in a foot pursuit. GIS provides command staff,
including watch and incident commanders, with the ability to visualize and share a
common operational picture or situational awareness in the event of a large-scale
disaster or when a major crime occurs. GIS can further be used to provide automated
emergency notification for evacuations, missing people or any other incident simply
by creating a message and selecting the appropriate geography. In short, virtually all
problems Law Enforcement Agencies are confront with have a geographic com-
ponent, and GIS provides the visual, analytical and data management capabilities to
more effectively manage resources and to provide better service (ESRI 2008).
A second development, Open Source Intelligence (OSINT) lies at the basis of the
current transformations experienced by the intelligence segment, being both a rich
source of information and a technological innovation, responding to agencies’
various current challenges. It has been estimated that 90% of all data in the world
has been generated over the last two years (Dragland 2013), and an increasing
amount of data is becoming available on the internet. Each and every one of us is
constantly producing and releasing data about ourselves. We do this either by
moving around passively—our behaviour being registered by cameras or card usage
—or by logging onto our laptops and surfing the net.
Besides the operational advantages provided, open sources play an important
role in public communications, functioning both as a PR platform, encouraging the
relations with beneficiaries and academic circles and as a promoter of security
culture. OSINT manages to accomplish the transition from secret sources to open
sources, enabling a specific symbiosis between classified and public information.
The ability to disseminate information to large groups in real time has made Twitter
and Facebook important communications tools when major events take place
bayerl@rsm.nl
12 New Crime Landscapes and New Technologies … 163
(see Chaps. 11, 13 and 16). For instance, when hunting for the Boston terrorists in
2013, the police, other authorities and traditional media used social media like Twitter,
Instagram, Reddit and Facebook to actively collect and disseminate information about
the incident (Helman and Russell 2014). Several volunteer groups were also set up via
social media in order to try and help the police (Helman and Russell 2014). However,
social media as communications channels proved not to be entirely beneficial, as they
were also an important source of confusion and misinformation (Brandtzag 2013).
Further, the World Wide Web is a rich source of information, but not all content
is easy to access. For instance, the deep web is the part of the internet that is not
necessarily malicious, but simply too large and/or obscure to be indexed due to the
limitations of crawling and indexing software such as like Google, Bing or Baidu.
The dark web is the part of the non-indexed part internet (i.e., deep web), which is
used by those who are purposefully trying to control access, for instance, because
they have a strong desire for privacy or because what they are doing is illegal.
Figure 12.1 illustrates this concept and interrelation between the various webs.
Because users are protected by a veil of technological anonymity, the dark web
is often portrayed as a space beyond the reach of law enforcement, where criminals
can run wild without fear of prosecution. This could not be more wrong. In fact,
police forces all over the world have deployed a wide array of different techniques
to identify and ultimately convict dark web drug dealers, weapon buyers, producers
of child pornography, etc. in the past years. If anything, Law Enforcement Agencies
have become more accustomed to working in this space and are likely to develop
even more ways to ‘bust’ technologically savvy criminals (Miessler 2015). To
achieve its goals and objectives, Community Policing needs to embrace these trends
and activities and utilise monitoring of dark web for the benefits of communities
they are protecting.
Fig. 12.1 Graphic representation of the World Wide Web and its components
bayerl@rsm.nl
164 B.V. Dițu
For 20 years, European Union Member States were faced with the phenomenon of
criminal diversity on an alarming scale, targeting citizens and their property,
businesses and the public sector. This phenomenon is expensive for our society
(loss of life, social and political costs, economic costs, etc.). Globalization and open
markets for goods, services and capital acted as growth factors in Europe, but they
have also facilitated the expansion of cross-border organized crime.
Often developing independently from crime itself, a major problem is the feeling
of insecurity by individuals or the community of citizens. This feeling does not
necessarily correspond to reality, but it still is fundamental in evaluating the quality
of life of EU citizens. Against this phenomenon authorities became aware of the
limits of traditional measures and criminal sanctioning systems and have developed,
although in different degrees, additional initiatives to prevent and combat the crime.
Community Policing is one of the key elements of these proposed measures.
Many physical and legislative barriers were removed from the European Union.
However, in terms of criminal law, each Member State has its own regulations. This
makes the procedures for cross-border crime investigations more difficult.
Therefore, often vital time is lost and communication between the involved states
hampered. To simplify these issues—especially the legislative ones—a range of
European institutions such as Europol and Eurojust were created. They also ensure
coordination and cooperation for the fight against crime with major impacts on the
European Union or the Member States including in cases of serious crime
(Ambrozie 2014).
Organized crime, just as is the case with crime in general, does not spread
randomly. It is often a planned and deliberate activity. Accordingly, it depends a
great deal on the presence of motivated offenders, on the existence of the oppor-
tunity for crime and on the orientation of the work of those who seek to control
organized crime. In line with this so-called situational approach, the Member
States are exploring ways to ensure that committing crime is made more difficult,
that committing crime involves greater risks to the offender (in particular the risk of
detection and apprehension) and that the possible benefits to the offender of
committing a crime are decreased or eliminated.
Yet, even if the European Union Member States could effectively develop their
laws and systems to prevent and control organized crime within their borders, this
would not be enough. Preventing and controlling cross-border (organized) crime
requires global cooperation. We have come a long way from the period when
countries ignored crime beyond their borders. The speed with which the European
Union Member States have agreed on cooperation—and the commitment that is
being shown on a high political level on implementation—show that the Member
States are very mindful of the dangers that organized crime poses to the individual,
the community, the country and the international community. Over the past few
years, there has been remarkable, indeed unprecedented progress in the national and
bayerl@rsm.nl
12 New Crime Landscapes and New Technologies … 165
12.4 Conclusion
This chapter describes the ways in which Law Enforcement Agencies and
Community Policing apply policies, models, managerial philosophies as well as
new technologies to facilitate the reduction of crime while ensuring greater effi-
ciency. More specifically, these issues are discussed in conjunction with challenges
and problems faced by Community Policing. These new tools ensure that managers
take the best possible decisions and enhance the efforts of police officers in the
street by helping them do a better job. The chapter further discusses the European
Union Cooperation in its fight against crime. Countries are aware of the fact that
crime goes beyond their borders and that they cannot limit themselves to the
national level in taking steps for the prevention and control of (organized) crime.
References
Ambrozie O (2014) The complex and dynamic nature of the security environment—Chapter:
European Institutions involved in the fight against serious forms of crime. “Carol I” National
Defense University Printing House, Bucharest, Romania
Brandtzag P (2013) Big Data—for better or worse: Trondheim. SINTEF, Norway
Dragland Å (2013) Big data, for better or worse: 90% of world’s data generated over last two
years, SINTEF, 22.05.13 https://www.sciencedaily.com/releases/2013/05/130522085217.htm
ESRI (2008) GIS provides the geographic advantage for intelligence-led policing. Redland,
California, available at http://www.esri.com/library/fliers/pdfs/intelligence-led-policing.pdf
Helman S, Russell J (2014) Long mile home: Boston under attack, the city’s courageous recovery,
and the epic hunt for justice, published by Dutton, a member of Penguin Group (USA) LLC, a
Penguin Random House company, on April 1. 2014, Boston Globe Media Partners. https://
www.bostonglobe.com/magazine/2014/03/28/how-marathon-bombing-manhunt-really-
happened/Fyv99o2D4WqT9my9BAYZDJ/story.html
Joutsen M (2002) International cooperation against transnational organized crime: the practical
experience of the European Union. Tokyo, Japan: United Nations Asia and Far East Institute
for the Prevention of Crime and Treatment of Offenders
Miessler D (2015) The Internet, the deep web, and the dark web: San Francisco, California,
available at https://danielmiessler.com/study/internet-deep-dark-web/#gs.8g0LzvM
bayerl@rsm.nl
166 B.V. Dițu
Project teams from Bucharest police (Gavriș Radu and Dițu Bogdan Vasile), Katowice police
(WÓJCIKIEWICZ Wojciech) and Berlin police (KANDLER Dirk) (2015), Good practice
manual—LLP-LdV/PAR/2013/RO/170—European project with the theme “Developing the
competencies of specialized structures to combat serious crimes committed with a high level of
violence”, Internally Published using European Union funding, Bucharest, Romania
Santos RB (2013) Crime analysis with crime mapping. Sage Publications Inc., Thousand Oaks
bayerl@rsm.nl
Chapter 13
Social Media: Facilitator and Stimulator
of Community Policing
Meet the Dutch neighbourhood officer Wilco Berenschot, the police officer in
Fig. 13.1 below. The picture reflects his nature, his personality. In an automatic
response he connects with a kid. It is important to make contact and build
relationships through which trust can be gained. Police officers like Wilco prevent
the society from falling apart. That’s the power of the neighbourhood officer.
For Wilco social media are a crucial ‘tool on his belt’. On a daily basis he
informs people about his experiences and what keeps him busy. He uses Twitter
(@WT_Berenschot) to announce were his pop-up police station is located. He
invites residents to pass by for questions or a simple cup of coffee. The pop-up
police station is his way to eliminate all barriers for residents to contact the police.
People come over to discuss diverse topics with him: These vary from nuisances
with neighbours to advice on theft to drunken wanderers. He also uses Twitter to
ask at whose place he is welcome to have his lunch (see Fig. 13.2 for examples
from his Twitter account).
In the same city of Rotterdam, the second largest city in the Netherlands, the
emergency control room of the police organized a ‘Twittathon’: from 7am until
10 pm on June 7th, 2012 all emergency calls1 that came in were tweeted (@poli-
tie24 and #politie24). As a consequence residents got a better picture of the
diversity of the work of police officers on an average day.
1
In case criminal investigation or privacy would be seriously harmed the call would not be shared
on Twitter
bayerl@rsm.nl
168 C.C.M.T. Broekman et al.
Fig. 13.1 Wilco Berenschot, neighbourhood officer in Rotterdam (NL), helping a kid
These are just some simple examples of how social media can contribute to
Community Policing. Social media could be considered as a—or even as the—
critical success factor for implementing Community Policing (CP). This chapter
will show why social media are this critical for successful CP. After elaborating on
the characteristics of social media, the role of social media in implementing and
performing Community Policing is discussed. We further will elaborate on
implementation of social media for security purposes in general. Next, we move
towards practice, fitting social media in operational police tasks according to
Community Policing philosophy. The subsequent section presents best practices of
the use of social media supporting Community Policing. In all, this chapter illus-
trates benefits social media bring for Community Policing, but also dilemmas and
challenges to be dealt with. However, we conclude that they are key to the suc-
cessful implementation of Community Policing (cp. Chaps. 7 and 11).
The introduction and wide adoption of social media, offering services from Twitter,
WhatsApp and Facebook to Instagram and many more, have had a huge impact on
society. Social media are widely adopted in all cultures and countries with an
estimated number of 2.2 billion users worldwide in 2016 (Fig. 13.32).
2
http://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/ retrieved
on 07-13-2016.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 169
The impact social media has had on society is much larger than for example the
impact of text-messaging (SMS). Social media provided a new range of possibil-
ities; opportunities, which before were not possible or only for a few people. Social
media enabled people to reach anyone in the world at any time and within seconds.
Until then, this was a privilege only of journalists and mass media. Social media
enabled everyone with access to the internet to reach all others. Social media
affected the nature of information and information sharing itself (Goldsmith 2015).
Characteristics of social media can be identified using the SWOT method, mapping
Strengths, Weaknesses, Opportunities and Threats Figure 13.4. Putting the SWOT
method in this context enables us to analyse why and how social media are useful
for Community Policing, and what threats should be dealt with. Several strengths of
social media can be identified such as the low barrier (to send messages), accessible
anytime and anywhere, direct communication channel (no intermediary is needed,
anyone can reach anyone and everyone), transparent, people can easily have a
bayerl@rsm.nl
170 C.C.M.T. Broekman et al.
Fig. 13.4 SWOT of social media, presenting the Strength, weaknesses, opportunities and threats
of social media
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 171
Opposing to these strengths stand the weaknesses of social media. Since they are
available anywhere at any time, social media can take lots of time. One can get lost in the
overload of messages. And even though there is a low barrier to use social media for most
people, to some people, for example the elderly, the barrier is (too) high. This can lead to
a small ‘forgotten’ group. Another weakness relates to the high diversity of social media.
Since the introduction of social media many different types of social media have been
developed: Facebook, Instagram, LinkedIn and Foursquare are only a few of the popular
media, all providing different features. Due to the diversity of social media and people
using all kinds of media, it does not suffice to send a message via one platform alone
when the objective is to reach all. A reverse side to transparency (one of the strengths) is
traceability: social media leaves many digital tracks, and privacy is often debated.
Though social media grows and evolves fast, it is still very immature and the general
public still has to learn how to use it, e.g., they have to learn to realize there is no such
thing as ‘delete’ on social media (despite of the new EU ‘right to be forgotten’). Once a
picture or message is on the internet, ownership of and control by the original sender is
lost (de Vries, 2011b, c). presents the complete SWOT analysis of social media.
This collection of strengths and weaknesses of social media enables the iden-
tification of opportunities for social media, but also of threats. Social media offer
public security planners and citizens new communication channels for contesting,
challenging, debating, aligning, organizing and participating in security processes,
independent of location and at minimal costs. One of the opportunities is the
support of Community Policing: It will increase chances for swift collaboration
between the police and the community, together aiming for a safe and secure
society. Collaboration of the police with the community can evolve into successful,
more effective and efficient policing. This can be achieved by informing the
community about how they can help and by explaining the legal boundaries for
their contributions. The police can make use of the strengths of social media, e.g.,
anywhere and anytime, low barrier, speed, richness and dialogue to support the
interaction with the public. Because of their characteristics social media make
applying Community Policing strategies easier. In fact social media can be con-
sidered a basic element in Community Policing. The next paragraph will show how
social media can positively effect Community Policing.
Community policing and social media have one important element in common: They
are both not bounded to hierarchical structures. Where police organisations tradi-
tionally are organised hierarchically, social media enable anyone throughout the
organization to broadcast messages (Meijer and Thaens 2013). This is in conflict
with the hierarchical police organisation. However, it is exactly in line with more
innovative Community Policing practices in which local officers almost autono-
mously engage with the community. Social media not only assist Community
Policing, they even stimulate the introduction of Community Policing. Authentic,
bayerl@rsm.nl
172 C.C.M.T. Broekman et al.
Fig. 13.5 The wheel of community policing reflects the core activities for (organizing)
community policing (Source INSPECT project, www.inspec2t-project.eu/en/blog)
3
Horizon 2020 project. Grand Agreement no 653749. Website: www.inspec2t-project.eu.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 173
13.3.1 Engage
Firstly, the community and the police need to become engaged. Brainard and Edlins
(2015) stated that engagement should be the core element of Community Policing.
Connections and trust are the basis for this engagement, and social media are crucial
to connect and form trust. Social media can facilitate contact between police and
community and between citizens amongst each other to get to know each other and
hence to create social capital (Brainard and Edlins 2015). Social media can help
police and community to develop a shared sense of purpose and a shared under-
standing of problems. These are crucial elements for Community Policing (Brainard
and Edlins 2015). In doing so, social media can help in the continuous engagement
between police and community.
Further, social media make it easy to find people with a specific interest
(longtail4). For example, people with an interest in criminal investigation can find
each other. Moreover, social media enable the police to be transparent and show the
community what activities keep them busy (Jamieson 2016). The Twittathon which
was organized by the control room of the Rotterdam police and the tweets Wilco
Berenschot sends are good examples of providing transparency on daily activities.
In reaction to the Twittathon many people responded on Twitter showing their
surprise about the number and variety of activities the police is working on during
the day (Kok 2012). The hashtag #Respect was used massively. The EU research
project COMPOSITE suggested that the use of social media can raise public trust in
the police by improving accessibility and transparency (Denef et al. 2012).
Social media are also useful to motivate local stakeholders and community
members in becoming enthusiastic about Community Policing. Members of the
community or police officers sharing their success stories on how they (were)
helped—for example, in solving a crime—inspire others to help as well.
Community members or other local authorities can use social media to ‘poke’
fellow community members to join in Community Policing efforts. Suggestions to
invite fellow community members can be based on interests of a person or this
could be matched automatically based on profile settings—while respecting privacy
legislation.
4
https://en.wikipedia.org/wiki/Long_tail.
bayerl@rsm.nl
174 C.C.M.T. Broekman et al.
13.3.2 Plan
Once there is a community, a plan has to be made: Goals need to be specified and
the progress of meeting these goals should be monitored. People tend to share
messages on things that bother them, amongst others on safety and security topics.
The municipality of Utrecht—in cooperation with TNO—conducted an experiment
to find out whether the so-called Veiligheidsmonitor5 (an annual survey assessing
amongst others the subjective safety for cities and regions in the Netherlands) could
be replaced by monitoring social media. Their experiment showed that, although
replacement will probably lead to missing some insights, social media provide
much relevant information on both subjective and objective safety and security
issues (de Vries 2015). In addition to monitoring what is sent by the public, police
can ask for specific input. If this option would be applied, it is crucial to com-
municate the frames and limitations to the community. This holds for follow-up
procedures as well: to ensure community members, who put effort in providing
input, will not become disappointed when follow-up procedures are not in line with
their expectations. Moreover, social media can be used for big data analyses, which
can also be input for prioritization of the safety and security agenda. Finally, social
media can be useful to share updates on progress in realizing the goals.
13.3.3 Prepare
Once the plans are on the table, preparations can start. Rules have to be set and
communicated and skills for Community Policing activities (e.g., engaging with the
community, problem solving for police officers and rules of the engagement for
community members) should be identified and developed or improved (e.g., with
training). Social media are a perfect medium to communicate the rules of engage-
ment. Furthermore, social media can be used to promote the diverse trainings
community members can follow. Relevant trainings could be suggested based on
skills summarized in a community members’ (e.g., LinkedIn) profile. Also profile
information and location information can help in suggesting what trainings might
suit a person, again respecting proper privacy settings. The activities above support
the operationalization of Community Policing. In order to make Community
Policing a continuous process, and not a one-time event, these activities should be
managed and measured continuously.
Operations of Community Policing can be split into: (1) daily security where
time is a crucial element with more short-term planning and (2) criminal investi-
gation, which per definition looks into past events and could take up to years. These
two are discussed below.
5
http://www.veiligheidsmonitor.nl/.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 175
Daily security may be defined by maintaining and getting back to peace as a status
quo and minimizing negative impact of disturbances. In daily security, social media
can be used to collaborate and share alerts. Transparency and communication
should lead to increased subjective safety and positive attitudes (Meijer et al. 2013).
Social media can be monitored for messages people shared, information can be
send, questions can be asked, and police can easily start collaborating with the
community on social media. Section 13.4 will further elaborate on these options for
using social media.
The prior sections analysed the characteristics of social media using the SWOT
analysis method, and how social media can add to introducing and executing a
Community Policing strategy. This section will present how using social media
should be implemented using the social media cycle (Fig. 13.6), and provides
examples of how social media can be relevant for Community Policing.
bayerl@rsm.nl
176 C.C.M.T. Broekman et al.
People share all kinds of information through social media, making this an extre-
mely rich source of content for authorities such as Law Enforcement Agencies.
People share what they see, smell, hear but also what they think, conclude, plan,
what they consider to be dangerous, suspicious, etc. Hence, social media not only
provide police officers with extra eyes and ears but also with extra intelligence. All
this information can be accessed by (intelligent) monitoring of messages, photos
and videos shared on social media. For example, information on crowdedness or a
tense atmosphere amongst the crowd during events can be found on social media or
information on stolen items but also irritations of people about garbage standing in
the way or people smelling gas.
In the Netherlands, messages on Twitter are used as an early warning system for
earthquakes. Analyses of the tweets sent by people living in the villages involved
can confirm the occurrence of an earthquake sooner than any official organization
can (de Vries 2014). It is evident that the large amounts of relevant information on
social media make it crucial for law enforcement to monitor social media with
proper filtering mechanisms. Accordingly, monitoring is in the centre of the
social-activities cycle (cp. Fig. 13.6). Two of the challenges that come with
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 177
monitoring social media are that the overload of messages create a lot of (manual)
work, which is scarce in police organisations, and that there are many different
social media—so which platforms should be selected to monitor? The first con-
clusion of an experiment in which social media were used for early warnings during
events was not to expect to be able to see everything. Secondly, it became clear that
it is important to use proper social media monitoring tool(s) (Broekman and
Menkhorst 2013). Some tools are better in providing a general picture based on
many keywords, other tools are more focused on monitoring one or limited specific
keyword(s) or are specialized in monitoring the image of the police. The goal of
monitoring social media should be kept in mind in the selection of monitoring tools
(see also Chaps. 11, 12 and 17).
On social media different target groups can be found in different places as in the
physical world; for instance, one group of people may be Twitter users, while
another group uses Facebook and a third group can mostly be found on Instagram.
In a pilot at summer carnival in which Twitter was monitored many visitors were
Facebook users instead of Twitter users. Consequently, although Twitter was still
used frequently, some information came in later or not at all (Broekman and
Menkhorst 2013). In order to know which social media to monitor, one should start
with a target group analysis.
Moreover, different social media are used for different purposes (Jaitner and
Kantola 2014). People tend to use Twitter at specific times (e.g., during a festival),
while they use Facebook for planning activities and blogs to express opinions
(Jaitner 2013, cited in Jaitner and Kantola 2014). In order to use social media for
situational awareness it is crucial to have a complete overview of the platforms
used, by whom and for what purposes (Jaitner and Kantola 2014).
Secondly, the police can broadcast messages themselves and so share information
with the community. Similar to monitoring social media, the selection of social
media platforms depends on what the target groups are. An example of efficient
‘sending’ took place during the Summer Carnival in Rotterdam 2012 (Broekman
and Menkhorst 2013). Moreover, there are challenges in sharing uniform infor-
mation and not infringing on people′s privacy. A rumour was making the rounds
online that someone was shot during the festival and this ‘news’ spread very fast on
Twitter. After having verified that this was only a rumour, the police sent a tweet
stating that no one was shot. It appeared that the public identified that this tweet was
coming from a trustworthy source: The police message was retweeted massively,
and the rumour was refuted in a short time.
bayerl@rsm.nl
178 C.C.M.T. Broekman et al.
Thirdly, police can ask questions. This is where real Community Policing starts.
When police officers intentionally ask questions to the community, they access the
wisdom of the crowd and use social media in one of its strengths—as a bidirectional
communication channel. The concept of ‘asking the community’ is not new: For
many years television and radio shows have been broadcasting shows in which the
public is asked to help the police with all kinds of cases. Social media, however,
make it a lot faster and easier decreasing the threshold and the time it takes to ask
the community questions. An example of ‘asking’ is the police crowdsourcing to
access the cumulative knowledge of the community on cold cases using ‘webbed
investigations’.
13.4.4 Cooperate: Not Only the Wisdom but also Time Can
Be Accessed Directly and Worldwide
The fourth and last activity for which law enforcement can use social media is
cooperation: continuous back and forth communication between police and
citizens/community, debating and aligning and actually collaborating in security
processes. Social media are aimed to enhance dialogue and ‘many-to-many inter-
action’ (Bertot et al. 2012). The diverse neighbourhood-WhatsApp groups7 are an
example of using social media for cooperation in public safety. In these groups,
police and citizens cooperate on a structural basis to assure safety and security in
their neighbourhood. ‘Citizen journalism’ is another example of how the capacity of
the crowd can be activated and utilized. The MH17 report (Bellingcat 2015)
co-constructed by the crowd and initiated and led by the Bellingcat group, is a
perfect example of what a community can accomplish and how the crowd can be an
extension of the police.
6
http://www.gmp.police.uk/content/WebsitePages/653E722EAFEFB92780257D7300365D60?
OpenDocument, retrieved at 10-03-2016.
7
A WhatsApp-group among neighbours to share remarks related to safety and security of the
neighbourhood.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 179
Box 1 provides a summary description of the four activities with examples of social
media usage in the Netherlands. The following section will fit the usage of social
media into the daily activities of policing using a Community Policing strategy.
Box 1. Descriptions of the four activities in the social media cycle together with
examples of activities
Monitor: What do citizens publish on internet, without any question being posed by
the safety and security organizations? What concerns citizens (content network)?
And who are the people that make up the social network of those citizens (actor
network)?
Send: The government sends information but does not expect an answer per se.
Citizens are informed. They are asked either to take action or not. For example:
“There is a major fire: keep doors and windows closed.”
Ask: The security organization poses a question to citizens. Initiative and question
come from the government. Like an AMBER Alert: “Missing: Jan de Bruin:
14 years old from the Hague. Blond hair, black jacket, white shoes. Missing since
26-10-2011. Photo at http://amberalert.nl. If you have any information, twitter:
#missing @JandeBruin, Phone 0800-6070”.
Cooperation: A citizen or safety and security organization poses a question with the
aim of starting a dialogue or multilogue. This is not a one-off answer.
For instance, a tweet from @noniem: “@politie Why so many police at the #Dam in
#Amsterdam?” and the reaction “@noniem, nothing going on. Police present
because a #demonstration is expected today in #Amsterdam”. Citizens can react
again (dialogue) or more people can do that simultaneously (multilogue). (de Vries
et al. 2011)
About two-thirds of the neighbourhood officers in the Netherlands state to have had
valuable information from Twitter. This can be related to diverse topics such as
nuisance, suspicious situations or tips on criminal investigations. One third of the
officers even stated to have had a golden tip on a crime case through Twitter (Meijer
et al. 2013). In their study on usage of social media for Community Policing
Brainard and Edlins (2015) found that:
• Facebook had a dominant role and was by far the most popular platform for the
police
• Police used YouTube only as a channel to send information
• Citizens were more active on social media than the police was
bayerl@rsm.nl
180 C.C.M.T. Broekman et al.
• Police did not actively respond to citizens and so tended to end possible
conversations
• Only few threads were qualified as communication
Not only Brainard and Edlins (2015), but also Heverin and Zach (2010) con-
cluded that the police tends to broadcast information through social media rather
than interact and communicate with the community. If social media usage started
outside of the communications department, the usage had a stronger relation to real
police tasks (Meijer and Thaens 2013).
Social media can help in diverse police tasks, even more when a Community
Policing strategy is applied. This section elaborates on using social media for the main
police tasks daily security and criminal investigation while applying a Community
Policing strategy. In order to respect the diversity of the task of daily security, it is split
into the following sub-tasks: (1) prevention and surveillance, (2) early warnings and
(3) law enforcement after an incident or crisis. The section concludes with observa-
tions that illustrate that the community does not always know best.
8
www.nextdoor.nl.
9
https://www.utrecht.nl/wonen-en-leven/veiligheid/wat-kunt-u-doen/doe-mee-aan-project-waaks/.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 181
basis including at night times. They can report not only on irregularities but also, for
example, the status of maintenance of a street. An app has been developed for the
security region of Utrecht aimed at dog owners to stimulate Community Policing.
Based on a similar philosophy neighbourhood officer Kor de Jong, who serves in
Rotterdam, started another initiative. In autumn 2016 he started a neighbourhood
WhatsApp group for PokémonGo hunters. The players of this popular game are
walking and searching the streets for Pokémons and might signal something sus-
picious or shoo criminals (NOS 2016).10
If local citizens share suspicious activities with each other or with the police,
these weak signals can be valuable information for police officers. Either citizens or
Law Enforcement Agencies can decide themselves whether they want to take
further action or not. And if citizens take action, law enforcement should keep an
extra eye, because solving an issue can be fine but can also move into citizens
taking the law in their own hands.
The community can function as an early warner for emergencies or emergent risks.
Open source data, social media being one of the significant contributors, enable big
data analyses. Incidents that emerge such as panic caused in and by crowdedness
can to a certain extent be signalled early by monitoring and analysing social media.
During the 2012 summer Olympics in London social media were monitored, and
when messages suggested unrest or conflicts police would check them out (Knibbs
2013). Sudden events, however, for example an explosion, are hard to predict based
on big data analyses (Bouma et al. 2012).
Especially in the so-called ‘golden hour’—the first hour after an incident or robbery
occurred—Community Policing can be of crucial help. It has the potential of
contacting high volumes of local ears and eyes around an incident. No medium can
activate these ears and eyes as quickly as social media can. Moreover, apps (e.g., an
SOS alarm app) are being launched to alarm bystanders who are able to provide first
aid in emergency situations. Social media are effective tools to reach out to a broad
audience. After the storm at the festival Pukkelpop on 18th August 2011 in
Belgium,11 victims and people living around the festival area found each other on
10
http://nos.nl/artikel/2124822-politie-werkt-samen-met-pikachu-en-co.html.
11
Dutch: https://nl.wikipedia.org/wiki/Noodweer_tijdens_Pukkelpop_2011, retrieved at 9-27-2016
English: https://nl.wikipedia.org/wiki/Noodweer_tijdens_Pukkelpop_2011, retrieved at 9-27-2016.
bayerl@rsm.nl
182 C.C.M.T. Broekman et al.
social media. People living in the surroundings of the festival area offered help and
also offered their WiFi to make sure victims had access to the internet (Terpstra
et al. 2012).
During a crisis social media can be used to ask the community for help in
sharing information, e.g., on their situation, in order to create better situational
awareness. The website www.ushahidi.com is an initiative aimed at exploiting this
possibility, and digital humanitarian groups are increasingly involved. During crises
considerable information is provided by citizens (de Vries et al. 2011). Another
example of a crisis, were social media had a large impact, is the shooting incident at
Virginia Tech in 2007. Only two hours after the shooting found place university
students began a Facebook group called ‘I am OK at VT’, and within 24 h all
missing persons had been traced. Traditional authorities would have needed much
more time to make sure everyone was accounted for (de Vries et al. 2011).
Social media can facilitate criminal investigations in different ways. Martine Vis, at
the time of writing national director of social media for the Dutch police, stressed
that social media are indispensable for both small and complex cases (de Vries
2012). Collaborating with the crowd can make the police more effective. Through
social media the community can help in the collection of evidence. Often, the police
are not the first at the scene of a crime, while bystanders share photos and infor-
mation with the world. Research shows that the chances that a crime is solved by
the police increases considerably based on the quality and quantity of information
provided by the public (Meijer et al. 2013). Foster (2016) found that 54% of the
responders in his study received information from the community through social
media.
Social media can help to easily and quickly share questions with the community,
and they help in letting the community know what exactly the police is looking for
and channel citizens’ efforts. Based on the number of retweets in a vast numbers of
cases (Heverin and Zach 2010), the community is willing to help in solving crimes
and incidents. For receiving information, social media might not always be the best
platform as an intake channel to receive reports or tips. It is arguable that the
transparency of social media, in case of providing (witness) information, is a risk. In
those cases social media can be used to spread the request for (eye) witness
information, while alternative secure intake channels can be offered to report
information to the police. The community can also help in validating (evidence)
material, as they can add information to information already gathered.
On the other hand, criminals also use social media. They leave traces of
themselves or of plans for a crime. Either smart searching software tools or
crowdsourcing with the public can help the police to find and validate missing
pieces of a puzzle. For example, the photo of a wanted person passing by on social
media can provide valuable information on where this criminal might be caught.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 183
Finally, the community can also help in solving cold cases. Not hampered by any
kind of tunnel syndrome they can help defining new scenarios. Meijer et al. (2013)
stated, based on their study on the effectiveness of social media usage by the police,
that social media increases effectiveness of police-work thanks to better
information-exchange between citizens and police. Box 2 showcases examples of
how social media have supported criminal investigations.
“A teenager was taken into custody after bragging about a boozed up hit and run on
Facebook … Officers were alerted about the crime thanks to a private Facebook
message from another user.” (Knibbs 2013)
***
An arson could be solved thanks to a message through Twitter
***
Through a Direct Message sent on Twitter a man asked to meet. He told about his
suspicion of a weed plantation. (Meijer et al. 2013)
12
https://en.wikipedia.org/wiki/Alphen_aan_den_Rijn_shopping_mall_shooting.
13
A girl in Haren aimed to invite friends for her birthday party over Facebook. However, she
forgot to click the button ‘private’ for the message. A massive number of people went to the small
town of Haren, and the event ended in riots. For more on the events around Project X see: https://
en.wikipedia.org/wiki/Project_X_Haren; accessed 10th March 2016.
bayerl@rsm.nl
184 C.C.M.T. Broekman et al.
Many police officers in the United Kingdom and in the Netherlands successfully
integrated social media into their daily work and post messages online on a daily
basis. Social media became one of the common tools to use (Denef et al. 2012).
This section paragraph will presents some of the best practices.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 185
message about a missing child, and community members are asked to look for it.
Amber Alert counts over one million Dutch members on a total population of 17
million. Moreover, some public organizations help spread the message (Meijer et al.
2013). A third police initiated Community Policing initiative that makes use of
social media is the app ‘police searches’ (de politie zoekt). Being downloaded over
100.000 times within the first three weeks, this app initiated by de police of
Amsterdam, was a success right from the start (Meijer et al. 2013). In half a year
(November 2011–May 2012) 665 cases were broadcasted. Some cases got a
response within only a few minutes. The Amsterdam police estimates that for
between 15 and 25% of all cases that were broadcasted community members sent
crucial tips for solving the case (Meijer et al. 2013).
Besides apps, the Dutch police uses social media massively with Twitter and
Facebook being most popular. Meijer et al. (2013) found that over thousand police
officers have a Twitter account. Hence, the Dutch police might well be the orga-
nization that holds the most Twitter accounts worldwide. According to M. van
Leeuwen (Dutch police), Dutch officers use their Twitter accounts a lot: In one year
over 400,000 tweets were sent. Followers of these accounts are diverse: They differ
in education, age and gender (Meijer et al. 2013). Meijer et al. (2013) also found
that community members consider contacting the police through Twitter as easier
and with a lower barrier than through the regular channels. Especially when a
community member is in doubt whether a suspicious circumstance is worth
reporting, Twitter is experienced as a channel with lower barriers.
bayerl@rsm.nl
186 C.C.M.T. Broekman et al.
The Dutch police uses Twitter and YouTube to gather information and use it to
solve crimes. They use social media for high profile cases, such as the Project X
riots in Haren, but also for petty crimes. For example, the police in The Hague
could identify the perpetrator of a crime after citizens recognised the perpetrator on
a YouTube video the police had shared (Meijer et al. 2013). In 2010 a girl was
indecently assaulted in the city Eindhoven. Camera footage of the assailant was
broadcasted on the local TV’s Crime watch program, which generated ten tips.
When the same footage was disseminated via Twitter three times as many tips came
in (de Vries et al. 2011). A further example of the power of crowdsourcing through
social media is provided in Box 3.
Box 3. Example of a Dutch case solved with the help of crowdsourcing through
social media
‘The head-kickers’
In January 2013 (Eindhoven, the Netherlands) eight teenagers started a fight with
one 22-year old student. They punched and kicked the victim, and left him for dead,
unconscious. But the whole fight was taped by surveillance cameras.
The police was clueless about the offenders and decided to ask the community and
shared the shocking video material. The community responded massively, the video
went viral, being referred to as ‘the head-kickers’. Within three days all eight of the
teenagers had turned themselves into the police.
Although asking the community was very effective, there were also downsides to this
case. In no-time the crowd took over control. The video was shared by many twitter-
accounts. The teenagers were on, what one could call a digital public pillory. One
innocent boy who appeared to have the same name as one of the offenders was
threatened. In the end the judge decided to reduce penalties on all perpetrators,
because their privacy was seriously affected.
Source: social media DNA (http://socialmediadna.nl/kopschoppers/)
This best practice chapter section showed a collection of examples on how social
media successfully stimulates Community Policing practices. Although social
media enable Community Policing, and although they can be considered a core
element, they also bring challenges and dilemmas. The next section will debate
some important dilemmas that come with everyday use of social media for
Community Policing.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 187
Considering the impact social media can have on our current lives, one might easily
forget that they were adopted only a few years ago. The fact that social media are
such ‘young’ media is a good explanation why diverse dilemmas and challenges
still exist. This final paragraph will reflect on some of these dilemmas.
Law and legislation are trailing behind, jurisprudence is scarce and ethical
boundaries are vague and fickle. Social media are new to society. Neither indi-
viduals, nor organisations or society can oversee the real impact of social media.
Privacy is a hot item, of course, but so are for example citizen’s rights. The web
gives citizens more resources and information to find out about and take action on
all kinds of crime on their own. Not so long ago the Dutch government decreed that
business owners may not share their surveillance camera footage on the internet.
This caused dissatisfaction among citizens. If Community Policing strategy is the
aim, what are the (legal and ethical) options for the community members? The
agenda setting research project Medi@4sec14 looks into these dilemmas asking
questions like: To what extent are current ethical codes and laws and legislation
also valid in the new, partly digital, world? Do other standards and values apply,
and do we have to interpret things differently in the virtual domain? And if you
want to enforce standards and values, how do you deal with violators, especially
serious ones? There is always the possibility that a message is posted by someone
else or from an anonymous profile.
Society’s general opinion is that criminal activity, offline and online, must be
restricted as much as possible. Having so much information online, should it be
allowed to constantly monitor criminals and terrorists or anyone? Where do you
draw the line? Is it permissible to monitor the digital behaviour of repeat offenders
and other risk groups? And when is someone a repetitive offender, and when do
they belong to a risk group? When can the community be asked to share images?
Are all community members allowed to make videos of other people? Where do we
draw the line with regard to privacy? And who decides to draw that line? Should the
police be allowed to examine all internet traffic, observe and record suspicious
conversations or behaviour or even record these? And can commercial
14
Horizon 2020 project, grand agreement no 700281. Website:http://media4sec.eu/.
bayerl@rsm.nl
188 C.C.M.T. Broekman et al.
organizations do the same aiming to help the police (but possibly have a hidden
agenda)? Up to what limits do social media create an environment in which people
can communicate freely, happily and without consequences as is generally accepted
at home or in a bar? At what point may or must security organizations intervene?
Not all citizens are familiar with an officer online. Not everyone knows how to find
the police via social media. Similarly, many (neighbourhood) officers have a social
media account but definitely not all of them. Should it become mandatory? Most
officers use Twitter or Facebook, but what about other platforms used by other
target groups?
New technological possibilities (future internet) and transparency (open inno-
vation) are rapidly changing the landscape of social media. Increasingly, new media
with new up- and downsides are launched. Early adopters make full use of all the
applications and easily jump to new social media platforms. Within safety and
security organisations, too, there are significant differences in the extent to which
new media and new applications are being embraced. This results in inequalities to
police services and accessibility. Furthermore, policy departments as well as law
and legislation are late adopters. New applications are already in use before wider
adoption is officially allowed. The 112 notifications on Facebook are a good
example of what citizens expect from security organisations when it comes to the
speed of adopting social media.
New ways of working have already been blurring the line between home and work
for some time. Social media accentuate this blurring. Work is taken home, messages
are sent outside of work times and a response is easily sent. The same goes for
personal affairs being done in between jobs in a work environment. Finding a good
balance or separating work and home is not easy. One of the risks is that social
media can draw conflicts into the personal atmosphere and vice versa. For instance,
an angry citizen can use social media to find many personal details of a safety and
security service employee and can then post threats, or worse. Unfortunately this is
an increasing problem for civil servants in general.
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 189
The speed and accessibility, anytime and anywhere, enabling anyone to contact
everyone and the transparency of it all make social media a facilitator and stimu-
lator of Community Policing. In every element in the wheel of Community Policing
social media can fulfil a significant role (cp. Fig. 13.5). Police officers can use
social media to engage with the community. They can do so by giving insights on
what keeps them busy during the day (transparency), being accessible (accessi-
bility) and create a shared sense of purpose and problems or solutions. Messages on
social media give information on subjective and objective safety and can lead to
collaborative planning of community activities. Rules of engagement can be
communicated through social media in the preparation phase. Moreover, necessary
trainings can be suggested to community members based on target group analysis.
Finally, social media are useful in executing operational activities of Community
Policing: daily security and criminal investigations. They can be used to monitor or
search for relevant information, send information, ask questions to the community
and start collaboration.
When starting to use social media, it is crucial to start with monitoring. Too
much information is available on social media; not paying attention to what is going
on online can be a risk. Once monitoring is started, and there is a picture on where
which (target) groups go at certain moments it can be fruitful to also share infor-
mation, ask questions and/or start collaboration with the community.
Social media usage fits well in the diverse police tasks when applying a
Community Policing strategy. Many police officers who use social media received
useful tips from the community. For prevention and surveillance social media
multiply the eyes and ears on the street. Analysing messages on social media can
provide early warnings of potential incidents, and during a crisis these analyses
often provide crucial situational awareness. Social media can show relevant pictures
of incidents more quickly than police can arrive at the scene. People in the sur-
roundings of an incident can be asked for help or as eyewitnesses. Also for criminal
investigations social media can be used and have shown repeatedly to be valuable,
e.g., for (anonymous) tips. Several best practises that were mentioned in this
chapter proved the usefulness of social media. The introduction and wide adoption
of social media is, justly, praised by Community Policing advocates, but dilemmas
and challenges have also arisen. Amongst others the immaturity and recent adop-
tion of social media seems responsible. Lack of regulations on social media usage
by law enforcement is one of the reasons these dilemmas and challenges still exist
(see also Chaps. 2, 3, 4 and 5).
Although there is still much to discover and regulations and legislation are not
up to date yet, the safety and security domain should profit from the opportunities
social media has to offer. Starting with searching and monitoring on social media,
most police officers can start to benefit fairly risklessly. As a next step, they can
start sharing messages about their daily activities to gain presence and personality
bayerl@rsm.nl
190 C.C.M.T. Broekman et al.
and/or ask the community for help in low-profile cases. Moreover, Community
Policing can be boosted and justly receives much attention. Now is the time for
practitioners and academics to work together for best practices in the next gener-
ation of Community Policing.
References
Bellingcat Investigation (2015) MH17 - Potential Suspects and Witnesses from the 53rd
Anti-Aircraft Missile Brigade. Retrieved at 09-13-2016 via https://www.bellingcat.com/wp-
content/uploads/2016/02/53rd-report-public.pdf
Bertot JC, Jaeger PT, Hansen D (2012) The impact of polices on government social media usage:
issues, challenges, and recommendations. Gov Inf Q 29(1):30–40
Bouma H, Rajadell Rojas O, Worm DTH, Versloot CA, Wedemeijer H (2012) On the early
detection of threats in the real world based on open-source information on the internet. In:
International conference on information technologies and security ITSEC-2012, 15–16 Oct
2012, Chisinau, Republic of Moldova
Brainard L, Edlins M (2015) Top 10 US municipal police departments and their social media
usage. Am Rev Public Adm 45(6):728–745
Broekman CCMT, Menkhorst (2013) Burgermerlding signalering: Vroegsignalering met behulp
van social media. Retrieved at 09-08-2016 via https://www.politieacademie.nl/kennisenonderz
oek/kennis/mediatheek/PDF/88256.PDF
Denef S, Kaptein N, Bayerl PS, Ramirez L (2012). Best practice in police social media adaptation.
Retrieved at 09-13-2016 via http://www.google.nl/url?sa=t%26rct=j%26q=%26esrc=s%26
source=web%26cd=1%26ved=0ahUKEwjd55yvso3PAhUIsBQKHZM_CPwQFgghMAA%26
url=http%3A%2F%2Fadministracionelectronica.gob.es%2Fpae_Home%2Fdms%2Fpae_Hom
e%2Fdocumentos%2FEstrategias%2Fpae_Gobierno_Abierto%2Fpae_La_Administracion_Ge
neral_en_los_Medios_Sociales%2FCOMPOSITE-social-media-best-practice_1_.pdf%26usg=
AFQjCNEMw4n98wYjQ2qRbO69lwh8g6M6Ig%26sig2=A7CdMokZNxqPB7KZx3ysHA
de Vries A (2011a) Sociale media SWOT * met een twist * kansen. Retrieved at 09-05-2016 via
https://www.frankwatching.com/archive/2011/05/26/social-media-swot-met-een-twist-kansen/
de Vries A (2011b) Sociale media SWOT * met een twist * zwaktes. Retrieved at 09-05-2016
via https://www.frankwatching.com/archive/2011/05/20/social-media-swot-met-een-twist-
zwaktes/
de Vries A (2011c) Sociale media SWOT * met een twist * bedreigingen. Retrieved at
09-05-2016 via https://www.frankwatching.com/archive/2011/06/03/social-media-swot-met-
een-twist-bedreigingen/
de Vries A, Jong de KY, Kernkamp AC, Broekman CCMT, Petiet PJ, Ponsioen C, Versloot CA,
Huis in ’t Veld MAA (2011) #SM@OOV, Visie op sociale media in de openbare orde en
veiligheid. Retrieved at 09-05-2016 via http://socialmediadna.nl/smoov/
de Vries A (2012) @politie24. Retrieved at 08-27-2016 via http://socialmediadna.nl/politie24/
de Vries A (2013) Project X Haren—a digital reconstruction of the impact of social media on
public safety (video). Retrieved at 08-27-2016 via https://www.youtube.com/watch?v=
MINICbJOkYo&feature=youtu.be
de Vries A (2014) Aardbevingsmonitor: slimme analyse van tweets zorgt voor snelle alertering en
beeldvorming. Retrieved at 08-27-2016 via http://socialmediadna.nl/aardbevingsmonitor/
bayerl@rsm.nl
13 Social Media: Facilitator and Stimulator of Community Policing 191
de Vries A (2015) Vuurwerk monitoring: Jacht op hinder. Retrieved at 10-03-2016 via http://
socialmediadna.nl/vuurwerk-monitoring-jacht-op-hinder/
Foster J (2016) Social media in policing: How far have we come? Policing insight. Retrieved at
13-09-2016, via https://policinginsight.com/analysis/social-media-policing-far-come/
Goldsmith A (2015) Disgracebook policing: social media and the rise of police indiscretion.
Policing soc 25(3):249–267
Haan R dr (2011) Online Community Policing: Visie op gebruik van sociale media bij de politie.
Retrieved at 08-09-2016 via http://socialmediadna.nl/online-community-policing/
Heverin T, Zach L (2010) Twitter for city police department information sharing. Proc Am Soc Inf
Sci Technol 47(1):1–7
Jaitner M (2013) Exercising power in social media. In: Rantapelkonen J, Salminen M (eds) The
fog of cyber defence. Julkaisusarja 2. Artikkelikokoelma no: 10. pp 57ff
Jaitner M, Kantola H (2014) Countering threats-a comprehensive model for utilization of social
media for security and law enforcement authorities. In: 13th European conference on cyber
warfare and security ECCWS‐2014. The University of Piraeus Piraeus, Greece, p. 102
Jamieson S (2016) Social media is the ‘new neighbourhood policing’ says prize-winning tweeting
officer. Retrieved at 09-08-2016 via http://www.telegraph.co.uk/news/uknews/crime/12083545/
Social-media-is-the-new-neighbourhood-policing-says-prize-winning-tweeting-officer.html
Knibbs K (2013) The online Hunt for Criminals, Social Media is the Ultimate Snitch. Digital
trends. Retrieved at 09-08-2016 via http://www.digitaltrends.com/social-media/the-new-inside-
source-for-police-forces-social-networks/
Kok B (2012) Rotterdamse politie tevreden over twitteractie @politie24. Retrieved at 05-09-2016
via http://twittermania.nl/2012/06/rotterdamse-politie-tevreden-twitteractie-politie24/
Lieberman JD, Koetzle D, Sakiyama M (2013) Police departments’ use of facebook: patterns and
policy issues. Police Q 1098611113495049
Mauritz A (2011) Be Connected, be Social, be Polite; Sociale Media, de Verbindende Factor
tussen Politie en Burger. Retrieved at 09-05-2016 via http://socialmediadna.nl/connected-
social-polite/
Meijer A, Thaens M (2013) Social media strategies: understanding the differences between North
American police departments. Gov Inf Q 30(4):343–350
Meijer AJ, Grimmelikhuijsen SG, Fictorie D, Thaens M, Siep P (2013) Van Hype naar
Onderbouwde Keuze. Reed Business, Amsterdam
NOS (2016). Politie werkt samen met Picachu en co. (News item) http://nos.nl/artikel/2124822-
politie-werkt-samen-met-pikachu-en-co.html
Terpstra T, de Vries A, Stronkman R, Paradies G (2012) Towards a realtime Twitter analysis
during crises for operational crisis management. In: Proceedings of international conference on
information systems for crisis response and management ISCRAM
bayerl@rsm.nl
Chapter 14
Mobile Communications for Community
Policing
G. Markarian (&)
School of Computing and Communication, Lancaster University, Lancaster, UK
e-mail: garik@rinicom.com
G. Markarian
Rinicom Ltd., Lancaster, UK
V.C. da Rocha Jr.
Federal University of Pernambuco, Recife, Brazil
D. Zvikhachevsky
Ascom Network Testing Ltd., Godalming, UK
M.L.M.G.Alcoforado
University of Pernambuco, Recife, Brazil
bayerl@rsm.nl
194 G. Markarian et al.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 195
bayerl@rsm.nl
196 G. Markarian et al.
mobile radio (PMR) and trunked mobile radio networks. In most countries the
legacy analogue networks, which were prone to eavesdropping and provided little or
no data capability, have been migrating to digital technologies such as TETRA1 and
TETRAPOL.2 The TETRA standard has been specifically developed to have a
scalable architecture allowing economic network deployments ranging from single
site local area coverage to multiple site wide area national coverage (see Footnote 1).
In the UK, for example, Airways Solutions Ltd. provided the first public safety
network based on the TETRA technology standard since 2001. The deployed
Airwave network is based on terrestrial trunked radio specifications, as defined in the
European Telecommunications Standards Institute (ETSI), TETRA standard (see
Footnote 1). Initially, the TETRA standard provided an attractive alternative to
analogue radio networks by delivering critical mobile voice communication services
supported by other specific services required by emergency services.3 These included
(but were not limited to) a group calling mode in which a single button push will
connect the user to the users in a selected call group and/or a dispatcher. It also
supports the use of the terminal in a one-to-one walkie-talkie mode, but without the
normal range limitation since the call still uses the network (see Footnotes 1 and 3).
TETRA terminals can act as mobile phones (cell phones) with a full-duplex direct
connection to other TETRA users or the public switched telephone networks (PSTN).
Emergency buttons, provided on the terminals, enable the users to transmit emer-
gency signals to the dispatcher, overriding any other activity taking place at the same
time. In addition to voice and dispatch services, the TETRA system supports several
types of data communication such as status messages and short data services. Unlike
legacy analogue systems, TETRA provides for authentication of terminals, protection
against eavesdropping, air interface encryption and end-to-end encryption.
Figure 14.3 shows the current status of TETRA networks in Europe.4 As follows
from Fig. 14.3, European countries predominately are deploying (or planning to
deploy) either TETRA or TETRAPOL, the exception being Latvia, which has
recently decided to upgrade its First Responder (FR) communications with a
Motorola ASTRO 25 system based on the North American Project 25 (P25)
standard (see Footnote 4).
The specific services offered by TETRA networks can be summarised as follows
(see Footnote 1):
• Wide area fast call set-up ‘all informed net’ group calls
• Direct Mode Operation (DMO) allowing ‘back to back’ communications
between radio terminals independent of the network
• High level voice encryption to meet the security needs of public safety
organisations
1
ETSI EN 300 392-2 v3.2.1.
2
www.tetrapol.com.
3
“TETRA Association”. TETRA Association. 2012-03-22. Retrieved 2012-03-28.
4
PPDR-TC White Paper. The Strategic Roadmap for Next Generation (Broadband) PPDR
Communication Systems (Final Report by the EU FP7 PPDR-TC Project).
bayerl@rsm.nl
14 Mobile Communications for Community Policing 197
• An Emergency Call facility that gets through even if the system is busy
• Full duplex voice for PABX and PSTN telephony communications.
However, requirements of emergency services and Community Policing are
growing fast (e.g., streaming live mobile video, upload/downloading high resolu-
tion still images, location based real-time services) resulting in the need of
on-demand mobile broadband services, and neither TETRA nor TETRAPOL can
meet these requirements in full. Therefore, emergency services around Europe are
looking for alternative solutions, which potentially could replace the existing
TETRA and TETRAPOL networks.
The infrastructure-less networks are not widely used, with an exception of a few
WiFi-based mobile ad hoc network systems (MANETs) (Loo et al. 2012; Boukerche
2008; Toh 2002), which were obtained for trial and piloting purposes. A MANET is
defined as a continuously configured infrastructure-less wireless network of mobile
terminals (nodes). MANET allows free movement of each node in any direction and
as such supports the establishment of new links with other nodes. Each node for-
wards all the traffic to corresponding nodes according to a routing protocol, which
constitutes a core part of MANET, as it defines its overall performance. MANET
could operate as a self-contained network or be a subnet in a larger network.
Combined with a capability for rapid configuration of network architecture,
MANETs are ideally suited for rapidly deployable scenarios faced by first respon-
ders and Community Policing officers. However, as the total throughput is shared
between all users, the performance of MANETs deteriorates as the number of users
in the network grows dramatically (Loo et al. 2012; Boukerche 2008; Toh 2002).
bayerl@rsm.nl
198 G. Markarian et al.
5
INFRA: Innovative and Novel First Responders Applications (Project reference: 225272).
6
HIT-GATE: Heterogeneous Interoperable Transportable GATEway for First-Responders Project
reference: 284940.
7
PPDR-TC: Public Protection and Disaster Relief Transformation Centre (Project reference:
313015).
8
https://www.gov.uk/government/publications/the-emergency-services-mobile-communications-
programme/emergency-services-network.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 199
scenarios are defined for emergency network subscribers. These services are pre-
sented and grouped as following (see Footnote 9 and 13):
• Voice (common voice services)
– Push-to-talk
– Private call
– Group call
– Emergency/priority call
– Call retention/busy queuing
– Direct mode operation
– Ambience listening
– Voice over the public switched telephone network (PTSN)
– Area selection/dynamic group number assignment (DGNA)
• Narrowband data (data transmission up to 384 kbps)
– Messaging and notifications
– Low resolution photos
– Automatic telemetrics
– Location-based information
– Mobile workspace applications
– Access to internal databases
– Access to external sources
• Broadband data (data transmission above 384 kbps)
– Rapid file transfer
– High resolution photos
– Remote operations
– Mapping with geographic information system (GIS) layers
– Mobile workspace applications
– Access to internal databases
– Access to external sources
• Video (data transmission with tighter latency and coding requirements)
– Video transmission
– Video file transfer
– Video call
• Transversal services (extension of voice and data capabilities and
performance)
– Extension of coverage
– Extension of availability
– Security tools
bayerl@rsm.nl
200 G. Markarian et al.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 201
Long Term Evolution (LTE) (Cox 2012) is the most promising networking tech-
nology capable of meeting all the requirements for ESNs. LTE or the E-UTRAN
(Evolved Universal Terrestrial Access Network) was developed by the 3GPP
standardisation group and finalised in release 8 (R8) of the standard.9 It has been
developed as a next generation of wireless mobile communication systems in
response of demands for high spectral efficiency, high peak data rates, short
roundtrip time as well as flexibility in frequency and bandwidth.10
The LTE access network is simply a network of base stations, also known as
evolved NodeB (eNB), generating a flat architecture as shown in Fig. 14.4 (see
Footnote 9). Unlike GSM or UMTS networks it has no centralised controller, and
the eNBs are normally interconnected. Such an architecture allows redistribution of
the network intelligence amongst the base stations leading to significant reductions
in the connection set-up and faster handover. This allows better user experience
during real time data sessions (see Footnote 9; Sesia et al. 2011; Dahlman et al.
2014). In a simplified explanation: unlike UMTS it is possible to install just one (or
a few) LTE base stations (eNBs) with evolve packet system (EPC) software and
organise a broadband wireless communication services between mobile terminals
without having a backbone network. This is a particularly attractive feature of LTE
for emergency services and CP applications, which often require rapid installation
of temporary base stations.
The attractive features of LTE for emergency services and CP applications and
the general improvements in real-time data services were achieved due to the
introduction of the evolved packet core (EPC) (see Footnote 9). Unlike UMTS
(Sesia et al. 2011) networks, where a subscriber is assigned an IP address when data
9
www.3gpp.org.
10
http://www.3gpp.org/specifications.
bayerl@rsm.nl
202 G. Markarian et al.
service is established and released form this IP address when data service is ter-
minated, in a LTE network each subscriber unit is assigned an IP address during the
switch-on and released from this IP address when a device is switched off.
Therefore, EPC is purely IP based and both the real time and data communication
services are carried by the IP protocol with all its inherent advantages (Kevin et al.
2011).
Another strong argument in support of LTE for emergency services and CP
applications is a wide spread of already installed LTE networks, as shown in Fig. 14.5.
The wide availability of deployed LTE networks opens opportunities for first
responders and Community Policing efforts to lease a publicly operated LTE
infrastructure instead of managing their own private network infrastructure (see
footnote 4). This option may not be as easily found for alternative wireless
broadband technologies such as WiMAX11 (Noordin and Markarian 2007), which
is capable of delivering similar performance but is limited to a few specific
applications such as airport surface data links (AeroMACS)12 and telemedicine
(Zvikhachevskaya et al. 2009). As follows from Fig. 14.4 and LTE specifications
(see Footnote 9 and 10), LTE is the most promising technology for future emer-
gency services and CP applications as it is able to provide specific public safety
requirements and supports a high data rate, low latency network as outlined earlier.
11
https://standards.ieee.org/about/get/802/802.16.html.
12
https://www.eurocontrol.int/sites/default/files/article/content/documents/communications/aeromacs-
ectrl-briefing-012016.pdf.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 203
To ensure that an LTE system can meet first responder and Community Policing
requirements and deliver the desired features and services, certain modifications to
the existing 3GPP specification are required. Such a modified network, called
enterprise private network, constitutes communications infrastructure that connects
computers and mobile devices being used by first responder and Community
Policing across the command chain, facilitating continuous rich data accessibility.
The key purpose of an enterprise private network is to interconnect both single
users and groups of users providing satisfactory performance of voice/video/data
signals combined with reliability and security. In the commercial world, enterprise
private networks are used by companies for enhancing and protecting business
operations (Minoli and Minoli 2002).
In response to market demand, HUAWEI has developed enterprise LTE (eLTE)
—LTE Broadband trunking system for first responder and CP operations13
(Enterprise LTE 2013). This is the first LTE broadband trunking solution to provide
voice and video dispatching, which meets almost all requirements outlined earlier
and greatly increases efficiency of first responder and Community Policing opera-
tions. The eLTE System utilises advanced wireless broadband technology, pro-
viding unprecedented data rates (100 Mbit/s downlink and 50 Mbit/s uplink) and
enabling previously impossible services. As a result, a single network can support
multimedia trunking, voice and video scheduling, high-definition video surveil-
lance, ultra-remote data acquisition and mobile office services.
Other features include a compact core network, distributed base stations and
terminal devices that can be used in harsh outdoor environments. The supported
services include:
13
http://e.huawei.com/en/products/wireless/elte-access.
bayerl@rsm.nl
204 G. Markarian et al.
• Mobile office
• Remote data acquisition
• VoIP
• Mobile Video streaming and video surveillance.
These services, combined with their ease of deployment, low CAPEX/OPEX
and high maintenance efficiency, make eLTE a strong candidate for future
infrastructure-based wireless networks for first responder and Community Policing
applications.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 205
14
http://www.logicbuy.com/features/7-disadvantages-of-using-public-wifi-and-public-wifi-solutions.
bayerl@rsm.nl
206 G. Markarian et al.
bayerl@rsm.nl
14
Table 14.1 Characteristics of the leading IP-based Ad-Hoc mesh systems
Category Variable PodNode-R-SD Wave relay 4 Wave relay 5 PodNode-R-HD-MIMO
207
Throughput/mesh Up to 50 Mbps (PHY layer 41 Mbps UDP 150 Mbps 180 Mbit/s
capacity throughput)
(continued)
208
Table 14.1 (continued)
Category Variable PodNode-R-SD Wave relay 4 Wave relay 5 PodNode-R-HD-MIMO
MESH Routing Smart routing proven in over Proprietary wave No information Proprietary smart routing,
500 installations relay® MANET proven in over 500
routing installations
System Through standard web Secure web interface Android applications Web browser, dedicated
control browser network management
system
Audio Embedded within video 16 channels of 16 channels of voice, dual Embedded within the video
compression codec and/or dedicated Push-to-talk active PTT voice - key 2 encoder and/or dedicated
android/windows app (PTT) Voice channels & monitor up to 16 android/windows app
(PodCom) n; G.711 codec with channels at once (PodCom)
toll-quality audio
bayerl@rsm.nl
Video Video MJPEG/H.264 (MPEG-4 Fully Integrated H.264 HD An option to use build in
encoding compression Part 10/AVC) and/or video encoding/decoding H.264 video codec and a
dedicated app for standalone proprietary app
peer-to-peer (called PodCom) for secure
voice/video/data peer-to-peer
communications video/voice/data
communications
G. Markarian et al.
14 Mobile Communications for Community Policing 209
15
http://www.gilat.com/dynimages/t_whitepapers/files/Cellular%20Backhaul%20with%20Mesh%
20-%20White%20Paper-2011-11.pdf.
16
http://deltenna.com/products/lte-basestations/.
17
http://www.dute.co.uk/news/.
bayerl@rsm.nl
210 G. Markarian et al.
Fig. 14.9 Topology of LTE MESH backhauling with PodNodes (diagram is provided by
Horsebridge Defense and Security Ltd.)
14.4 Conclusions
18
http://deltenna.com/products/lte-basestations/.
bayerl@rsm.nl
14 Mobile Communications for Community Policing 211
parameters for LTE systems and provide a comparison between the two most
widely used infrastructure-less ad hoc mesh networking solutions.
Finally, we show that new solutions are emerging on the market, which utilise
advantages of both topologies by combining infrastructure-based and
infrastructure-less topologies in a hybrid network architecture. We outline main
advantages of these solutions in new, previously impossible services in challenging
operational scenarios.
References
Boukerche A(ed) Algorithms and Protocols for Wireless, Mobile Ad-hoc Networks. Nov. 2008,
Wiley-IEEE Press, ISBN: 978-0-470-38358-2, 496 pages
Campista MEM, Esposito PM, Moraes IM, Costa LHMK, Duarte OCMB, Passos DG, de
Albuquerque CVN, Saade DCM, Rubinstein MG (2008) Routing Metrics and Protocols for
Wireless Mesh Networks. IEEE Networks, Jan./Feb., pp 6–12
Cox C (2012) An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile
Communications 1st Edition. Wiley, p 311
Dahlman E, Parkvall S, Skold J (2014) 4G: LTE/LTE-Advanced for Mobile Broadband 2nd edn.
Emergency Services Mobile Communications Programme (ESMCP) (2011) Home Office, UK
Enterprise LTE—A serious contender for private wireless network—a Forester Consulting
publication, Thought Leadership Paper, Dec. 2013
Goldsmith A (2005) Cellular Systems and Infrastructure-Based Wireless Networks. Cambridge
University Press, pp 505–534
Heine G (1998) GSM Networks: Protocols. Boston/London, Terminology and Implementation.
Artech House Mobile Communications, p 407p
Hossain E, Leung K (2008) Mesh Networks: Architectures and Protocols, Springer,
Jackson D (2009 ) Public-safety groups support LTE at 700 MHz. Urgent Communications, June 11
2009. (http://urgentcomm.com/networks_and_systems/news/700-mhz-lte-support-20090611)
Kevin R, Fall W, Stevens R. (2011) TCP/IP Illustrated, vol 1. The Protocols (2nd edn)
(Addison-Wesley Professional Computing Series)
Loo J, Mauri JL, Ortiz JH Mobile Ad-hoc Networks: Current Status and Future Trends. CRC
Press, Feb 2, 2012-Computers-538 p
Manso M, Alcaraz Calero JM, Barz C, Hafsøe Bloebaum T, Chan K, Jansen N, Trethan Johnsen F,
Markarian G, Meiler P-P, Owens I, Sliwa J, Wang Q (2015) SOA and wireless mobile
networks in the tactical domain: results from experiments. Military Communications
Conference, MILCOM 2015–2015 IEEE. IEEE, pp. 593–598
Markarian G Wireless Communication Networks for First Responders. Research Seminar, July
2016, Federal University of Pernambuco, Recife, Brazil
Markarian G, Singh F (2008) RHINO: armoured plated networking with intelligent high speed
wireless ad-hoc capability. In: Proceedings of SPIE 6982, mobile multimedia/image process-
ing, security, and applications, p 698206 April 03, 2008
Minoli D, Minoli E (2002) Delivering voice over IP networks. 2nd edn. Wiley Publishing Inc, 477 p
Noordin K, Markarian G (2007) Cross-Layer Optimization Architecture for WiMAX Systems
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio
Communications, 3–7 Sept. 2007
Panitzek K, Schweizer I, Bradler D, Mühlhäuser M (2011) City Mesh—Resilient First Responder
Communication. Proceedings of the 8th International ISCRAM Conference—Lisbon, Portugal,
May 2011, pp 1–10
bayerl@rsm.nl
212 G. Markarian et al.
Rayment SG (2007) Bernard Herscovich Integrated wireless distribution and mesh backhaul
networks, US 7164667 B2
Romain F, Navid N (2015) Wireless mesh backhauling for LTE/LTE-A networks. MILCOM
2015, 2015 IEEE Military Communications Conference, October pp 26–28, Tampa, FL, USA
Sesia S, Toufik I, Baker M (2011) LTE—The UMTS Long Term Evolution: From Theory to
Practice, 2nd edn. Wiley, p 792
Toh H-K (2002) Ad-hoc Mobile Wireless Networks: Protocols and Systems 1st Edition. Prentice
Hall PTR,
Zvikhachevskaya A, Markarian G, Mykhailova L (2009) Quality of Service consideration for the
wireless telemedicine and e-health services. IEEE WCNC Symposium
bayerl@rsm.nl
Chapter 15
Importance of Cyber Security
Alex Tarter
15.1 Introduction
The 21st century has seen society embrace computers and the information age at a
staggering pace. In much of our daily lives we are never really more than a few feet
away from a computer, excluding the smartphone in our pockets and the PC on our
desk. We may not consciously realize it, but computers are embedded everywhere
from the cars we drive and the traffic lights we follow to the power and water
utilities we rely on every day. Society has welcomed the efficiency provided by
computer automation to the extent that we now rely on its security and integrity for
much of our lives. Unfortunately, as the early hacking community realized, the way
a computer was designed to work and how it actually works are typically two
different things. And what started as a fun underground activity has since evolved
into a multi-billion dollar cybercrime industry. As Community Policing (CP) is
closely correlated with the daily lives of citizens, it could be affected by the cyber
threats in the same way as the citizens it is supposed to support. Furthermore,
combating cybercrimes or dealing with its aftermaths could become integral part of
CP operations. Therefore, it is essential to understand the main concepts of cyber
security together with existing and emerging threats it possesses (see Chaps. 2–4).
This chapter outlines the genesis of cybercrime, their changing incentives and
the challenges involved in combating it. As we demonstrate, cybercrime has many
similarities and parallels with traditional fraud; however, cybercrime benefits from
two unique elements: scalability and anonymity. The same technological advances,
A. Tarter (&)
Thales Cyber and Consulting, Thales Group, Thales, UK
e-mail: alextarter@gmail.com
bayerl@rsm.nl
214 A. Tarter
which have allowed an account holder to check their bank balance anywhere in the
world, have also allowed criminals from around the world to target that person’s
bank account. Similarly, the same technologies that allowed distribution of news
and information are utilised by terrorists for radicalisation of certain groups in
society. Geography and time have traditionally constrained a criminal’s potential
target list; for instance, there are a limited number of houses a burglar can rob in a
single night. Therefore, criminals must choose their targets carefully.
A cyber-criminal, however, can reach thousands of targets at the push of a button,
completely altering their incentives.
This creates new types of challenges for Community Policing, which needs to
take into account the possible geographical separation of criminals and victims
while perpetrators of the crime are often unreachable to Community Policing due to
geographical constrains. Just as computing has made legal businesses more effi-
cient, it has done the same for criminal ones as well. The internet has made large
scale cybercrime possible, switching a cyber-criminal’s incentive from only tar-
geting smaller numbers of high value targets to also targeting large numbers of
lower value ones. In many ways scamming a small amount from a lot of victims is
less risky and more profitable than scamming a large amount from a few victims.
And this also brings new challenges to CP operations.
Technology and cybercrime are often viewed as intimidating and complicated
due to the lack of understanding of how computers work, and the way they are
portrayed in entertainment (e.g., TV shows and movies). This chapter clarifies
common terms and techniques from hacking and ransomware to the dark web and
cryptocurrencies like BitCoin and makes them accessible to a wider audience. More
importantly the chapter outlines why cyber-criminals have embraced these tech-
nologies, how they use them and how law enforcement—and more specifically
Community Policing—can realistically investigate and operate in this new age.
Simply put, the internet has made the world a smaller place with few adherences to
national borders and a higher degree of anonymity. This makes criminal attribution,
evidence collection and CP investigation more complicated, but not impossible (see
also Chap. 6” on radicalisation).
One of the key concepts outlined in this book is that technology does not exist in
isolation. The cyber world and the physical world are intertwined. We use the cyber
world to communicate between people in the physical world, and we use it to control
physical processes and machinery. Policy and procedures that affect the cyber world
ultimately also affect the physical world. For instance, encryption can be seen as a
double edged sword. It provides a high degree of protection to both national agencies,
corporations, citizens and criminals alike. Despite the desire and technical feasibility
of requiring legal intercept ‘backdoor’ into commercially encrypted devices, this type
of solution is destined to fail in practice leaving everyone except the criminals worse
off. As society continues to integrate and rely on the cyber world for their everyday
life, cybercrime will only become more prevalent and detrimental. The scalability
that computers and the internet provide gives cyber-criminals the ability to have an
bayerl@rsm.nl
15 Importance of Cyber Security 215
impact on society and citizens that is bigger than ever before. And this certainly will
be reflecting in CP operations of the future.
Now more than ever the physical and cyber worlds are becoming increasingly
intertwined. Without always realizing it, society is becoming increasingly reliant on
the security and integrity of computer systems. Almost all aspects of regular life
from shopping to banking or correspondence to socializing take place online and
via a computer. This means that for the general public, their online persona can
easily be as important as their real world one. Cybercrime that targets the privacy
and security of their online activity can have real world impacts on reputations, job
security, identity and finances. While this is becoming more well-known and
appreciated, the public often fails to realize just how dependent the real world is on
computers and cyberspace. Our power stations, cars, sewage systems and petrol
pumps are all computer controlled, and cybercrime that targets these computer
systems has the potential to impact large sections of society up to and including
nations (Zetter 2015). Protecting our critical infrastructure (financial markets,
utilities, healthcare, government and transportation) from cyberattack is therefore a
national priority and one that as we shall see requires an international response.
Hacking and cybercrime has been with us for almost as long as the internet itself.
However, it is only recently, as society has become reliant on cyberspace, that the
financial rewards of cybercrime and its effectiveness have become serious.
Unfortunately, as with most types of crime and malicious behaviour, there is not a
simple solution or technology that can mitigate the problem. In fact, in many cases
the technology used to benefit society has been repurposed by criminals for their
own gain. This chapter attempts to outline the different aspects of cyberspace and
some of the technologies used within it that can be used for both good and evil. The
better informed and comfortable society and law enforcement are at operating
securely within cyberspace the harder they make a malicious actor’s job.
bayerl@rsm.nl
216 A. Tarter
intended. As a result these systems can be operated and used in ways the designer
never imagined or anticipated. This is not always a bad thing; for instance, the
telephone system was originally designed to carry human voices, but some clever
engineers realized that you can use telephones also to carry machine voices (digital
data) and from there we created the internet. As such a hacker can be defined as
someone who attempts to make a cyber system work in a way that it was not
intended or designed to. The motivations, mission and actions of a hacker determine
whether they are a good (whitehat) or bad (blackhat) hacker, rather than the phi-
losophy itself of finding and exploiting flaws.
As we shall see, what makes hacking so dangerous is not the act of discovering a
flaw in a system, but the fact that it can be so easily reproduced and performed by
non-technical actors. As with most technical activities, finding flaws in a computer
system is both difficult and time consuming. To become good at it takes time, skill
and patience. However, once a flaw is discovered the predictable nature of com-
puters makes it easy to reproduce.
One of the early famous and reproducible ‘hacks’ was performed by John Draper
aka ‘Captain Crunch’. John realized that the US telephony system was controlled by
computers that used different tones to indicate different actions, from the fact that
money had been put into a telephone box to setting up a long-distance connection.
Therefore, if they could replicate these tones (or notes), they could make the tele-
phony system do whatever they wanted from making free phone calls to routing
other phone calls around the world. One such tone was 2600 Hz that, if whistled into
a telephone handset, would allow them to make free phone calls. Discovering how
the telephony system worked was complicated and not something just anyone could
do, but what made these hackers (or phreakers as phone hackers are called) famous
was that at the time ‘Cap’n Crunch’ cereal included a whistle in boxes as a free toy
that exactly produced the 2600 Hz tone. Now any child with the cereal box whistle, a
phone line and some simple instructions could make free phone calls whenever they
wanted (Rosenbaum 1971). While this is a fun story, it demonstrates that, while the
inner-workings of a ‘hack’ can be complex to discover and understand, reproducing
it once known and documented is pretty easy. In the same way that it takes a skilled
armourer to create a gun that works, once created anyone can fire it.
If hacking is all about making cyber systems work in unanticipated ways,
cybersecurity is the process of ensuring that technology only operates as intended.
Cyber security has fast become a buzzword in almost every industry and a concern
for everyone, and it is easy to see why. No matter how skilled a burglar is, there is a
real world limitation to how many buildings they can break into in a given night.
There is no way for the same thief to target lots of people in lots of countries around
the world at the same time. But in the case of a cyberattack it certainly is possible;
the attacker can program a machine to do the work and have it attack lots of people
at the same time all from the comfort of their home. As we shall see, technology has
made cyber-related crime scalable in a way that physical-related crime could never
be. As with every other industry, cybercrime has benefited from the information
revolution. Cybercrime is now more efficient, scalable, anonymous and
bayerl@rsm.nl
15 Importance of Cyber Security 217
international than pretty much any other criminal enterprise, which is why its
prevalence has dramatically increased in recent years (Goodman 2015).
The underlying principles of cyberattacks are not that different from fraud—it is
about tricking someone or something into acting in a way that is not in their best
interest. Cybersecurity attempts to prevent and detect when such a fraudulent
request is made and to protect both the data, devices, networks and people from the
attacker. While this seems straight forward it is in fact extremely difficult, because
computer systems are now so complicated and complex that their interactions
cannot always be fully understood even by their designers.
Thinking of hacking as fraud is a useful analogy, because an attacker will very
rarely target their victim directly. Instead they will first compromise an interim
system or computer and use that as a go-between (also called a proxy) to the target
system. In many cases there can be multiple layers of proxies, each providing a
degree of separation between the attacker and the victim. These proxy systems are
typically unaware that they have been compromised and so their owners fail to
realize that their systems are not completely under their control. As computers do
not remember anything unless instructed to do so, this can make cyber forensics
(i.e., the collection of cyber related evidence) challenging. Accurate and auditable
logs need to be maintained throughout cyberspace in order to track an attacker back
through their proxies. However, this challenge can be worth attempting, as there
have been many cases where an attacker has slipped up and left a footprint such as a
name, handle, credit-card number or other identifying information in the creation
and maintenance of their proxies.
When malicious hackers attack cyberspace, they can target a victim’s data,
devices, networks or the victim themselves. By sending them spam pretending to be
from their bank the attacker is attempting to hack (social engineer) the victim
themselves into revealing private and valuable information. In some of the early
days of criminal activity in cyberspace malicious hackers blackmailed gambling
sites into paying protection money (Menn 2010). If the sites did not pay, the
attackers would unleash a denial-of-service attack during large sporting events that
prevented legitimate users from placing bets, and the firms would lose a huge
amount of business. Denial-of-service attacks are attacks on a victim’s networks;
the servers tasked with handling customer requests are sent an overwhelming
amount of fake data so that the servers spend all their time handling the bogus
requests such that legitimate requests are ignored. The same style of attack was also
used recently as part of the cyberattack on the Ukrainian power grid on December
23rd 2015. The attackers launched a denial-of-service attack on the power com-
pany’s customer service centre telephone lines, so when the attack occurred none of
those affected could phone up and report the incident impacting the company’s
ability to provide a coordinated response. This attack demonstrates that cyber
attackers do not just target PCs and private data, they can also impact the supply of
electricity to people’s homes and their telephone lines.
However, it is attacks on data within cyberspace that has attracted
cyber-criminals the most, from stealing private or proprietary information to
manipulating bank transfers or encrypting someone’s data for ransom. Digital data
bayerl@rsm.nl
218 A. Tarter
One of the most important aspects to remember about the internet and cyberspace
more broadly is that it ultimately is just machines talking to machines. Humans may
provide the input and direction, but once the keyboard characters are pressed and
the mouse button clicked, it is computers that run the instructions, send the com-
munications and perform the actions. While the intention is human, the action is
machine. Why this is so important is that one of the most challenging aspects of
cybersecurity is determining the attribution of an attack to a person or group. Law
enforcement can potentially see the impact of a cyberattack, review any log evi-
dence and potentially identify the identity of the machine initiating the attack, but
that initiating machine is very rarely owned or managed directly by the attacker.
Every computer directly connected to a network will have an IP address; for
computers directly connected to the internet this address will be unique across the
entire world, which is how computers are able to communicate with each other
anywhere in the world. Just as with a letter sent through the post with a sender’s and
receiver’s address on it, every packet on the internet has a source and destination IP
address. Through investigation of logs and records forensic investigators can often
find out the source IP address for a given cyberattack. However, knowing which
computer sent the packet is not the same as knowing ‘who’ instructed it to be sent.
Computers run the instructions they are given. In most cases these instructions
are installed by their owners (e.g., applications), so that they will operate in a
known and expected manner when certain keyboard strokes are made, mouse
buttons clicked or packets received. In an ideal world the actions of a computer
could be directly tied to the intentions of the owner through the applications they
bayerl@rsm.nl
15 Importance of Cyber Security 219
installed and the input they gave. Unfortunately this is not an ideal world; a
computer has no ability to correctly identify that the instruction it is asked to run
came from its owner or a hacker. From the computer’s point of view there is no
difference between a user sitting at a keyboard and malware running on the system.
A computer will run any instruction given to it—no matter how it got there. This is
how hackers get computers they do not own to perform actions on their behalf
without their owner’s knowledge or authorization.
One of the key challenges for an attacker wishing to use multiple proxy devices
is that they are not always online at the same time, new anti-virus signatures may
detect and remove the malware and for large botnets (a group of computers all
infected with the same malware) there are thousands and sometimes millions of
computers to individually manage. It becomes too risky and too time consuming for
an attacker to remain constantly online controlling their proxy devices, which is
why they delegate this task to a common type of proxy called a ‘Command and
Control’ (C2) server. A C2 server stays continuously online and waits for those
computers infected with malware to reach out to it. This way the attacker only
needs to contact the C2 server and leave instructions on what they wish the malware
to do. Then, whenever the malware checks in, the new instructions are downloaded
and executed. As long as the attacker is careful about how they connect to the C2
server, and they are able to keep the C2 server up and running, it is very difficult to
apprehend the attacker or prevent new malicious activity. Just like a regular crime
syndicate, the foot-soldiers (i.e., malware infected computers) never speak or hear
the commands directly from the boss (attacker), instead their instructions are dis-
seminated via a series of intermediaries. Regaining control of one of the
foot-soldiers is not necessarily going to be able to tell you or lead you directly to the
attacker.
What makes cybersecurity and law enforcement’s jobs harder is that criminals
frequently hide or continuously move their C2 servers and establish them in
jurisdictions and countries different from where they reside. An attacker can then
make multiple hops from their country to their C2 server and from there launch
their attack. Should law enforcement find and obtain the C2 server, they will still
have to work with other agencies to trace back the hops from the C2 server to the
attacker. Intentionally hampering police efforts by crossing national boundaries is
now considered standard practice for malicious hackers (Menn 2010).
So, as we can see, cyberspace has given an attacker a much greater capability for
anonymity and scalability by relying on machines rather than people to carry out
their activities, and attribution for an attack is hard to determine because the
machine which launches or coordinates the attack is often the first in a long proxy
chain back to the attacker. Within cyberspace, just because you may own a system,
it does not mean you are always in control of what it does. Cybersecurity techniques
such as application whitelisting, firewalls, antivirus and intrusion
detection/prevention systems are meant to prevent compromised and unauthorized
access, but there is no guarantee that they will always be successful.
bayerl@rsm.nl
220 A. Tarter
15.4 Malware
bayerl@rsm.nl
15 Importance of Cyber Security 221
newest and most unique components if other more well-known methods will work
just as well.
This is how Advanced Persistent Threats (APTs) are denoted. Just as an attacker
will check to see if a window is open before attempting to pick a door lock, a cyber
attacker will attempt a more routine method of attack before escalating to using
something new. Unfortunately, this means that the advanced, potentially nation
state components of today, once discovered, rapidly become the regular compo-
nents of the cybercriminal and hacker of tomorrow.
One of the most powerful tools to maintain digital data and cybersecurity is
cryptography. Cryptography provides a variety of capabilities including encryption,
hashing and signing that are relatively straightforward to implement and when
combined in the right way can overcome some of the issues of data privacy and
cyber anonymity. Encryption is the practice of using mathematical techniques to
turn intelligible data into unintelligible data and back again through the use of
encryption keys. If performed correctly, encryption can be used to ensure that only
those who possess the correct key can decrypt the data and make use of it. This
helps mitigate some of the risks of data theft should an attacker steal encrypted data;
since as long as the key remains secret and the attacker does not guess it, the data
will remain unintelligible.
It can be inferred therefore, that encryption only provides protection if the
encryption key cannot be stolen or guessed by the attacker. This is why the most
important part of any encryption system is the way of creating, distributing and
securing its keys—what is referred to as key management. The majority of
encryption algorithms are what are called ‘symmetric’ key techniques—that is to
say, the key used to encrypt and decrypt is the same. Symmetric key algorithms are
analogous to a mortice door lock—they use the same key to both lock and unlock
and anyone with a copy of the key can both lock and unlock the door. While
symmetric key algorithms such as the famous ‘AES’ are used everywhere, there is
another family of techniques just as important. Much of cyberspace fundamentally
relies on a certain technique called asymmetric cryptography that uses two keys
instead of one: one that is public and the other that is kept private. This is a clever
technique that can be used to identify people and devices, securely distribute AES
encryption keys and provide validation of a digital document’s provenance.
While symmetric keys use the same key to lock and unlock, asymmetric keys are
slightly different and instead use two: one for locking and the other for unlocking.
A good analogy for this is a padlock and key. The padlock is the encryption key—
you can use it to lock something, but you cannot use another padlock to unlock the
first. Instead you need a key. Likewise the key can unlock a padlock, but you
cannot use it to lock something—that requires a padlock. What makes this so
powerful is that due to some clever mathematics, even if you have the padlock,
bayerl@rsm.nl
222 A. Tarter
you cannot work out what key unlocks it; and likewise if you have the key, you
cannot create the padlock. It is this simple concept that underpins everything from
the security of your online banking to the ability to digitally sign documents and
validate your identity. This is done by making one key ‘public’ and keeping the
other private and secret. If everyone knows my public key then they can use it to
lock something knowing that only my private key can unlock it, and likewise if I
lock something with my private key then everyone with my public key can unlock
it and thereby validate that it came from me.
In the real world we have multiple methods of authenticating that someone is
who they say they are such as checking their identity cards, their appearance, the
way they speak or asking them what they know. As we have seen in cyberspace this
is much more difficult to accomplish, as all digital data can be perfectly copied; in
other words a photocopy of an identity is indistinguishable from the original in
every way. This is a real problem for e-commerce, as if I want to do online banking,
I want to be sure that I am really speaking with my bank, and my bank wants to be
sure that it is really me and not an imposter. Now with public–private keys this
problem can be solved: If I know my bank’s public key, all they need to do is lock
some information using their private key and send it to me; if my copy of their
public key unlocks the data, then by inference I can be sure I am speaking with my
bank.
These simple tools have given us the means by which to create an entire
e-commerce industry that is both secure and easy to use. It also provides an
effective method to prove the real world identities of people, companies and devices
from within cyberspace. However, this only holds true as long as entities can keep
their private key secret. If you have someone’s private key, then you can imper-
sonate them at will—it is the digital equivalent of stealing and then using some-
one’s fingerprint. This is the single biggest issue in the role of encryption within
cyberspace—the ability to generate, and securely store private keys. Steal the key
and you steal the identity and protection it offers. If you steal a bank’s private key,
you can impersonate it on the web, and the general public will not be aware that
they are talking to a fraudulent site and not the real bank.
Key management in the real world is typically the biggest weakness in any
encryption system and the aspect most likely to be attacked. After all if a thief wants
to steal a bike, is it easier to cut through the chain, steal the key or use a duplicate?
In most airports you can buy a U.S. T.S.A. approved luggage lock that can be
opened by a TSA representative using a master key set. However, ensuring that
only authorized TSA representatives have those keys was never going to be suc-
cessful due to the wide number of people who needed authorization, how they were
handled and how they were made. Which is why you can now go online and buy
for yourself a set of master keys that can open any approved luggage lock, defeating
one of the primary reasons for using a lock.
This is where lawful access in cyberspace is incredibly difficult, if not impossible
to achieve in practice. While it is technically possible to build lawful access into a
commercial system such as a smartphone that uses a lawful intercept master
public–private key pair, such a system can never be operationally secured over its
bayerl@rsm.nl
15 Importance of Cyber Security 223
lifetime. It is flawed because encryption keys are digital and therefore easily copied
and reproduced, and like all digital data they are notoriously difficult to maintain
control over. If there was such a key that could unlock a highly popular product,
then knowledge of this key would be incredibly valuable and something that many
attackers would target. One slip in the handling, distribution and use of that key will
risk it to being exposed to unauthorized entities. Unfortunately a digital secret that
important has always leaked in the long run, either intentionally or unintentionally,
and once exposed it cannot be forgotten or changed. While the technical and
political desire is there, we do not know operationally how to make a digital secret
secure yet usable (Weitzner 2016; Blaze 2016).
15.6 Ransomware
bayerl@rsm.nl
224 A. Tarter
While ransomware could not have existed prior to the widespread knowledge and
availability of strong encryption techniques, it also could not have been as successful
without an easy, anonymous and universal payment system. There is no easy method
of sending physical cash over cyberspace, and most other methods from credit cards
to PayPal do not provide anonymity; that is, until the rise of crypto currencies such as
Bitcoin. Bitcoin can be thought of as cash for the internet—almost impossible to
forge but anonymous to use. The ownership of a Bitcoin (or piece of a Bitcoin) can
be tracked from creation to the current holder, which is what provides the currency’s
integrity and trust. A technical description of how Bitcoin works is beyond the scope
of this book, but the underlying concepts are easy enough to understand.
In crypto currencies your identity is denoted by a public–private key pair, which
you create. There is no central registration service in the real world, which means
there is no mechanism to associate a public key with a real person. In fact many
people can and do have multiple Bitcoin public keys, which combined gives a
Bitcoin identity a very strong and practical degree of anonymity in the real world.
A Bitcoin transaction uses these public–private keys to digitally sign a transfer of
Bitcoin, so that there is cryptographic proof that the sender authorized the transfer
and the correct recipient has received it. The sender can transfer one, multiple or
even a fraction of a Bitcoin to a recipient, and at certain exchanges these Bitcoins
can be converted into different national currencies based on the current exchange
rate.
This is how attackers were able to monetize ransomware so effectively. They
required their victims to send a small amount of Bitcoins to a specific public key.
The anonymous holder of the corresponding private Bitcoin key could then launder
that money through other Bitcoin identities and finally through an exchange system
into real money. While the ransom is being paid, law enforcement only has an
anonymous public key to go on, which means there is no bank account to freeze or
identities to go after. The owner of the Bitcoin wallet (what the private key and
associated data is commonly known as) can travel anywhere in the world and use
any exchange they wish, which makes law enforcement’s job much harder in
tracking the owner’s identity and preventing them from obtaining the ransom
money.
Bitcoin is now international with exchanges all around the world. As with all
financial instruments the value of a Bitcoin is only worth what someone is willing
to pay for it. Unfortunately for law enforcement there is an international demand for
an anonymous currency system to facilitate both legal and illegal transactions.
Accordingly there are exchanges around the world, where people are willing to pay
and exchange Bitcoins to hide private, embarrassing or potentially illegal transac-
tions. To associate a Bitcoin wallet (or private key) with a real person requires slow
tracking of Bitcoin transactions, what they are used for and ultimately infer the
identity of the owner.
bayerl@rsm.nl
15 Importance of Cyber Security 225
bayerl@rsm.nl
226 A. Tarter
I use three random relays to hide my activity: I first write my letter and place it in an
envelope addressed to the final destination, then I place that letter in another
envelope addressed to a random relay and then finally that envelope into a third
envelope addressed to another random relay. Therefore what I actually post is a
letter inside multiple envelopes each addressed to a random person. So the postman
sees me posting a letter to the first random recipient, who opens the envelope and
finds a letter addressed to someone else, so they put the enclosed letter back in the
post and it is delivered to the next random relay. This sequence is continued until
the final step, when the actual recipient receives their envelope and finds the letter
inside. If we use encryption to hide the contents of the letter and the enclosing
envelopes then neither the postman nor each recipient relay can open the letter and
peak inside at the contents. The more the number of messages and participants
grow, the more anonymity is obtained as it becomes logistically harder and harder
for someone monitoring the network to keep track of all the messages and potential
communications.
Despite their legitimate use cases, criminals have co-opted Tor, Bitcoin and
BitTorrent for their own version of e-commerce, buying and selling illegal products
and services anonymously over the internet. One of the most famous recent
examples of this was the so called ‘Silk-Road’. This was a criminal version of
Amazon, where you could buy illicit items such as drugs and even purchase illegal
services such as prostitution and murder for hire. The site became a popular des-
tination for black market activities, and it even had rating and customer review
sections to ensure a high customer satisfaction. Due to the anonymizing features of
Tor and Bitcoin, despite the site being up and accessible, it took law enforcement a
long time to discover the owner of it and build a case to shut it down.
Due to the strength of encryption, the anonymity cyber services can provide and
the easy scalability of internet activity, law enforcement is finding that it currently
takes more resources to take down illegal services and identify cyber criminals than
it does for criminals to begin to use them. Hence, while they continue to provide a
low risk means by which to illicitly make large sums of money, cybercrime will
continue to take its toll on victims.
If there are three concepts to remember when thinking about cybercrime, they are
curiosity, fraud and scalability. Hacking for all its nefarious connotations is at its
heart curiosity. It is the human desire to understand how things work and how they
break that has spawned the hacking, security research and tinkering communities.
As long as humans remain curious, there will always be new and innovative ways
to use what they find for both good and bad purposes.
In some way, almost all cybercrime can be described as a type of fraud, whether
it is criminals pretending to be your bank, hackers masking their location via
proxies, malware pretending to be legitimate software or an attacker sending fake
bayerl@rsm.nl
15 Importance of Cyber Security 227
bayerl@rsm.nl
228 A. Tarter
Therefore, in addition to the concern of wide spread low level attacks (such as
ransomware), there is also the concern of targeted high impact attacks on critical
infrastructures and the switch to attacking more specialized embedded devices.
From a law enforcement perspective international cooperation is key. Even
though cyberspace provides a great deal of anonymity it is not always complete and
attackers still make mistakes. Forensics and investigative work typically focus on
the areas in which cyberspace and the real world interact. For instance, how a web
domain or hosting service is paid for, what email addresses are used, any meta-data
in the malware code or from which internet location (e.g., web café) a web-chat or
social media post came from. However, it is not always the case that the attacker
and victim are in the same location or under the same jurisdiction. Evidence must
be collected and processed from multiple jurisdictions in many cases.
As in all endeavours, humans are fallible and liable to make mistakes. Those
criminals who are comfortable operating in cyberspace for their illegal activity are
also highly likely to use it for entertainment and social activities. This gives an
increased chance that they use the wrong identity (or handle) in the wrong forum or
use the same IP address to buy a movie as they use to control a malware C2 server.
Finding and following those digital footprints in cyberspace is often the only way to
prosecute computer fraud, extortion, bullying or black-market activity.
It should be remembered that technology is blind to intentions, and those
techniques often created for legitimate and good reasons can be co-opted and used
to great effect for illegitimate activity. Bitcoin, BitTorrent, and Tor are three good
examples of this, and there are countless others. Because of the way cyberspace
works and the ease with which digital data can be replicated, it is very difficult if not
impossible to ensure an idea, concept or technology once created can be forgotten
or banned. Encryption is a prime example of this: despite the best intentions of law
enforcement in requesting lawful access, there are plenty of freely and easily
available alternative solutions on the Internet with no such access that criminals and
citizens alike can use, which are unbreakable. Criminals and attackers are just as
paranoid and protective of their private information as corporations and individuals,
and so use similar technologies and solutions to ensure their privacy against lawful
access.
Cyberspace is made up of machine-to-machine communication. We have
designed machines to do exactly what we tell them to do, we just forgot to be
explicit about who to listen to. This is why fraud and impersonation (spoofing) is
such an important part of any cyberattack. Cybersecurity is more like
counter-espionage than traditional military defence. An attacker attempts to
fraudulently gain access to a system, and once they have successfully compromised
it, they begin to subvert any abilities to detect and remove them. This is because,
while it is easy to tell a machine to do something, it is very difficult for a machine to
know who did the telling. Once an attacker is inside a system it is difficult to tell the
extent of the compromise or what parts of the system can be trusted; sometimes it is
very difficult to even tell that you are compromised. Therefore, even as we rely
more and more on technology and computers in our lives, we should also have a
bayerl@rsm.nl
15 Importance of Cyber Security 229
bayerl@rsm.nl
230 A. Tarter
References
Autor DH (2015) Why are there still so many jobs? The history and future of workplace
automation. J Econ Perspect 29(3):3–30
Blaze M (2016) Hearing on “deciphering the debate over encryption”. US House of
representatives, committee on energy and commerce subcommittee on oversight and
investigations. US House of Representatives, Washington, DC
Chandler A (2016) How Ransomware became a billion-dollar nightmare for businesses. The
Atlantic
Distler D (2007) Malware Analysis: An Introduction. SANS Institute InfoSec Reading Room
Goodman M (2015) Future crimes: everything is connected, everyone is vulnerable and what we
can do about it. Doubleday
Martin A (2007) Exploitation kits revealed—MPack. SANS Institute InfoSec Reading Room
Menn J (2010) Fatal system error: the hunt for the new crime lords who are bringing down the
internet. Public Affairs Books
Rosenbaum R (1971) Secrets of the little blue box. Esquire
Schneier B (2012) Liars and outliers: enabling the trust that society needs to thrive. Wiley,
Indianapolis
Weitzner D (2016) Hearing on “deciphering the debate over encryption”. US House of
representatives, committee on energy and commerce subcommittee on oversight and
investigations. US House of Representatives, Washington, DC
Zetter K (2015) Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon.
Broadway Books
bayerl@rsm.nl
Chapter 16
Applying Computational Intelligence
to Community Policing and Forensic
Investigations
16.1 Introduction
bayerl@rsm.nl
232 A.M. Ali and P. Angelov
(Guarino 2013). Structured data is easy to organize and process, while unstructured
data does not have a common structure (e.g., social media data, images and streaming
data). Unstructured data is computationally hard to combine and analyse. The
challenges in the big data era are how to process and integrate such heterogeneous
data (Jagadish et al. 2014). Social media data such as from Facebook or Twitter has
become an issue because the data have different modalities, is noisy and often too
short (e.g., data from text messaging and WhatsApp). Since the 2000s, there are
many applications that have been developed to support the introduction of iPhone
and Android. Thus, more digital data are being created every day. This revolution
increases the number of data and creates a big data issue (Qi et al. 2014).
Face recognition is a common system used in forensic investigations and could
bring significant benefits to CP operations. There have been many research studies
on face recognition over the past 20 years. Face recognition is mostly applied to
surveillance, identification and verification of identity (e.g., passports). To verify
the identity, two face images are compared and measured, leading either a match or
a non-match (Eidinger et al. 2014). The identification process compares a given
image with the entire image base where the top match will result in the identity of
the subject (Eidinger et al. 2014). Gender and age can be detected by face, but most
research is about soft biometrics. Soft biometric includes physical traits, which are
derived from the face (e.g., skin colour, hair colour, eye colour, beard, etc.), body
(e.g., height, weight) or accessories on the body (e.g., glasses or the colour of
clothes) (Dantcheva et al. 2011). Soft biometrics can distinguish individuals and
help significantly in the identification and investigation in forensic processes
(Dantcheva et al. 2011).
Gait recognition is another technique that recognizes how people walk. The gait
is one of the behavioural biometrics, which can be used from a distance and could
provide significant support to Community Policing operations. Types of gait
include (Bhowmik et al. 2016):
• Normal gait: normal walking style
• Propulsive gait: stooped and rigid posture, e.g., because of drugs, Parkinson,
etc.
• Spastic gait: foot dragging and stiff posture, e.g., because of stroke, brain
tumour
• Steppage gait: one foot hanging and scraping the ground
• Flexed hip and knee: legs are flexed at the hip and knees resulting in crouching
Gait can be used in surveillance and identification systems, which can help law
enforcement officers in forensic and/or CP investigation. Every biometrics (face,
fingerprint, iris, etc.) have limitations, which gait can help to overcome by com-
plementing the result from other biometrics. Sometimes the face cannot be iden-
tified, because of a cover over the face. Then gait can be critically important in
helping to recognize the suspect (Bouchrika et al. 2011).
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 233
Data can be in the form of text, numbers, images, videos or signals. In reality, data
are heterogeneous, which means they often have several forms at the same time; for
instance, data can include text, numbers and images. Heterogeneous data can
bayerl@rsm.nl
234 A.M. Ali and P. Angelov
produce rich and better information. However, the data processing for every data
type is different and becomes tedious and harder when the quantity of data is large.
Feature extraction is the pre-processing phase before processing the data.
Transformation techniques can be used as one way to do the feature extraction [e.g.,
PCA (Angelov 2013)]. Clustering can be used in pre-processing the data to produce
clusters (groups) or to identify patterns in the data. Data, which is not in the group
or cluster, can be considered as outliers or anomalies. In statistic data,
outliers/anomalies can cause errors and sometimes are removed to get better
clustering result (Canty et al. 2006). However, in forensics, outliers/anomalies
provide valuable information, i.e., point to suspicious facts.
Traditional methods to detect anomalies are by assuming a deviation of 3r from
a smooth and static Gaussian distribution. A threshold value is being set based on a
normal distribution of random variables. Based on traditional Chebyshev inequal-
ity, data is calculated using the average, then the threshold value is set. There are
many drawbacks to this approach such as: datasets must be large, it requires strict
prior assumptions, it relaxes conditions too much to avoid false positives to the
level where it misses many true positives (the 3r rule sometimes cannot detect
obvious outliers) and one data sample is compared with the average instead of
comparing pairs of data samples, therefore, the information is blurred and no longer
pointwise and local (Angelov 2014).
Empirical Data Analytics (EDA) is a new theoretical framework to analyse data
and detect anomalies without prior assumption (Angelov 2013, 2015). EDA tou-
ches the very foundations of data analytics for statistic and streaming data. It serves
as an alternative to the classical probability theory and analytics (Angelov 2013,
2015). Applications of EDA include but are not limited to data analysis, clustering,
classification, prediction and anomaly detection. Advantages of EDA are (Angelov
2013, 2015):
• It is entirely driven by the empirically observed data and based on their mutual
distributions
• Free from prior assumption and predefined parameters
• No need to assume any model of data generation
• No need to assume the observed data to be independent or identically distributed
• No requirement for an unlimited number of observations (it can work with only
two data samples)
• Free from some well-known paradoxes of traditional probability theory
• Quantities can be calculated recursively for many types of distance metrics.
In regards to anomalies detection, EDA proved to be more sensitive and flexible
than the traditional approach (Angelov 2013, 2015). In addition, it is very important
to analyse local anomalies rather than global one (Angelov 2014). Three EDA
quantities employed in this chapter include cumulative proximity, standardised
eccentricity and data density (Angelov et al. 2016).
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 235
X
N
pðxÞ ¼ d 2 ðx; xj Þ ð1Þ
j¼1
2NpðxÞ
eðxÞ ¼ PN ð2Þ
j¼1 pðx j Þ
1
DðxÞ ¼ ð3Þ
eðxÞ
Figure 16.1 shows the idea of the proposed autonomous analysis of the
heterogeneous data aiming to detect anomalous behaviour. The process begins with
acquiring the data. This method will accept many types of data such as signals
(GPS), financial (e.g., credit card or account transactions), text (e.g., email, instant
messaging) and image (e.g., video surveillance). Pre-processing will be applied to
extract the important features then the selected features will be processed to detect
anomalies. The anomaly detection phase will be conducted in an unsupervised
manner based on empirical data analytics (EDA). Images will be processed using
image processing techniques to identify the identity of a suspect aiming to verify
the information from the anomaly detection. Later, all the information from the
anomaly detection and image identification will be integrated using data fusion
techniques. Data can be integrated using a fuzzy rule based system, thus producing
contextually linked event sequences and story lines. It can be processed and
analysed efficiently, because the amount of data become smaller and better
organised and is represented in the form of human-intelligible information (e.g.,
rules, graphs, patterns, clusters, etc.). This approach can formalize expert knowl-
edge and construct sequences of events. Based on the small amount of highly
intelligible information, human experts are still required to verify the analysis and
make the final decision. The significance of the proposed method is to reduce the
processing time and facilitate and assist the human expert in making the right
decision on time.
bayerl@rsm.nl
236 A.M. Ali and P. Angelov
To demonstrate the method, we apply a case study based on the well-known IEEE
Visual Analytics Science and Technology (VAST) Challenge 2014. The VAST
Challenge is based on fictitious (virtual) data, but is quite realistic and includes
many problems that need to be solved. The data are heterogeneous ranging from
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 237
unstructured text (email) to geospatial data (GPS), financial data (credit and loyalty
card data) to video (streaming data). The (fictional) employees represented in the
dataset have company cars in which geospatial tracking software installed without
the employees’ knowledge. The dataset was available for two weeks from 6 January
2014 to 19 January 2014.
Financial data (credit card and loyalty card data) have the same attributes. This
includes timestamp, location, money spent, first name and last name. For our
purposes only the money spent is being processed in the next phase, as this attribute
is the most important feature in this dataset. Transactions recorded on the credit
card usually go hand in hand with the transaction recorded in the loyalty card,
because people will use the credit card together with the loyalty card especially
when they spent more.
After processing the data, additional features can be extracted from the datasets.
For example, the total spending for every person, total spends for every location,
total spending for every person every day and total spending for every location
every day. There are 45 staff members in the VAST datasets, therefore every
spending from every staff member has to be summed up. Then new features can be
extracted from the total spending for every staff member. Hence, we can easily find
which staff member spends more or less. From the location information, we can find
at which place people spend more and less. Further, we can extract total spends per
day in two weeks as well as total spending in every location per day. This will make
it easier to determine, which day and location are different from others, which
person has suspicious spending behaviour, where the suspicious spending took
place and when the suspicious spending happens.
There are four attributes in the GPS data, namely timestamp, ID, longitude and
latitude. Of these the most important features are longitude and latitude. From these
coordinates, trajectory information can be extracted such as the projection of the
trajectory, average speed, distance and ratio of trajectory angle.
We applied Empirical Data Analytics (EDA) on the selected features in all datasets.
Figure 16.2 shows the identified anomalies in the credit card transactions. There is
one anomaly identified in this figure. This anomaly is the staff member no. 31 who
spends $10,000 (ten thousand US Dollars). The value of eccentricity is extremely
high with more than 1378 (>37 r). Compared to other staff members and over
14 days, only staff member no. 31 spent this much, which is abnormal (see Fig. 16.3).
Figure 16.4 shows two further anomalies after we removed the first anomaly. These
bayerl@rsm.nl
238 A.M. Ali and P. Angelov
14000
12000
anomaly
10000
8000
6000
4000
2000
0
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45
Fig. 16.3 Total spending per person using credit card data
are staff members, no. 43 and no. 40. Staff member no. 43 spent $600 (six hundred US
Dollars), which is more than 96% away from the mean (referring to Chebyshev
inequality). When we process the data in loyalty cards, staff member no. 43 appears
again as abnormal with the same amount (600) (see Fig. 16.5). Staff member no. 43 is
the Chief Executive Officer (CEO) and staff member no. 40 is the Chief Operating
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 239
Fig. 16.4 Anomaly on the credit card after removing first anomaly
Officer (COO) of the company. Therefore, they can spend large amounts, as their
salary is normally higher than that of other staff members.
Figure 16.6 shows the amount of spending using loyalty card: There is no anomaly
detected during two weeks’ time across staff members. When we compare credit card
bayerl@rsm.nl
240 A.M. Ali and P. Angelov
1800
1600
1400
1200
1000
800
600
400
200
0
1 4 7 10 13 16 19 22 25 28 31 34 37 40 43
Fig. 16.6 Total spending per person using loyalty card data
20000
Credit Card
18000
Loyalty Card
16000
14000
Total Spend
12000
10000
8000
6000
4000
2000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
LocaƟons
Fig. 16.7 Comparison between the usage of credit card and loyalty card from different locations
and loyalty card data, we find suspicious behaviour for staff member no. 31. The
higher spending of this staff member only appears in the credit card data but not in the
loyalty card data. Usually, when people use the credit card they will swipe it together
with their loyalty card to get points. The more you spent, the more points you will get.
The question for this transaction is why staff member no. 31 did not use his/her loyalty
card. Therefore, we can make an assumption that maybe (s)he forgot to bring his/her
loyalty card when spending 10,000 on the credit card.
Subsequently, we analysed the location where people spent their money.
Figure 16.7 shows the comparison between credit card and loyalty card spending.
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 241
Most of the transactions for credit cards and loyalty cards indicate the same amount.
Nevertheless, location no. 11, Frydos Autosupply, shows a large difference between
credit card and loyalty card. Figure 16.8 shows the analysis of payments by credit
card at Frydos Autosupply, which shows one anomaly at day 8. No suspicious
behaviour can be identified in the loyalty card spending at Frydos Autosupply
within two weeks’ time (see Fig. 16.9). In the next step we analyse in detail the
spending behaviour of staff member no. 31 over two weeks (see Fig. 16.10). It
shows that on day 8 occurred the highest spending, as is quite obvious compared to
the remaining transactions. However, considering loyalty cards, there are two
6000
4000
2000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
800
600
400
200
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
8000
6000
4000
2000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
bayerl@rsm.nl
242 A.M. Ali and P. Angelov
anomalies and the amounts are not as high (about 240–280; see Fig. 16.11) com-
pared to the credit card (where one anomaly was detected with an amount of more
than 10,000) (Fig. 16.10).
The biggest dataset in this case study is the geospatial data. This data produces a
large amount of useful information about the movement for staff members who have
a company car. Given the data about coordinates, we can extract information about
travel time, travel distance and ratio of the trajectory angle. All trajectory information
is combined and normalized to make the data comparable. Figure 16.12 shows only
two anomalies, which concerns staff member no. 18 with abnormal behaviour on 9
January and 17 January 2014. His/her travel pattern is abnormal compared to others,
300
250
anomalies
200
150
100
50
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Fig. 16.11 Total spending for staff member no. 31 in 14 days using loyalty card data
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 243
indicated by a blue line as the normal travel pattern and a purple line as the abnormal
travel pattern in Fig. 16.12. When analysing the travel pattern for staff member no.
18 over time, it becomes apparent, however, that his/her travel pattern is consistent,
i.e., not normal for other people but normal for this staff member. Therefore, we
cannot consider staff member no. 18 as suspect.
Relating the information from credit card data to the trajectory data, we find that
staff member no. 31 spent 10,000 on 13 January 2014 at 19.20 o’clock.
Figure 16.13 shows the trajectory of staff member no. 31 (pink line) and staff
member no. 41 (blue line) on 13 January 2014. The credit card was charged at
Frydos Autosupply, but staff member no. 31 did not go to this location on this day,
while at the same time we can see staff no. 41 was at that location where the card is
charged (see Fig. 16.14). Our method thus detected something suspicious for staff
member no. 41. Staff member no. 31 is not using the credit card until 16 January
2014 after the card was being charged for 10,000 on 13 January 2014. We can make
an assumption that from 13 January to 15 January 2014, maybe his/her card was not
Fig. 16.13 Comparison between normal (blue line) and abnormal (purple line) trajectory patterns
Fig. 16.14 Trajectory of staff member no. 31 and staff member no. 41 on 13 January 2014
bayerl@rsm.nl
244 A.M. Ali and P. Angelov
with the staff member. After 16 January 2014, the person starts using his/her credit
card again. We can assume that maybe staff member no. 31 left his/her credit card,
which was then (mis)used by staff member no. 41.
For this case study, we assumed that in addition to the data from the VAST
Challenge 2014 we also have data from CCTV cameras. In this case, information
regarding staff member no. 31 and staff member no. 41 can be confirmed or
rejected. Streaming data from CCTV cameras can be processed using image pro-
cessing techniques, which allows classifying the images with regards to face and
gait recognition. The suspect can be recognised, for example, by gender and age,
i.e., the system can classify between male and female and also whether the suspect
is young, middle age or old using fuzzy logic techniques. Figure 16.15 shows an
example of an image with people pay at the cash register. The system can detect the
gender of the people in the image. Using gait recognition, the system can classify
the way a suspect walks.
Once all anomalies have been detected, they have to be combined using data
fusion techniques. One way of combining the data is by using fuzzy rule based
systems. For example, if staff member ID is denoted as i:
Rimage 1 IF (gait_imagei is big_step) and (face_imagei is male)
THEN (genderi is male)
Rimage 2 IF (face_agei is middle)
THEN (agei is middle)
Rcombine IF (credit_card_spendingi is excessive) OR (loyalty_cardi is used)
AND (GPS_locationi is close to suspect location)
AND (genderi is male) AND (agei is middle)
THEN (staff_memberi is suspect)
As the above listing illustrates, the fuzzy rules are designed based on selected
features from the available datasets. There are three rules described above, which
are Rimage1, Rimage2 and Rcombine. The first rule, Rimage1 is a rule generated from face
recognition. Several studies have shown that face and gait recognition can deter-
mine gender (Eidinger et al. 2014). The second rule, Rimage2, determines the age
from the faces’ images. Age is a fuzzy value, which classifies into ‘young’, ‘middle
Male
Age : 30
bayerl@rsm.nl
16 Applying Computational Intelligence to Community Policing … 245
aged’ or ‘old’. The final rule, Rcombine, is a combination of Rimage1 and Rimage2
together with the other datasets, which involves the process of checking credit card
spending, loyalty cards, GPS location and images. The credit card spending is a
fuzzy value, which can be classified into ‘excessive’, ‘moderate’ or ‘low’, while the
value of loyalty cards is a binary number, which represents ‘used’ or ‘not used’. The
next process is to generate a fuzzy value based on GPS location using the coor-
dinates of spending location and suspect location. The distance value is represented
by ‘far’ or ‘near’. Below is an example to illustrate the application of fuzzy rules:
If a staff member ID = i uses his/her credit card excessively but does not use
his/her loyalty card, the spending location is far from the suspect location; gender is
male; age is middle aged, therefore, staff memberi is not a suspect.
This final output can be analysed and verified by human experts. Verification or
validation of the result and analysis by experts is needed before reaching a decision
or judgement. The analysis and the results can be achieved (semi)automatically.
Therefore, the proposed technique can assist the expert in decision making or in
simplifying their task.
16.4 Conclusion
This chapter describes a new method for the autonomously detecting of anomalous
behaviour based on heterogeneous data and explains how this could be used by CP
in their daily operations. The method applied EDA to detect anomalies in various
heterogeneous data sets and was demonstrated using the VAST Challenge 2014
data. This data set includes credit card, loyalty card and GPS data. After analysing
data on trajectory and location the suspicious person was automatically discovered.
To confirm the suspect, face recognition can be applied to support information from
the EDA. Then, all the information can be integrated using fusion techniques to
produce the final outcome. The fuzzy rule based system can assist the forensic
investigator in making decision. In the future, the proposed method may also be
applied to more data sets with more complex problems. Images and text can be used
and with image processing techniques and natural language processing to contribute
to solving problems. This could become a very valuable tool for CP in the future.
References
Ali AM, Angelov P, Gu X (2016) Detecting anomalous behaviour using heterogeneous data. In:
Advances in computational intelligence systems: contributions presented at the 16th UK
workshop on computational intelligence, Lancaster, UK, 7–9 September 2016
Angelov P (2013a) Autonomous learning systems. Wiley, London
Angelov P (2013b) Outside the box: an alternative data analytics frame-work. J Autom Mob Robot
Intell Syst 8:35–42
bayerl@rsm.nl
246 A.M. Ali and P. Angelov
Angelov P (2014) Anomaly detection based on eccentricity analysis. In: 2014 IEEE symposium on
evolving and autonomous learning systems, IEEE Press, Orlando, p 1–8
Angelov P (2015) Typicality distribution function—a new density—based data analytics tool. In:
IJCNN 2015 international joint conference on neural networks, p 1–8
Angelov P, Xiaowei G, Kangin D, Principe J (2016) Empirical data analysis: a new tool for data
analytics. In IEEE international conference on systems, man, and cybernetics, p 52–59
Bera A, Bhattacharjee D, Nasipuri M (2014) Hand biometrics in digital forensics. Comput Intell
Digit Forensics Forensic Invest Appl 1:145–163
Bhowmik S, Ghosh AK, Debsinha J, and Kajal R (2016) A literature survey on human
identification by gait. Imp J Interdisc Res 2(7):1340–1343
Bouchrika I, Goffredo M, Carter J, and Nixon MS (2011) On using gait in forensic biometrics.
J Forensic Sci 56(4):882–889
Canty AJ, Davison AC, Hinkley DV, Ventura V (2006) Bootstrap diagnostics and remedies. J Stat
34(1):5–27, 2
Costa BSJ, Angelov PP, Guedes LA (2014) Real-time fault detection using recursive density
estimation. J Control Autom Electr Syst 25(4):428–437
Dantcheva A, Velardo C, Dugelay ADAJ (2011) Bag of soft biometrics for person identification,
Multimedia Tools Appl pp. 739–777
Eidinger E, Enbar R, Hassner T (2014) Age and gender estimation of unfiltered faces. IEEE Trans
Inf Forensics Secur 9(12):2170–2179
Guarino A (2013) Digital forensics as a big data challenge. In: ISSE 2013 securing electronic
business processes, Springer, Germany, p 197–203
Jagadish HV, Gehrke J, Labrinidis A, Papakonstantinou Y, Patel JM, Ramakrishnan R, Shahabi C
(2014) Big data and its technical challenges. Commun ACM 57(7):86–94
Kim Y, Kogan A (2014) Development of an anomaly detection model for a bank’s transitory
account system. J Inf Syst 28(1):145–165
Kim AC, Park WH, Lee DH (2013) A study on the live forensic techniques for anomaly detection
in user terminals. Int J Secur Appl 7(1):181–188
Mitchell FR (2014) An overview of artificial intelligence based pattern matching in a security and
digital forensic context. In: Cyberpatterns, Springer, Switzerland, p 215–222
Mone F, Walsh C, Mulcahy C, Mcmahon CJ, Farrell S, Mactiernan A, Segurado R, Mahony R,
Higgins S, Carroll S, Mcparland P, Mcauliffe FM (2015) Prenatal detection of structural
cardiac defects and presence of associated anomalies : a retrospective observational study of
1262 fetal echocardiograms. no. 1
Nater F, Leuven KU (2012) Abnormal behavior detection in surveillance videos. no. 20377
Pratama SF, Pratiwi L, Abraham A, Muda AK (2014) Computational intelligence in digital
forensics. Comput Intell Digit Forensics Forensic Invest Appl 1:1–16
Qi M, Liu Y, Lu L, Liu J, Li M (2014) Big data management in digital forensics. In: 2014 IEEE
17th international conference of computational science and engineering, p 238–243
Tistarelli M, Grosso E, Meuwly D (2014) Biometric in forensic science: challenges, lessons and
new technologies. In: Cantoni V, Dimov D, Tistarelli M (eds) Biometric authentication, vol
8897. Springer International Publishing, Switzerland, pp 153–164
Zuech R, Khoshgoftaar TM, Wald R (2015) Intrusion detection and big heterogeneous data: a
survey. J Big Data 2(1):1–41
bayerl@rsm.nl
Chapter 17
Evaluating the Design and Implementation
of CP-Support Technologies:
A Participatory Framework
17.1 Introduction
1
E.g., accounts such as ggpd_recruitment by the Garden Grove Police, USA on Instagram or
videos such as the #runningmanchallenge by Wales Police: https://www.youtube.com/watch?v=
qELq8w6deuU or the Dutch National Police: https://www.youtube.com/watch?v=vd4PUZGCgC4,
accessed Sep 26, 2016.
bayerl@rsm.nl
248 P.S. Bayerl and G. Jacobs
One of the biggest challenges in ICT design and implementation is not the ‘hard’
side of technology developments, but the ‘soft’ side of social factors. Technology
implementation attempts often fail because of human and organizational—rather
than technological—issues, which were overlooked or underestimated in the
development of ICT solutions (Griffith 1998). Technology is always
‘technology-in-practice’ and therefore co-shaped by the social context2 in which it
is used (Orlikowski, 2000). That is, identical technologies do not lead to the same
processes and outcomes in different contexts. Such ‘soft’ factors multiply in their
complexity in cross-national settings. Bayerl et al. (2013), for instance, showed how
social contexts can influence the adoption and usage of technological instruments
within the policing context such as automatic number plate recognition and social
media depending on the legal and political European contexts in which they are
applied; and also how such contexts shape implementation strategies for tech-
nologies (Denef et al. 2011).
It is important to note that the relationship between the social context and
technology is not unidirectional but interdependent. Technology shapes our inter-
actions, as can be easily witnessed in the influence of mobile phones and social
media on our communication patterns. An analysis of the social context for the
design of an ICT tool therefore also needs to consider that technology can be a
vehicle to introduce new values in social systems. Technology “can be planted like
explosives under our interactions and lead to transformations, which had barely
been deemed possible before” (Magala 2009, p. 4).
This transformative power of technology is often one of the main reasons why it
is introduced in organizations and communities. The basic assumption behind many
ICT-implementations in CP is that the introduction of a technological tool can
transform CP for the better. Clearly, a full prediction of the social consequences of a
technological change is impossible. Nevertheless, a thorough analysis of the social
2
Social context, also known as social environment, refers to the immediate physical setting in
which people live. It includes the political, economic, cultural, technological, ecological and legal
conditions of a community.
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 249
context can help to understand the parameters of the environment in which the
technology will be used.
In this chapter we present a participatory framework that can help to make the
development and implementation of ICTs for police–community interactions more
effective. We base our evaluation framework on five main methodological char-
acteristics: consecutive piloting, longitudinal perspective, multi-stakeholder view,
multi-level approach and finally the triangulation of findings from various outcome
levels. We argue for a short-, mid- and long-term evaluation approach with con-
secutive pilots to account for the interdependent nature of the technology and its
social context. Next to this we give concrete examples for evaluation criteria of the
functionality, acceptance and impact evaluation of a tool. Finally we summarize our
chapter with recommendations for ICT evaluations in general.
In developing our framework we start from the premise that social contexts affect
technologies from their design to their usage and that technologies impact their
social contexts from the adaption to the usage and operation (Bayerl et al. 2013;
Denef et al. 2011; Kappos and Rivard 2008). We therefore argue that the design of
information systems needs to consider the social context of both the developers and
users: Users’ goals, values, norms and beliefs determine the required information
types and processes (Choe 2004; Kappos and Rivard 2008) in a similar way as
designers’ goals, values, norms and beliefs affect how ICT solutions are shaped.
The social context of users requires specific design configurations, which need to
be considered for the design and implementation of ICTs (Choe 2004). ICTs that
are intended as collaborative support for CP efforts need to satisfy two basic
requirements. First, they need to be standardized as much as possible in order to
provide a meaningful tool across as many social contexts as possible (e.g., orga-
nizations, disparate social groups marked by variations in age, language, ethnicity
or socio-economic status, different usage situations such as work, family, leisure,
travel, etc.). Furthermore, they also need to be localized or localizable as much as
needed, in order to reflect appropriately the specific needs on the supply and
demand side. Knowing which tool requirements can be standardized and which can
be localized is crucial for tool developments.
The social context of IT tools for CP can be analysed from three different
perspectives (Kappos and Rivard 2008):
• Which elements of CP are shared across contexts and communities (e.g., do
citizens and police officers across countries agree on the main tasks, goals and
stakeholders of CP)?
bayerl@rsm.nl
250 P.S. Bayerl and G. Jacobs
• Which elements of CP differ across contexts, but carry a shared meaning within
a community (e.g., would police officers within the UK versus Germany versus
France agree on the value of entertainment videos on YouTube as valid part of
Community Policing)?
• Which elements of CP are also seen differently by members within the same
community (e.g., would all police officers in Belgium agree on the necessity of
location tracking for Community Policing)?
In light of these complexities it is clear that the development of ICT solutions for
CP is a challenging and costly task. Policy makers and the general public have a
valid interest in a solid monitoring of the development and implementation of ICT
solutions in CP. Next to financial concerns that tax payers’ money is adequately
invested, there are also far-reaching ethical and societal implications of interven-
tions in CP (see also Hail and O’Neill 2016; O’Neill et al. 2015). ICT-facilitated
communication comes with specific risks and responsibilities around privacy and
data security. Connecting community members who are not (or negatively) inter-
acting with each other in the offline world can also create tensions in terms of
polarisation or hate-posts or other unintended side-effects online. Thorough eval-
uations of ICT interventions are needed in order to monitor the implementation and
to predict (as far as possible), or at least quickly spot, the implications of the
potential “explosives” (Magala 2009) planted under community social interactions.
The main challenge of ICT development for CP is the multi-contextuality of the
adaptation requirements. Multi-contextuality refers to “the co-existence of different
use contexts” (Henfridsson and Lindgren 2005, p. 96). Multiple contexts in CP can
occur in several forms: between police and communities, across communities,
among police and supporting organizations. For example, sub-communities can
differ in their experiences with the police, which might result in differing trust levels
or communication needs; e.g., young men of an ethnic minority might be more
likely to become subject of police searches than elderly women of the ethnic
majority. As a consequence, young men of this ethnic minority might become less
trusting and less open towards the police than the elderly women of the ethnic
majority in their environment—with consequences for their willingness to engage
with police generally and with police CP tools more specifically. Equally, different
professional groups may have specific expectations towards and experiences with
the police. Medical experts in emergency rooms might have other communication
needs with police than street workers, imams or teachers. The successful devel-
opment, implementation and achievement of intended outcomes depend on the
appropriate interpretation of such multiple social contexts. Hence, to understand the
success of ICT innovations in CP and possible points for improvements evaluations
should go hand in hand with the IT development.
Development and evaluation can accommodate for the influence of the social
context in two ways:
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 251
bayerl@rsm.nl
252 P.S. Bayerl and G. Jacobs
Tool developments usually follow multiple iterations to allow for adjustments and
refinements in the form of pilots across several pilot sites/regions. Evaluations
should be a standard part of each of these pilots creating a consecutive record of
measures that allows to assess tool usage and tool features according to chosen
evaluation measures (for possible measures see Sect. 17.5).3
3
By referring to a ‘link’ between changes in tool features and evaluation outcomes we do not imply
a deterministic or causal connection, as disparities in implementation processes, user character-
istics, national features, situational influences, etc. across pilot sites will impact results.
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 253
that some effects may take time to materialize after the re-design or final imple-
mentation intervention (e.g., changes in trust between police and communities may
occur slower than changes in the rate of incident or crime reporting).
Effects are likely to occur at different levels: starting with the individual (e.g.,
differences of acceptance in single users due to differences in terms of age, gender
or personal experiences with police) up to the group and organizational level (e.g.,
variations in adoption intensity due to disparate minority cultures or organizational
or national policies). Further, cross-level and inter-group effects may be expected.
We therefore advocate to explicitly include multiple levels in the evaluation. Below
is a list of the most important measurement levels that may be considered:
• Individual effects: effects that take place in individual citizens, police officers,
etc.
• Subgroup effects: effects located in smaller sub-parts of a team or community
(e.g., isolated elderly as a subgroup of elderly in a community)
• Group/organization-level effects: effects that affect a whole group/community
and/or organization (e.g., changes in reporting practices towards police in a
hospital or youth centre)
• Cross-level effects: effects in which characteristics on one level influence out-
comes on another level (e.g., when subgroup cultures or norms affect individ-
uals’ decisions to adopt the tool)
• Inter-group/inter-organizational effects: effects that are located in the interaction
between user collectives (e.g., changes in information sharing practices between
homeless shelters and police)
bayerl@rsm.nl
254 P.S. Bayerl and G. Jacobs
Technology implementation and adoption is a process that unfolds over time. For a
full understanding of the effects of CP-support tools, it is therefore vital to capture
the temporal and changing nature of the implementation, adoption and usage
processes (cf. Boudreau and Robey 2005). This implies a longitudinal approach in
which repeated measurements are conducted within the same group(s) of people.
To determine whether the technology implementation did lead to changes, we
advocate for a baseline measurement to capture attitudes, behaviours, performance,
etc. before the implementation. Subsequent measures after the new tools have been
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 255
deployed will then be compared to this baseline to determine whether changes have
indeed taken place. This setup also allows to test for causal effects. Another benefit
of this longitudinal approach is that it takes into account that implementation and
adoption processes generally do not progress along a neat timeline of events.
Affective, cognitive and behavioural changes may occur at different times or change
at different rates; for instance, in that perceptions of social aspects adapt faster or
slower than perceptions of technology (Burke et al. 2002). A longitudinal per-
spective allows capturing such time-shifted reactions (McGrath and Tschan 2004).
The literature on longitudinal research does not provide clear guidelines on the
optimal length of the time lags between measurement points (e.g., Ployhart and
Vandenberg 2010; Ployhart and Ward 2011). Here, knowledge about the mecha-
nisms underlying the targeted outcomes should guide the selection of intervals
between measurement points. Intervals can be longer when a steady, linear effect is
expected, but intervals should be shorter if a higher dynamic of effects is expected
or impactful/hurtful effects may occur, which should be spotted quickly.
A possible spacing of measurement points for moderately dynamic outcomes is
three or four months to cover short-term and mid-term effects. This means that the
baseline measurement would be conducted three (or four) months before imple-
mentation, and subsequent evaluation rounds would follow in periods of three (or
four) months. Longer time intervals may come with higher attrition rates, since
people might move away or lose interest in the project; shorter intervals may lead to
unwillingness and ‘survey fatigue’. A final evaluation may be added after a longer
period when new processes have stabilized and become routine. This type of
longitudinal setup is presented in Fig. 17.1.
Often ICT innovations for CP only reach communities once the technology is
deemed mature and stable enough. While on first view this may preclude immature
technologies to reach end-users, it also forestalls the chance to involve (potential)
end-users in the design phase and adjust to local needs and expectations, i.e., misses
the chance of tailoring the technology for usage across the multiple groups and
contexts that are such an integral part of CP efforts. To leverage the potential of user
feedback across the design and development process, we suggest to establish
Fig. 17.1 General setup for a CP-ICT evaluation (the indicated duration between steps are only
for illustration)
bayerl@rsm.nl
256 P.S. Bayerl and G. Jacobs
This consecutive approach has the considerable advantage that it allows testing the
technology directly in the field starting from the conceptual stage into a functional
prototype. This guarantees that the tool is designed with direct application in mind.
Further, because of the multi-stakeholder approach (simultaneously considering
various user groups such as police, community groups and supporting organiza-
tions) as well as the multi-context deployment (CP tools are ideally designed
around various communities to allow for data-connection), transferability across
contexts is part of the design and development process. This multi-contextual
design philosophy flows from the vision of a flexible and scalable Community
Policing model (cp. Chaps. 3 and 5).
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 257
While a very potent approach for the end-user driven development of CP tech-
nologies, the consecutive piloting approach also introduces challenges for a sys-
tematic evaluation of impacts and consequences.
Because of the continuous adjustments and modifications to the technology
across different pilots, the data that can be collected, the reactions of users as well as
the type and extent of effects on behaviours, practices and processes will necessarily
change with each pilot. For this reason, statements about aspects such as accep-
tance, adoption, impacts and unintended consequences will largely be limited to the
settings in which the data was collected. Further, establishing cross-contextual
generalizability of a technological tool for the complex social phenomenon
‘Community Policing’ is a challenging and potentially time- and cost-intensive
enterprise.
We propose the consecutive piloting approach to maximize cross-contextual
generalizability. Each pilot taking place in a different context creates the prereq-
uisites to test for the localization versus generalizability of technologies. Yet as
stated above, this approach also restricts the direct comparability of assessments
across pilots. This does not render assessments moot, but we are aware of the
challenges for the generalization of findings across (regional and/or national)
implementation contexts (e.g., issues of cross-cultural data collection for the
policing context, Jacobs and Bayerl 2015).
In a full-blown evaluation approach with baseline, short-, mid-term and long-term
measurements users would have a technology they can access and use on a regular
basis. In our suggested methodological setup we grasp step by step context-specific
constraints and directly feed this information into the next development stage of the
platform. In this scenario, the first pilot is primarily intended as proof of concept, i.e.,
no actual technology can be deployed to users. The second pilot is intended as
demonstration of a first prototype, and so on until the platform reaches sufficient
maturity for full-scale deployment. In consequence, we suggest to start with the full
evaluation cycle of short-, mid- and long-term assessments only, once the technology
is ready to be used in a realistic (field) context, may it be with limitations. The
objectives and approaches for the initial pilots would then look as follows:
• Evaluation in pilot 1: proof of concept through scenario-based workshop(s), no
short-and mid-term evaluation
• Evaluation in pilot 2: test of first prototype with focus on functionality testing
through scenario-based workshop(s), no short-/mid-term evaluation
• From pilot 3 on: deployment of the technology to the relevant communities and
end-users using the full evaluation process of baseline as well as short-,
mid-term and long-term evaluations.
Each pilot should take place in a different social and cultural context and
therefore inform the next pilot about possible culture- specific requirements of the
tool. This methodology broadens the cultural lens of the platform development.
bayerl@rsm.nl
258 P.S. Bayerl and G. Jacobs
The following sections list possible evaluation criteria and where applicable pos-
sible operationalizations and methods. Three areas of the assessment are addressed:
• Functionality and usability testing
• Technology acceptance and adoption
• Impact evaluation
We focus especially on impact evaluation, since this part is the most crucial one
from a societal perspective. Here we also suggest some operationalizations to
illustrate our evaluation roadmap. In addition, we also shortly discuss unintended
consequences and how to assess their effects.
Functionality and usability testing assesses whether a new technology meets the
requirements that guided its design and development, whether it responds correctly
to inputs, performs its functions within an acceptable timeframe, functions con-
sistently and reliably, recovers quickly from user errors and can be installed and run
in its intended environments. Functionality testing is generally conducted without
end-user involvement, while usability testing evaluates a product by testing it with
end-users. In this process software is tested to ensure that it conforms to all
requirements as laid out by the intended end-user(s).
Once the platform has been developed to an appropriate stage, a large number of
functional testing techniques exist, from which the most appropriate one(s) need to
be chosen based on the context of the testing. These techniques include smoke
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 259
testing (an initial test to check whether the system is sufficiently ready/stable for
further testing) and white box testing (to tests the internal structures or workings
using test cases). Suggested methods for functionality testing include the creation of
test plans together with standard, erroneous and destructive testing to ensure that the
system is robust enough.
After the successful completion of this phase, applications and tools need to be
tested against users’ needs to demonstrate their benefits and usefulness for their
intended purpose. This process verifies that a solution works for the intended
end-user(s) and that they accept the solution. This step is related to questions of
technology acceptance and adoption, discussed in more detail in the next section.
Possible methods for usability testing are heuristics evaluations and A/B testing. The
multi-contextual nature of the design and development process further offers the
possibility for testing standardization versus localization of interfaces to ensure that
the tool can be adapted easily to various organizational, local or situational contexts.
In addition, the integration of the tool into existing systems has to be assured
through integration testing, which may be especially relevant on the police side.
bayerl@rsm.nl
260 P.S. Bayerl and G. Jacobs
This part of the evaluation aims to understand the impact of the tool or technology,
that is:
• Whether it achieves the intended results and
• Whether it leads to unintended consequences (positive and/or negative) for its
users.
Areas for impact assessment can be determined in different ways:
• Theoretically based on reviews of existing literature on technology acceptance,
adoption and continuance
• Empirically based on expert interviews with internal and external stakeholder of
the community
• Pragmatically based on impacts that have political and/or legal priority in the
community
In the following we will discuss possible areas and concrete indicators to assess
the impact of CP technologies focusing on operational outcomes, relationships,
acceptance of Community Policing, liveability and police-internal processes and
attitudes. This selection is not intended as representative, as depending on the case
additional or other areas may be more useful to assess impacts, but can provide
guidance into the type and range of feasible an available measures.4
4
For a more extensive overview of indicators, see Bayerl et al. 2015.
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 261
relationships between police and these groups will often be an integral element of
pilot evaluations. Relevant criteria and their possible operationalizations are sum-
marized in Table 17.2.
bayerl@rsm.nl
262 P.S. Bayerl and G. Jacobs
Table 17.2 Possible indicators to assess the quality of relationship between citizens, police and
other stakeholders
Concept Possible operationalization Possible methods
Trust/Confidence Degree of trust/confidence in police as Self-reports through surveys or
organization interviews
Legitimacy Degree of perceived legitimacy of police Self-reports through surveys or
as organization interviews
Fairness Degree of perceived fairness in treatment Self-reports through surveys or
of community group members interviews
Respect by and Degree of reported respect towards Self-reports through surveys or
for police members of community groups; interviews; objective information in
number of respectful and/or disrespectful police data
acts towards police officers
Perceived Degree of perceived expertise of police Self-reports through surveys or
expertise in general and with respect to the relevant interviews
communities
Perceived Degree of perceived expertise of police. Self-reports through surveys or
professionalism In general in treatment of the relevant interviews
communities
Image of the Positive perception of police Self-reports through surveys or
police organization, degree of positive media interviews; objective data from media
coverage, positive feedback/comments analysis
by the public on social media
Closer Extent of collaborative activities between Self-reports through surveys or
cooperation police, citizens and other groups or interviews; objective information in
organizations, e.g. in terms of providing police and external data
information and assistance; reporting
(potential) crimes and disorder;
becoming a police volunteer [where
applicable depending on country context]
Willingness to Number of volunteers from the various Objective information in police data
work for the communities [where applicable
police depending on country context]; number
of applicants for police jobs [where
applicable depending on country context]
Complaints Number of official complaints against Objective information in police
about police police officers and/or governmental data [depending
work on country context]
Awareness of Degree to which individual or groups Self-reports through surveys or
security as perceive the creation of security as a interviews
common good common tasks
leisure, etc.). Liveability is thus linked to the well-being of individuals, families and
communities and in a more abstract sense also to those of organizations and society
as a whole. Community Policing can support liveability, for instance, by increasing
citizens’ feeling of safety or by improving social cohesion by fostering contacts
between diverse groups. Table 17.4 lists possible ways to assess liveability in
communities.
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 263
As last area, we added effects within the police and for individual police officers in
terms of internal work processes and officers’ attitudes. While the previous sections
considered primarily effects in the environment of the police, this area thus
addresses changes in police processes and the police organization itself. Table 17.5
lists potential indicators to assess such changes.
bayerl@rsm.nl
264 P.S. Bayerl and G. Jacobs
Table 17.5 Possible indicators to assess changes in police internal attitudes and processes
Concept Possible operationalization Possible measurement
Improved Amount of Objective information in police;
intelligence information/intelligence; quality self-reports through surveys or
gathering of information interviews
Efficiency Less resources needed in terms of Objective information in police;
personnel, time, budget, etc. self-reports through surveys or
interviews
Knowledge about Degree of knowledge about Self-reports through surveys or
communities relevant communities in terms of interviews
e.g., amount, validity, quality
Knowledge of Better problem solving; improved Self-reports through surveys or
problem causes assessment of CP effectiveness interviews
CP as integral part Degree to which Community Objective information such as
of the police Policing is integrated in structures and practices;
organizational structures, self-reports through surveys or
practices, trainings, etc. interviews
Localized approach Degree of localization of Objective information such as
Community Policing structures structures and practices;
and practices self-reports through surveys or
interviews
Less rights Frequency of official violations Objective information in police
violations, fewer and complaints, severity of data; self-reports through surveys
victims of police violations and complaints or interviews
violence
modifying them along own preferences or using them in unexpected ways. Next to
this, technology can also trigger social reactions that were not foreseen. Social
media provides-many such examples. Facebook was originally developed as a tool
to interconnect Harvard students. Within a few years it has grown into a tool that
facilitates riots and revolutions, helps people in international crisis situations as well
as supports criminal activities like scams, cyberbullying or the planning of rob-
beries. Few technologies do not have at least some unintended consequences either
in their usage or in social practices (McAulay 2007; Peters 2006).
Next to the intended effects, which we illustrated in our operationalization
examples above, evaluations therefore should aim to capture also such unintended
side-effects, or as we coined them in our introduction, “explosives under our
interactions”. These include particularly impacts of ethical and societal issues such
as pressures on privacy and trust, resistance from users or changes in online rela-
tionships and behaviours. For instance, more involvement with police can also lead
to a decrease in citizens’ safety perceptions (Scheider et al. 2003; Zhao et al. 2002),
which counteracts one of the main intensions of Community Policing. Further,
users may start (over)reporting issues that are of little value to police (e.g., minor
nuisances in their community or problems that are the responsibility of other
organizations), while more critical issues may become under-reported
(spiral-of-silence; Hampton et al. 2014).
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 265
bayerl@rsm.nl
266 P.S. Bayerl and G. Jacobs
References
Bayerl PS, Jacobs G, van der Giessen M (2015) Report on evaluation criteria. Deliverable 7.1
Unity Project. Public report. RSM/Erasmus University Rotterdam, Netherlands
Bayerl PS, Jacobs G, Denef S, van den Berg RJ, Kaptein N, Birdi K, Horton K et al (2013) The
role of macro context for the link between technological and organizational change. J Organ
Change Manage 26(5):793–810
Boudreau M-C, Robey D (2005) Enacting integrated information technology: a human agency
perspective. Organ Sci 16(1):3–18
Burke K, Chidambaram L, Aytes K (2002) Do some things change faster than others? The
dynamics of behavioral change in computer-supported groups. Group Decis Negot 11(4):293–
309
Choe J (2004) The consideration of cultural differences in the design of information systems. Inf
Manag 41:669–684
Craig CS, Douglas SP (2005) International marketing research. Wiley, Chichester
Denef S, Bayerl PS, Kaptein N (2011) Cross-European approaches to social media as tool for
police communication. Eur Police Sci Res Bull 6(winter)
bayerl@rsm.nl
17 Evaluating the Design and Implementation of CP-Support … 267
DeSanctis G, Poole M (1994) Capturing the complexity in advanced technology use: Adaptive
structuration theory. Organ Sci 5(2):121–147
Freeth D, Hammick M, Koppel I et al (2002) A critical review of evaluations of interprofessional
education. Learning and Support Network, Centre for Health Sciences and Practice 2002,
London
Griffith TL (1998) Cross-cultural and cognitive issues in the implementation of new technology:
focus on group support systems and Bulgaria. Interact Comput 9(1):431–447
Hail Y, O’Neill M (2016) To capture the user requirements for ethical and legal engagement with
the police. Deliverable 2.3, Project Unity, Horizon 2020, Grant Agreement 653729, University
of Dundee
Hampton K, Rainie L, Lu W, Dwyer M, Shin I, Purcell K (2014) Social media and the ‘spiral of
silence’. PEW Research Center. Washington, DC. Available at: http://www.pewinternet.org/
2014/08/26/social-media-and-the-spiral-of-silence/
Henfridsson O, Lindgren R (2005) Multi-contextuality in ubiquitous computing: investigating the
car case through action research. Inf Organ 15(2):95–124
Jacobs G, Bayerl PS (2015) Accounting for cultural influences in big data analytics. In: Akhgar B,
Saathoff GB, Arabnia HR, Hill R, Staniforth A, Bayerl PS (eds) Application of big data for
national security. Elsevier, Amsterdam, pp 250–261
Jeyaraj A, Rottman J, Lacity M (2006) A review of the predictors, linkages, and biases in IT
innovation adoption research. J Info Tech 21(1):1–23
Kappos A, Rivard S (2008) A three-perspective model of culture, information systems, and their
development and use. MIS quarterly, 601–634
Magala S (2009) The management of meaning in organizations. Palgrave Macmillan, London
McAulay L (2007) Unintended consequences of computer-mediated communications. Behav Inf
Technol 26(5):385–398
McGrath JE, Tschan F (2004) Time and the research process. In: McGrath JE, Tschan F
(eds) Temporal matters in social psychology: examining the role of time in the lives of groups
and individuals. American Psychological Association, Washington, DC, pp 141–154
Myhill A (2012) Community engagement in policing. Lessons from the literature. National
policing improvement agency, November 2012
O’Neill M, Hail Y, Wooff A, James D (2015) Unity—legal and ethical framework. Deliverable
2.2, Project Unity, Horizon 2020, Grant Agreement 653729, University of Dundee, UK
Orlikowski WJ (2000) Using technology and constituting structures: a practice lens for studying
technology in organizations. Organ Sci 11(4):404–428
Peters LD (2006) Conceptualising computer-mediated communication technology and its use in
organizations. Int J Inf Manage 26(2):142–153
Ployhart RE, Vandenberg RJ (2010) Longitudinal research: the theory, design, and analysis of
change. J Manag 36(1):94–120
Ployhart RE, Ward AK (2011) The “quick start guide” for conducting and publishing longitudinal
research. J Bus Psychol 26(4):413–422
Scheider MC, Rowell T, Bezdikian V (2003) The impact of citizen perceptions of community
policing on fear of crime: findings from twelve cities. Police Q 6(4):363–386
Tilley N (1995) Thinking about crime prevention performance indicators. Crime prevention and
detection series paper no. 57. Home Office, London
Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four
longitudinal field studies. Manage Sci 46(2):186–204
Zhao JS, Schneider M, Thurman Q (2002) The effect of police presence on public fear reduction
and satisfaction: a review of the literature. Justice Prof 15(3):273–299
bayerl@rsm.nl
Chapter 18
Concluding Remarks
In 1829 Sir Robert Peel formulated his nine basic principles of policing. Amongst
them can be found the following instruction: “To maintain at all times a rela-
tionship with the public that gives reality to the historic tradition that the police are
the public and that the public are the police, the police being only members of the
public who are paid to give full time attention to duties which are incumbent on
every citizen in the interests of community welfare and existence.”1
As the preceding chapters of this volume demonstrate, this principle as well as
others in the ‘General Instructions’ to officers are as alive and valid today as they
were nearly two hundred years ago—although, as our authors show, they regularly
undergo and may in fact require reinterpretation and adaptation to the specifics of
the historical, national and cultural contexts in which Community Policing is
enacted.
1
https://www.gov.uk/government/publications/policing-by-consent/definition-of-policing-by-
consent.
B. Akhgar (&)
CENTRIC, Sheffield Hallam University, Cantor Building, Sheffield, UK
e-mail: B.Akhgar@shu.ac.uk
P.S. Bayerl
CESAM/Rotterdam School of Management, Erasmus University, Rotterdam,
The Netherlands
e-mail: bayerl@rsm.nl
G. Markarian
School of Computing and Communication, Lancaster University, Lancaster, UK
e-mail: garik@rinicom.com
G. Markarian
Rinicom Ltd, Lancaster, UK
R. Karlović
Croatian Police Academy, Zagreb, Croatia
e-mail: rkarlovic@fkz.hr
bayerl@rsm.nl
270 B. Akhgar et al.
The chapters in this book have each been written towards the objective of
establishing the underlying principles and social, organizational as well as tech-
nological requirements for the realisation of Community Policing (CP) from con-
cept to deployment. We have established Community Policing as a vital element of
social cohesion, whereby CP components (e.g., citizens, Law Enforcement
Agencies, NGOs or civic associations) can form a social system with the security
and safety of citizen as its main objective. A wide range of case studies further
illustrated the practical realization of Community Policing across Europe, identi-
fying current practices, potential challenges and possible advantages CP could
deliver to European citizens. They further showcased the role of Community
Policing in today’s broader landscape of challenges such as radicalization, riot
policing and technological innovations.
As became clear throughout this book, Community Policing is a continuously
developing concept that—together with the accompanying CP practices—under-
goes significant changes over time, while the speed of its emergence and the
direction of its development vary from country to country. The main challenge that
emerged from all contributions is the clear message that Community Policing needs
to take into account regional, cultural, social, religious, etc. differences across
countries (and often even across contexts within the same country), while at the
same time it also needs to be harmonised across Europe to ensure that good
practises can be expanded to benefit all European citizens and that cross-border
cooperation can provide additional advantages to the way Community Policing is
delivered.
Our introduction to this volume not only highlighted the fact that developing
successful CP procedures depends on the overall socio-political context in each
country, but also emphasised the importance of Community Policing as an
instrument for bring communities and the police closer together to enable
co-creation of safety and the development of social cohesion (see also Chap. 2). In
addition, Chaps. 3 and 4” have highlighted the imperative role of ‘accountability’,
‘partnership’ and ‘trust’ to police by communities and their impact on the legiti-
matisation of police engagement and actions within communities. In various
chapters of this volume, our authors have further identified and elaborated on the
critical role of information and communication technologies (e.g., Chaps. 6, 12 and
15) and particularly of social media as a key facilitator and enabler of Community
Policing (cp. Chaps. 11 and 13), while Chap. 5 provided a systemic perspective of
Community Policing as a social system with four key components (elements,
environment, structure and mechanisms).
Synthesising the disparate case studies in Chaps. 6–13 and the evaluation criteria
identified in Chap. 17 we can identify critical success factors (CSFs) for the real-
isation of Community Policing (regardless of its implementation method), which
can be summarized into six fundamental principles:
bayerl@rsm.nl
18 Concluding Remarks 271
1. Trust building
2. Timely information exchange
3. Accountability
4. Prevention of crime
5. Community cohesion
6. Engagement and partnership.
We therefore argue that the adaptation of any CP model, strategy, technology or
CP process for implementation within (general or specific) communities should
consider the above six CSFs as underlying principles for measuring the success of
Community Policing.
Many of the insights and discussions within the chapters of this volume derive
from national, European and international research initiatives. Particularly the book
benefited from numerous collaborative projects, sponsored by the European Union
within the FP7 and Horizon 2020 Research Frameworks. These projects (UNITY,
INSPEC2T, NEXES and TENSOR, to name just a few) are interdisciplinary
research projects involving numerous academic institutions, industrial companies
and Law Enforcement Agencies aiming to strengthen connections between the
police and communities in order to maximise the safety, security, freedom, justice
and quality of life of all European citizens. The projects take into account the
diverse nature of European society and propose new and innovative ways of
delivering Community Policing in Europe.
Yet, although the discussions and examples were framed within a European
context, the conceptual considerations as well as the practical insights, experiences
and lessons of this book are—in our estimate—just as valuable for practitioners and
(police) scholars outside Europe; especially with respect to the more general dis-
cussions around the concept and foundations of Community Policing and its
deployment and success within local contexts. With this our book provides the
conceptual foundations as well as practical guidance for how Peel’s requests for “a
relationship with the public that gives reality to the historic tradition that the police
are the public and that the public are the police” can be given shape in today’s
interconnected, multi-faceted and ever-changing world.
bayerl@rsm.nl