Atnaujinkite slapukų nuostatas

El. knyga: Terrorist Profiling and Law Enforcement: Detection, Prevention, Deterrence [Taylor & Francis e-book]

  • Formatas: 240 pages, 5 Tables, black and white; 2 Line drawings, black and white
  • Išleidimo metai: 11-Feb-2021
  • Leidėjas: Routledge
  • ISBN-13: 9781003005711
  • Taylor & Francis e-book
  • Kaina: 180,03 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 257,19 €
  • Sutaupote 30%
  • Formatas: 240 pages, 5 Tables, black and white; 2 Line drawings, black and white
  • Išleidimo metai: 11-Feb-2021
  • Leidėjas: Routledge
  • ISBN-13: 9781003005711
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities.

It explores two main themes arising from the phenomenon of terrorist profiling: the lawfulness of terrorist profiling and the utility of profiling. These two themes are explored in three separate parts. Firstly, the book begins by drawing upon human rights concerns arising from the use of terrorist profiling by law enforcement officers. Secondly, an analytical framework capable of making determinations on the usefulness of terrorist profiling. This framework develops a profiling spectrum that ranges from formal and informal manifestations of terrorist profiling that forms the basis for evaluating its usefulness. Finally, the book presents an examination of various manifestations of terrorist profiling by separating the analysis of the construction of profiles on the one hand, from their application, on the other, so as to be able to identify and examine profilings usefulness as a technique to assist law enforcement officers make predictions about likely offender characteristics.

This book ultimately concludes that terrorist profiling should only be conducted by undertaking a systematic assessment of the construction of profiles separate from the application of profiles whilst simultaneously taking into account fundamental human rights concerns with the practice of terrorist profiling.

The work will be an essential resource for academics, law enforcement officers and lawyers in the disciplines of law, criminology, human rights, criminal justice and policing. As the book engages with terrorist profiling, it will also be of interest to those engaged in the psychology of terrorism.
Table of cases
xii
Table of statutes
xiii
Figures and tables
xv
Acknowledgements xvi
Preface xvii
1 Introduction
1(17)
1.1 Introduction
1(1)
1.2 Terrorism and profiling a definitional problem
2(2)
1.3 Central analytical aim
4(2)
1.4 Book outline
6(4)
1.5 Contribution to knowledge
10(3)
1.6 Research limitations
13(1)
1.7 An analytical framework to assess/measure the effectiveness of terrorist profiling
13(5)
2 The compatibility of terrorist profiling with fundamental rights
18(27)
2.1 Introduction
18(1)
2.2 Theoretical approaches to assess the compatibility of terrorist profiling with fundamental rights
19(3)
2.3 The definition of profiling when sensitive characteristics are used in the profiling process
22(4)
2.4 The lawfulness of including sensitive characteristics in terrorist profiling
26(10)
2.4.1 Philosophical underpinnings of the right to non-discrimination
26(1)
2.4.2 The content and scope of the legal right to non-discrimination
27(3)
2.4.2.1 Legitimate aim
30(1)
2.4.2.2 The proportionality of the measure
30(2)
2.4.2.3 The standard of review
32(1)
2.4.2.4 Further observations
33(3)
2.5 Conclusion
36(9)
3 Criminal profiling and its applicability to terrorist profiling
45(40)
3.1 Introduction
45(1)
3.2 Deductive profiling
46(13)
3.2.1 The origins of profiling
47(1)
3.2.2 Non-scientific deductive profiling approaches
48(2)
3.2.3 Non-scientific deductive profiling approaches a critique
50(1)
3.2.3.1 An absence of standardised methods and approaches
51(1)
3.2.3.2 Poor consistency in the use of language
51(1)
3.2.3.3 Misapplication of typologies
52(1)
3.2.3.4 The high dependence on law enforcement instinct and prior investigative experience
53(1)
3.2.3.5 An absence of clear procedures
54(1)
3.2.3.6 Little investigative value?
54(1)
3.2.4 Scientific deductive profiling approaches
54(2)
3.2.5 Scientific deductive profiling approaches a critique
56(1)
3.2.6 The applicability of deductive profiling approaches to terrorism
57(2)
3.3 Inductive profiling
59(14)
3.3.1 Introduction
59(1)
3.3.2 Actuarial prediction and criminal justice
60(1)
3.3.3 Inductive profiling methods the computation of an inductive argument
61(1)
3.3.4 Inductive profiling a critique
62(1)
3.3.4.1 The size of the criminal record samples
62(1)
3.3.4.2 The accuracy of criminal records
63(1)
3.3.4.3 The variance in practice
64(2)
3.3.4.4 Profiler training
66(1)
3.3.4.5 Summary conclusions
66(1)
3.3.5 Inductive profiling and its applicability to terrorism
67(1)
3.3.5.1 Inductive profiling and terrorism records
68(2)
3.3.5.2 Inductive profiling and the overlapping nature of terrorist crimes
70(1)
3.3.5.3 Inductive profiling and the size of terrorism record samples
70(1)
3.3.5.4 Terrorism records and the accurate recording of information
71(1)
3.3.5.5 Conclusion: inductive terrorist profiling and other issues
72(1)
3.4 Conclusion
73(12)
4 Formal terrorist profiling: The construction and application of terrorist profiles
85(40)
4.1 Introduction
85(2)
4.2 Knowledge discovery processes and data mining
87(5)
4.2.1 Introduction
87(1)
4.2.2 The construction of profiles using knowledge discovery processes and data mining
87(3)
4.2.3 Knowledge discovery processes and data mining summary
90(1)
4.2.4 The evaluation of knowledge discovery processes and data mining approaches in light of established profiling methods
91(1)
4.3 The application of knowledge discovery processes and data mining by law enforcement officers
92(13)
4.3.1 The application of knowledge discovery processes and data mining approaches in Germany
93(4)
4.3.2 The application of knowledge discovery processes and data mining approaches in the US
97(2)
4.3.2.1 Knowledge discovery processes in financial transactions
99(2)
4.3.2.2 Knowledge discovery processes at ports
101(3)
4.3.2.3 General knowledge discovery processes the total information awareness scheme
104(1)
4.3.2.4 Knowledge discovery processes in the US summary
105(1)
4.4 An evaluation of knowledge discovery processes in the context of terrorism
105(8)
4.4.1 Assessing/measuring the effectiveness of terrorist profiling
106(1)
4.4.2 The input assessment of the effectiveness of constructing formal terrorist profiles
107(3)
4.4.3 The output assessment of the effectiveness of the application of formal terrorist profiles
110(1)
4.4.4 The impact of formal terrorist profiling methods
111(1)
4.4.4.1 Germany
111(1)
4.4.4.2 The United States
112(1)
4.5 Conclusion
113(12)
5 Behavioural profiling: The construction and application of behavioural profiles in the context of terrorism
125(31)
5.1 Introduction
125(1)
5.2 The construction of behavioural profiles
126(8)
5.2.1 The categorisation of behavioural profiling
127(1)
5.2.1.1 Biometric profiling
127(1)
5.2.1.2 Psychometric profiling
128(1)
5.2.1.3 Sociometric profiling
128(1)
5.2.1.4 Summary
128(1)
5.2.2 The behavioural profiling methods/approaches
129(1)
5.2.2.1 The assessment of emotion
129(1)
5.2.2.2 The assessment of gesture
130(1)
5.2.2.3 The assessment of gait
130(1)
5.2.2.4 Summary
130(1)
5.2.3 An evaluation of behavioural profiling methods/approaches
131(3)
5.3 The application of behavioural profiling approaches in the context of terrorism
134(11)
5.3.1 The application of behavioural profiling in Israel
134(3)
5.3.2 An assessment of the effectiveness of behavioural terrorist profiling in Israel
137(3)
5.3.3 The application of behavioural profiling in the US
140(2)
5.3.4 An assessment of the effectiveness of behavioural terrorist profiling in the US
142(3)
5.4 Conclusion
145(11)
6 An examination of manifestations of informal terrorist profiling
156(55)
6.1 Introduction
156(2)
6.2 Stop and search in England and Wales
158(26)
6.2.1 The power to stop and search in England and Wales
158(2)
6.2.1.1 Stop and search requiring reasonable suspicion
160(2)
6.2.1.2 Stop and search without reasonable suspicion
162(1)
6.2.1.3 Section 47A-C of the TA 2000
163(4)
6.2.1.4 Section 53 and Schedule 7 of the TA 2000
167(3)
6.2.1.5 Summary
170(1)
6.2.2 The use of stop and search by law enforcement officers in England and Wales
171(1)
6.2.2.1 The statistical evidence on the use of stop and search
171(1)
6.2.2.2 Limitations of the available statistical evidence
171(2)
6.2.2.3 Stop and search requiring reasonable suspicion
173(2)
6.2.2.4 Stop and search not requiring reasonable suspicion
175(5)
6.2.2.5 Evaluation of the statistics
180(2)
6.2.2.6 People's experiences of stop and search in England and Wales
182(1)
6.2.2.7 Stop and search powers as an example of informal terrorist profiling
183(1)
6.3 Other evidence indicating informal terrorist profiling
184(8)
6.3.1 The practice of mass identity checks by law enforcement officers
185(3)
6.3.2 The practice of targeted raiding by law enforcement officers
188(1)
6.3.3 For example, according to the International Helsinki Federation for Human Rights
188(2)
6.3.4 Law enforcement use of powers of arrest and imprisonment
190(2)
6.4 The usefulness of informal terrorist profiling
192(6)
6.4.1 The input effectiveness
192(1)
6.4.2 The output effectiveness
193(1)
6.4.3 The impact of informal terrorist profiling
194(1)
6.4.4 Stop and search in England and Wales
194(3)
6.4.5 Summary
197(1)
6.4.6 Other qualitative studies on the exercise of police powers
197(1)
6.5 Conclusion
198(13)
7 Conclusion
211(6)
Bibliography 217(18)
Index 235
Noel McGuirk is a Lecturer in Law specialising in terrorism law at Lancaster University Law School. Previously, Noel was a judicial research assistant at the Courts Service (Ireland) based in the Court of Appeal and worked on various research projects during his tenure. Noels research interests broadly focus on the relationship between terrorism, counterterrorism and human rights law. He is particularly interested in analysing legal responses to terrorism that have been adopted by various states to assist in preventing, detecting and deterring terrorism threats.