Home > Criminology essays > Whether crime moves in response to the law enforcement targeted operation

Essay: Whether crime moves in response to the law enforcement targeted operation

Essay details and download:

  • Subject area(s): Criminology essays
  • Reading time: 17 minutes
  • Price: Free download
  • Published: 11 December 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 4,782 (approx)
  • Number of pages: 20 (approx)

Text preview of this essay:

This page of the essay has 4,782 words.

There are many discussions and argument for long time whether crime moves in response to the law enforcement targeted operation (Repetto, 1974; Hakim & Rengert, 1981; Barr & Pease, 1990).  However Eck (1993) and Hesseling (1994) argued that although the empirical evidence is often less convincing than the rhetoric.  There are arguments that due to the negative effects of the enforcement strategies that has actually resulted in a diffusion of crime rather than a displacement of crime; it is believed that the crime reduction may due to the spill over due to the police operation into areas not directly targeted by the law enforcement action (Clarke & Weisburd, 1994; Green, 1995; Ratcliffe, 2002).  Until recently there has been no systematic approach in acquiring empirical support for either side of the argument, although there has been a need for a methodology that is solid enough to clarify any displacement or diffusion of benefits and being simple enough to be applicable across a range of situations and user accessibilities.  The introduction of the weighted displacement quotient (WDQ) from Bowers and Johnson (2003) attempted to address many of these issues.

Normally crime incidents are neither uniformly distributed over space nor randomly distributed.  Rather, they occur in some form of clusters or trends. Numerous researchers have identified various sociological, temporal, and behavioural characteristics of offenders and crime locations that inform the non-random nature of crime clustering as Chainey and Ratcliffe (2005) have discussed in their research. Comparing both rational choice perspective (Cornish & Clarke 1986, 1987; Clarke & Felson, 1993) and discussion of routine activities theory (Cohen & Felson, 1979; Felson, 1998) Brantingham and Brantingham (1993a) elaborated the idea that crimes occur as criminally motivated when individuals come into contact with suitable targets as they travel between places and through areas that are known to them and wherein they are comfortable (awareness spaces).  Further, they stated that crimes occur within cities where criminal behaviour is highly patterned and frequently localized (Brantingham & Brantingham, 1993b).  Brantingham & Brantingham (1993a) argued that certain areas will experience disproportionate amount of different types of crime due to the newly setup design on urban areas and also the people within the cluster therein. If this idea is combined with place-specific attempts by crime prevention practitioners to reduce crime then it is really concerned with the displacement of crime.

The central tenet of displacement concerns is that criminally motivated offenders, when prevented from committing crime at a particular location or in a particular way, will not be dissuaded from criminality but will simply be displaced to commit crime in some other manners.  Repetto (1974), Hakim and Rengert (1981) identified five forms of displacement as the result of blocked criminal opportunities.  The first three are temporal displacement where the time of the offense changes, spatial displacement where the location changes, and target displacement where the target changes.  The other types of displacement include method displacement, where the method the offender uses to commit the offense changes, and finally type displacement, where the offender changes from one type of offense to another (Repetto, 1974; Hakim & Rengert, 1981).  In the view of action-oriented researchers aiming for a crime prevention outcome, Barr and Pease (1990) took a more theoretical approach in considering displacement as both a frustrating side effect and a predictable effect of specific policies and a manipulative tool of crime control.  Barr and Pease (1990) concluded that displacement or deflection of crime is simply a reorganization of the space and time in which a potential criminal comes in contact with a potential victim, and that displacement is valuable not only for the planning of short-term strategies, but because it illuminates the choices that have been made which lead to the present pattern of crime (Barr & Pease, 1990).  Many crime displacement researches tend to test for spatial displacement (Hesseling, 1994) but there is rarely research non-spatial example as discussed by Yang (2008).  Yang (2008) focused on economic risks and loss resulting from changes in Philippines customs procedures, identifying predominantly method displacement, where changes and increases in enforcement of customs procedures caused adaptations in methods of evasion of duty payments.  Spatial displacement is often articulated by practitioners and criminology researchers as a negative outcome from a crime prevention operation.

Ratcliffe (2002) cited various examples of researchers who have encountered a negative response of practitioners to suggestions of displacement.  The general concern expressed is that crime displacement eliminates the effectiveness of crime reduction operations by pushing crime to nearby areas or other crime types.  This assumption is often predicted on the overly optimistic notion that without displacement no crime would have occurred at all, a notion that places greater faith in crime prevention strategies.  As Clarke (1995) noted that the uncritical acceptance of crime displacement may also mean that increases in crime, which might have occurred anyway, have sometimes been wrongly attributed to displacement.  The incorrect view that crime displacement is inevitable which do not result in any net reduction in crime is a negative outcome of a crime prevention operation.  It has not been effectively countered by a research tradition that although blessed with evidence, lacks appropriate tools and a public voice.  Where crime displacement does occur, it is usually the result of situations that forces criminals to access nearby opportunities not within the confines of the enforcement operation.  When criminals are forced into secondary and, by implication, less effective target choices, this will theoretically result in less crime.  This idea was echoed by Eck (1993), who in his summary of thirty-three studies of crime displacement found that crime displacement is least likely to occur in the direction of unfamiliar places, times, targets and behaviours; what he termed as familiarity decay (Eck, 1993). Eck (1993) concluded that prevention and crackdown efforts focused on unique situations will have less displacement than prevention or crackdown efforts focused on general situations.

Empirical evidence supports a lack of total crime displacement.  For example, both Hesseling’s (1994) meta-analysis and Ratcliffe’s (2005) empirical work in Canberra have concluded that crime displacement is not an inevitable outcome of a police crackdown on crime suppression operation.  Green (1995), while examining the impact of a specialized multiagency response team on Cornish and Clarke (1987), conceptualized crime displacement from the perspective of rational choice theory.  From their examination of the choices made by criminals in the decision to commit crimes and their choice of targets, they believed that crime displacement could best be explained and understood by concentrating on the criminal’s personal decisions and choices made in committing crime.  Cornish and Clarke (1987) viewed the opportunities and decisions together with costs and benefits that are closely linked with certain offenses intention to establish the confines of crime displacement within different categories of offense.  If this is the true case, then it is less possible to justify a generalized approach to crime displacement.  This may requires security practitioners and researchers to be more open to the possibility that crime displacement might or might not occur with different spatio-temporal and other crime displacement typology due to the characteristics for different crime types and situations.  This raises the specter that crime displacement areas might not be uniform, with the corollary that the spatial context of the wider environment surrounding a crime prevention operation must be considered.

Clarke and Weisburd (1994) discussed that the diffusion of benefits is the spread of the beneficial influence of an intervention beyond the places which are directly targeted whereas the target of control are the individuals.  Ratcliffe and Makkai (2004) discussed that the crimes which are the focus of intervention and the time periods in which an intervention is brought (identified two types of diffusion of crime control benefits: deterrence and discouragement.  Ratcliffe and Makkai (2004) also argued that deterrence is closely related to an increase in the potential criminal’s perceived risk of apprehension, and discouragement relates to an increase in the perceived effort required to complete the criminal act. Both mechanisms are capable of reducing crime in areas not specifically targeted by a crime reduction policy because the levers they pull relate to criminal perception rather than increases in actual risk or actual effort to commit crime.

Evidence for diffusion of benefits can be found in Weisburd et al. (2006) on social observations and ethnographic research that examined immediate crime displacement and diffusion effects of Jersey City interventions focused on prostitution, disorder, and drug market activity.  They found a tendency among those they interviewed to resist moving and re-establishing their prostitution or drug activity in another location.  Further, they noted statistically significant trends in target and catchment areas regarding the decline of disorder offenses, leading to the conclusion that the crime control efforts diffused into the areas surrounding the target sites (similar trends were seen with prostitution and drugs, although the trends in drug crime lacked statistical significance).  Their results supported rational choice and routine activity as theoretical explanations, as well as giving credence to Eck’s (1993) concept of familiarity decay.  However, with the exception of a few research papers, it can be concurred with the view of Hesseling from over a decade ago that most of the extant research lacks interest in, or intent to seek, evidence of a diffusion of benefits (Hesseling, 1994).  This situation remains today, even with the explosion in recent years of the use of geographic information systems (GIS) and GIS science within policing and criminal justice research.  This is very unfortunate situation as those actively seeking out evidence of this benefit will help the Police or law enforcement to justify their operational expenses and planning for future crime reduction strategies (Ratcliffe & Makkai, 2004).  It can also increase the theoretical understanding of criminal response to targeted policing strategies beyond the practical policing and crime reduction benefit

Ratcliffe and Breen (2011) conducted research on the use of weighted displacement quotient (WDQ).  The use of the WDQ has been shown to be of value beyond the initial application to burglary, as predicted by Bowers and Johnson (2003). Furthermore, with the inclusion of some relatively simple statistics; the research shows it is possible to enhance the WDQ and increase the statistical robustness, which helps determine the suitability of the chosen buffer area.  The addition of the phi statistic helps to ascertain that the buffer and target areas are functioning relatively independent of each other.  In this way security practitioners using the tool to examine police operations and crime prevention tactics are able to address better the possibility that any changes to the buffer area are not simply a corollary of changes in the target area but rather might be an independent reaction to the crime suppression operation.  If there are noticeable changes to the buffer area, security practitioners are frequently interested to know whether the buffer area changes were a response to the treatment.  This interest is usually confined to an assumption of complete crime displacement and rarely the more likely possibility of some diffusion of benefits.  The phi statistic can inform this understanding by clarifying the relationship between target and crime displacement area; ruling out the possibility of spatial autocorrelation early in an analysis.  If the phi value is low, it can be argued that the buffer area appears to be behaving largely independent of the target area.  We can then use the WDQ to determine how much the treatment influenced the buffer area through crime displacement or diffusion and take this into account when assessing the value of the treatment.

2.7 Cargo Thieves becomes Professional

Cargo thieves are becoming more tactical and strategic about how they are going strike.  A thriving black market keeps cargo thieves in business to the detriment of the global economy. Cargo crime is not new and has been around for centuries as history documented robbers attacking merchants on trading roads to pirates seizing ships at sea and to bandits on horseback robbing stage coaches. Cargo crime has been evolving along with technology advancement and cargo transportation methods where trucks have been replaced with horse-drawn carriages.  The cargo criminal syndicates have organized into international crime and today cargo crime is an international problem affecting consumers and businesses alike.  Currently due to global economy, raw materials for manufacturing and sourcing often occur in different part of the world.  The finished product may be warehoused and consumed in another and cargo can be stolen at any point within the supply chain.  Cargo criminals are becoming very professional and work in highly organized groups, targeting specific items and employing people who are specialist to bring a different set of criminal skills to the group.  Take for example professional cargo criminals, whose bases of operations are truck yards, hubs for commercial freight cargoes, airports and sea ports.  While other criminals target cash and valuable items, these professionals make of with other goods.  Cargo criminal used sophisticated operations with well organized hierarchies of leadership.  They employ specialists who can carry out different tasks and responsibilities including hijackers and brokers or fences that help dispose the stolen goods.  Normally the fences work very closely with drivers in moving the stolen cargoes into the black market to be dispersed.  Sometimes foreign labourers are used to move the cargoes and work with drivers in transporting the stolen cargoes from the docks or trucks.  In fencing, cargoes are brought from another party who is in illegal possession of those cargoes.  The cargoes stolen will be disposed through fences for local market and sometimes the cargoes are taken out of the country in a very short time to avoid being detected by the Police.  These professional syndicated gangs usually employ a specialist who is an expert at foiling the anti-theft locks and GPS system on truck and trailers in order the hijack the truck.  Cargo criminals usually heist whole truck load of cargo of which the average freight on a trailer can be valued up to a few million dollars depending on the type of cargoes.  There are many cases especially cargoes of electronics products being hijacked from Malaysia and found in the black market overseas the next day.  This is how efficient and sophisticated network that the professional cargo criminals have today.

Global economic crisis has increased the worldwide demand for black market goods.  Palmer (2010) revealed that in the United States, it is estimated there are $30 billion worth of cargoes are stolen annually and usually cargo criminals are sophisticated and well organized.  Palmer (2010) revealed that the criminals are often recruited from the United States but trained by Cuban crime syndicates and then deployed to Florida to execute their operations.  The stolen cargoes from the United States are brought to ports and exported in ocean containers to many countries Latin America.  From there, the goods are sold through black market distribution channels.  Fleet Owner, Sam Rizzitelli revealed that there are ranges of new cargo crime tactics are being deployed to help criminal to have better control and thus mitigate the risks of the crimes they are trying to commit (Sean Kilcarr, 2013).  Rizzitelli explained that these new tactics fall into three categories: identity theft, fictitious pickups and misdirected loads/fraudulent carriers.  The criminals are very creative and change their methods to develop better ways to get away with cargoes rather than commit straight theft where loads are physically stolen from parking lots or terminals and risking getting spotted and potentially be involved in a high speed chase.  The cargo criminals are trying to be more strategic about committing the crime so they can better pinpoint and steal specific types of cargo.  These strategic kinds of crimes are due to the combination of many factors where more sophisticated technology being used with greater access to information within the logistics industry and the involvement of more intermediaries throughout the supply chain.  This allows cargo criminals to be in better control of the timing and location of a theft.  In many cases, getting the desired cargoes and handed them over to the criminals is easier than having to hunt it down and steal them.

Criminals are becoming increasingly creative in using the internet to pull off cargo crime throughout the supply chain (Bill, 2010).  Cargo criminals are using the internet to track shipments, book transportation with legitimate air carrier and conversely set up bogus transportation operations that will arrange cargo pick-ups for legitimate shippers and forwarders.  These criminal called a legitimate harbour trucking company whose drivers have the credentials to pick up the container at the marine terminal and deliver it to a non-descript warehouse location.  Another ploy is for criminals to advertise on-line as a trucking company.  Interested parties on these cargo or intermediaries whose regular truck is unavailable for a particular job will hire the fake operation.  These imposers may hold the cargo hostage and demand a large sum of money to release it, or the criminal may sell the merchandise.

The FBI revealed that cargo crime is a multi-billion dollar criminal enterprise in the U.S. and this organization has setup seven task forces located around the country to combat this problem.  In the Memphis region the theft task force reported that there is an average of one cargo crime a day in the year from January 2011 to September 2011 and they have recovered more than USD$1.5 million in stolen cargoes and vehicles (Conrad, 2012).  Some of these syndicates are so organized that each member has their own specialty, from the break-in expert who can steal a rig in seconds; drivers, surveillance team and the person who are able to defeat the specialized locking devices easily.  Conrad (2012) agreed that thieves often rob warehouses on a Friday night and by the time the crime is discovered and reported on Monday morning, the stolen goods may already be on a store shelf or auctioned online.  Cargo crime is sophisticated and is becoming an organized enterprise.

2.8 Cargo Security Preventive Measures

The terrorist attacks on September 11, 2001 had tremendous impact on international trade policy and this incident have changed the landscape of security worldwide.  USA was the first country to introduce cargo security initiatives to prevent cargo theft and monitor the cargo entering into USA.  European Union and other international organizations also began to take preventive measures and established new security programs in order to secured cargo movement across borders.  Some of the programs implemented are Custom Trade Partnership against Terrorism (CTPAT), Authorized Economic Operator (AEO) and many other initiatives.  The United States Custom and Border Protection (US CBP) believed that international trade must work together in trade facilitation.  The intention of United States Custom Border Protection within the supply chain security program is to initiate the CTPAT which was introduced to secure global supply chains with strict measures taken in order to protect all the cargoes entering United States.  The United States government introduced CTPAT as a voluntary program between the authority and the businesses to secure the cargo entering the country.  After the implementation of CTPAT, the European Union also introduced a similar program named Authorized Economic Operator (AEO) which is similar to CTPAT to ensure the security and facilitation of transportation within the supply chain in European countries.

US CBP has also introduced an information processing and forwarding system called the Automated Manifest System (AMS) which is a multi modular cargo inventory control and release notification system for sea, air and rail carriers.  The main aim of the system is to interconnect as many parties in supply chains as possible including the US CBP and other authorities in order to make data related to cargo more accessible and to forward crucial information regarding shipments through this unique system between the players.  The Container Security Initiative (CSI) is in contrast to CTPAT, maritime initiatives implemented in 2002 by US CBP and its aim is to facilitate container movements in sea traffic and to ensure security.  The main idea of the Container Security Initiative is to shift prevention, control and inspection outside of United States borders.  By implementing control measure at the port of departure, high risk containers could be indentified before entering the United States of America (USA).  CSI officers together with authority officers from the bilaterally contracted countries will inspect containers that are being transferred from the port in question to USA.

World Customs Organization (WCO) acts as the independent international and inter-governmental organization throughout the world dealing with customs matter and they have developed the following standards, guideline and cooperation such as:

a. Global standards;

b. Simplification and harmonization of customs procedures worldwide;

c. Trade supply chain security;

d. The facilitation of international trade;

e. The enhancement of customs enforcement and compliance activities;

f. Anti counterfeiting and privacy initiatives;

g. Public-private partnerships;

h. Integrity promotion; and

i. Sustainable global customs capacity building programs

The WCO mission is also to contribute to a more effective flow of cargo in a global world amongst its members, developing security standards such as the SAFE framework, building up networks, stimulating cooperation and fostering collaboration between customs authorities and border regulatory agencies, businesses and governments.   The International Maritime Organization (IMO) has introduced the International Ship and Port Facility Security (ISPS) Code in order to enhance security in maritime transportation worldwide.  The main intention of ISPS code is to create a standardized, stable framework of risk evaluation in order to allow governments to offset changes in threat with changes in vulnerability for ships and port facilities.  According to ISPS code, the only way to defeat threat is to reduce vulnerability.  The ISPS is part of the International Convention for the Safety of Life at Sea (SOLAS) so it is obligatory for 148 SOLAS contracting parties to follow the requirements.  For those countries that are IMO members but not yet included in SOLAS does not have to comply with the ISPS code.  The SOLAS code is mainly focussing on security related requirements for shipping companies, port authorities as we as governments agencies.  The Maritime Transportation Security Act of 2002 (also referred as MTSA) can be seen as the counterpart to the ISPS Code in the US.

One of the most important components of European Union’s (EU) modified community custom code is called Authorized Economic Operator (AEO).  The intention of this program is to recognize the organization as low risk and more trusted actor under certain circumstances when it comes to actions with customs authorities within the European Union (EU) countries.  It is therefore required that the authorized operator comply the requirements set by the customs authority.  There are three different types of certification based on which alleviation is preferred by the economic operator.  The core part of the European Union’s customs security program is the Import Control System (ICS) which came in effect on January 1st, 2011.  The main intention of this program is to perform risk analysis before the arrival of cargo into the European Union’s countries.  The main focus is the security of the Union and citizens rather than tariff controls but threats such as piracy should be defeated and consumerism strengthened.  In order to declare cargo imported to the EU, an Entry Summary Declaration has to be submitted first.

2.8.1 Cost Impact of cargo security preventive initiatives

The economic effects of crime are significant.  Victim and taxpayer costs of crime continue to escalate and scarcer public funds must now be allocated in ways to more efficiently alleviate the economic pressures of crime.  Fowles, Byrnes and Hickert (2005) studied on the economic consequences of various security intervention programs with the intention to reduce crime based on statistical analysis of 309 studies of the intervention programs.  The analysis provides a menu; which allow decision makers to assess the economic performance of one program relative to another in term of standard monetary measures.

Cost for implementation of any security initiatives is always a concern to the business.  Research conducted by Signoret (2009) after the implementation of Cargo Security Initiatives (CSI) by the US government in several foreign ports found that there is no significant impact on trade flows or implicit costs.  The researcher analyzed detailed monthly data for all containerized US imports from 1999 to 2006, by foreign port and country of origin.  This analysis exploits the longitudinal data at the port level and the carrying starting dates across CSI ports to identify the casual effect of the initiative on import costs.  While significantly higher monetary import charges over time are observed in the data and particularly so for CSI ports, the result found no significant evidence of a CSI effects on these trade costs.  The underlying port specific trends and unobservable trade route heterogeneity are in controlled.

Freight security initiatives do not necessarily result in cost increased or reduced services.  Security improvements can also reduce logistics and supply chain costs by improving supply chain visibility and enhancing transit reliability, resulting in collateral benefits to efficiency and effectiveness of the supply chain.  Supply chain and transportation security improvements may improve security and thus producing collateral benefits to security management within the supply chain.  DAMF Consultants and LP Tardiff & Associates (2005) estimated the post 9/11 costs the Canadian trucking industry about USD$179 million to USD$405 million per annum due to the changes in Unites States border security programs.  A number of issues were raised by carriers and shippers in the study that are contributing to this problem included:

j) the lack of FAST lanes at certain border crossing;

k) having to wait in a general queue in order to get access to FAST lanes;

l) the uncertainty of wait times at the border that causes some truckers to build in a delay factor in the planning of their operations;

m) restricted hours of operation at the border or number or customs booth open at the border, particularly for FDA inspections;

n) the unpredictability and time required by custom brokers to process commercial invoices and then communicate with carriers once the shipment is in compliance.

In some cases, this has resulted in trucks departing earlier in the day or even the day before to allow for, or avoid delay at the border.  Similar impacts were found in the ITS– CVO Border Crossing Deployment Evaluation (IMTC, 2003) which estimated that waiting times approaching the border cost the trucking industry USD$13.8 million and at the booth another USD$0.8 million or USD$14.6 million annually.  Custom broker related costs added USD$7.4 billion for a total of USD$22 billion.  Chow, Frank and Gados (2006) found the same impacts on investment, costs and operating effectiveness due to security regulations and requirements can be found in the maritime and air sectors as well.  The cost incurred by the carriers and other logistics service providers such as shipping lines and port terminal security are eventually distributed to the shippers or absorbed by the logistics service providers.  Security improvements come at a cost.  A private sector analysis conducted by the International Monetary Fund (IMF) estimated the increase to business costs due to higher security at USD$1.6 billion per year, the extra financing burden of carrying 10% higher inventories at USD$7.5 billion per year.  Another study estimated an increase in commercial insurance premiums of 20 percent at about USD$30 billion a year (Peleg-Gillai, 2006).

Willis, H.H. and Ortiz, D.S. (2004) recognized that supply chain security and efficiency are inseparable.  Improving the supply chain efficiency may or may not improve supply chain security.  For example, labour reductions for the sake of efficiency may decrease security.  Proponents of increased supply chain security often cite efficiency as an auxiliary benefit, although the two properties are often independent.  Increased inspection could create delays that would lead to losses of perishable cargo or to negative economic effects on consignees.  The interconnected nature of supply chain capabilities suggests that security measures that reduce efficiency could have been unintended because stakeholders will look for ways to compensate for or circumvent the security requirements.  Chow (2007) dud a study to develop a total logistics cost model to stimulate alternative logistics scenarios and security strategies to determine the influence of security initiatives on total logistics cost.  The application of the model to the Asia Pacific Gateways demonstrates the usefulness of such model in evaluating how security impacts total logistics cost of using this gateway and subsequently the gateway’s competitive advantage.  The total logistics cost model primarily focused on transportation and inventory cost elements of logistics costs.  Expanded model such as loss and damage cost, reduced insurance costs and packaging costs could be considered as elements of cost.  In addition, security initiatives that impact visibility of freight movements along the supply chain can boost the ability of logistics managers to make improved decisions.  For example, with advanced information required for security, improved advanced planning may results in increased consolidation opportunities, the ability to cross dock freight and advanced capacity planning.  These shift the cost curves facing logistics manager, rather than move along a given cost curve.  Tikkakoski and Solakivi (2011) conducted research on the Impact of Market Structure on the Road Freight Safety and Security in the Baltic Sea region.  The findings revealed that although the global financial crisis in 2008 has severely altered the balance between high good value freight transport demand and supply, service providers and authorities agreed that the level of road safety and security has not deteriorated significantly.

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Whether crime moves in response to the law enforcement targeted operation. Available from:<https://www.essaysauce.com/criminology-essays/whether-crime-moves-in-response-to-the-law-enforcement-targeted-operation/> [Accessed 15-04-26].

These Criminology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.