Hacking - Does Self-Control Theory Explain Participation in the Hacking Subculture?

iStock_000033077982XLarge_resized.jpg

Hacking: Does Self-Control Theory Explain Participation in the Hacking Subculture?

The proliferation of automated tools and access to information and guides through online resources provide youth with ample opportunities to become acquainted with the tools and techniques of hacking. Low self-control is a risk factor for engaging in delinquent behaviors, including an inability to consider the long-term ramifications of participating in an array of hacking techniques. Further, the interaction of low self-control and opportunities to learn about and engage in hacking activities can account for the disproportionate number of young males engaging in such behaviors, as well as the lower prevalence of older hackers.

The General Theory of Crime, or Self-Control Theory, cannot completely explain such behaviors without modifying Gottfredson and Hirschi’s concept of crime itself. Computer hacking requires more planning and knowledge than Gottfredson and Hirschi’s original conceptualization of crimes requiring little or no skill or planning, providing immediate and easy satisfaction of simple desires, and resulting in pain for the victim (Buker, 2011).

The core definition of crime aside, Gottfredson and Hirschi’s General Theory of Crime shows some support in explaining general cybercrime and significant support for explaining crime and delinquency. In light of easy access to guides and information exposing youth to computer hacking, the General Theory of Crime can subsequently account for involvement in the hacking subculture when minimal modifications to Gottfredson and Hirschi’s suggested characteristics of crime are made.

Computer Hacking

The definition of hacking has undergone a number of changes over the past few decades, from a positive label attributed to an individual whose innovative use of technology or software modifications yielded benefits to others to the negative connotation currently defining the activity of hacking as the unauthorized access and use of computer systems (Yar, 2013). This second definition, which is further defined as the act of unauthorized access, redesign, or reconfiguration of a computer system to alter its intended function or gain access to information (Bachmann, 2010), conceptually illustrates the framework of computer hacking with which the criminal justice system is concerned.

According to Marcum, Higgens, Ricketts, and Wolfe (2014), computer hacking includes such activities or behaviors as breaking into a computer system or network, the development or use of viruses or other malware, the destruction or alteration of files, the theft of services through technological methods, credit card fraud, and the infiltration of software systems. It should also be noted that there are some activities that are often attributed to hackers, but do not require unauthorized access to computer systems (Yar, 2013). For instance, the use of software to target a server or set of servers and flood those systems with requests in an effort to deny access by legitimate users of the system, also known as a denial-of-service attack, does not require an individual to first break into the target system.

Although Hollywood and the media often portray hackers as individuals who are able to sit at a computer and break into any system on a whim (Yar, 2013), the reality of how hackers achieve their goals is quite different. Some techniques certainly involve the use of computers and an individual’s knowledge of a computer system to exploit vulnerabilities and gain access, but the most common methods utilized are generally simpler or more indirect. Marcum et al. (2014) discuss the use of “brute-force attacks,” wherein someone simply attempts to break into a system by guessing passwords, “shoulder surfing,” wherein someone watches their victim enter a password or personal identification number, and social engineering, wherein someone poses as someone else in order to have a victim provide information that assists the hacker in gaining access to a system, as examples of some of the varied methods utilized by hackers.

Richet (2013) reaffirms the difference between media portrayals of hackers and reality in his examination of how many youth become involved in such activities, citing the low barrier to entry as a result of the formation of hacking communities on the Internet and the dissemination of information throughout such communities as one of the key changes of the past decade or so. As a result of easier access to information about hacking and the development of automated tools that allow individuals to engage in such behavior without advanced technical knowledge, casual hacking has become a normal idea and component of life for most youth (Richet, 2013). In fact, the most common reasons cited for engaging in hacking activities are fun and curiosity (Richet, 2013).

Yar (2013) also emphasizes the lower barrier to entry associated with hacking, noting the prevalence of automated tools that are available to scan networks and locate vulnerable systems and to establish remote control of said systems, tools for creating viruses and worms, tools for capturing and decrypting passwords, and tools for automating denial of service and brute-force attacks against systems.

As a result of the secretive nature of the hacker subculture, it is difficult to ascertain generalizable information about the average offender (Marcum et al., 2014). It is also difficult to measure the extent to which hacking is, or is becoming, a significant criminological issue. However, anecdotal evidence indicates that computer hacking is a serious issue, and that the problem is increasing at an alarming rate (Bossler & Burruss, 2011).

A General Theory of Crime / Self-Control Theory

Michael Gottfredson and Travis Hirschi developed a general theory of crime, also referred to as self-control theory, which attempts to explain all criminal and deviant behaviors. According to Gottfredson and Hirschi, two key components predict the probability of an individual’s choice to engage in a criminal act: an individual’s measure of self-control and the presence of an opportunity (Moon, McCluskey, & McCluskey, 2010). In essence, individuals commit criminal or deviant acts as a result of their inability to resist temptation in the presence of opportunity, and therefore engage in acts that carry long-term consequences that are greater than the short-term benefits (Bossler & Burruss, 2011).

It should be noted that crimes, as defined by Gottfredson and Hirschi, are stimulating, dangerous, or thrilling, require little planning or skill, result in a victim’s pain or discomfort, provide immediate, easy, and simplistic satisfaction of an offender’s desires, and supply few or insufficient long-term benefits (Buker, 2011). In addition to criminal activities, individuals possessing low self-control also tend to partake in other deviant or antisocial behaviors, such as smoking and drinking (Buker, 2011).

According to Gottfredson and Hirschi’s theory, individuals possessing low self-control exhibit such behaviors as seeking instant gratification, insensitivity to others, and limited cognitive skills (Moon et al., 2010). Further, Gottfredson and Hirschi suggest that low levels of self-control also predispose individuals to analogous activities such as smoking, drinking, drug use, gambling, promiscuity, and having children out of wedlock (Donner, Marcum, Jennings, Higgens, & Banfield, 2014).

The general theory of crime has received significant empirical support, with research linking low self-control to academic dishonesty, bullying, illicit sexual activity, drunk dialing, risky driving, digital piracy, and other forms of both traditional and online deviant behaviors (Donner et al., 2014). In fact, Buker (2011) states that the validity of the relationship between self-control and the commission of criminal acts is largely settled, with the primary focus of further inquiry lying in understanding the formation of self-control. Further, Pratt and Cullen’s (2000) meta-analysis of self-control theory shows, on an absolute level, self-control is an important predictor of criminal and analogous behaviors.

Gottfredson and Hirschi posit that the parental socialization process is the primary factor contributing to an individual’s development of self-control, and that levels of self-control remain relatively stable over time; studies from multiple disciplines, including criminology and psychology, indicate that parenting practices are a factor in the development of self-control, but the effect is moderate and not the sole determinant as originally posited (Buker, 2011). Turner and Piquero (2002) note that Gottfredson and Hirschi’s statement regarding the stability of self-control is often misunderstood by criminologists as the development of an absolute, fixed level that remains constant once developed; to the contrary, Gottfredson and Hirschi clearly note that individuals can, and often do, experience absolute changes in levels of self-control over time (Turner & Piquero, 2002).

In sum, support for self-control theory has been demonstrated across a wide range of disciplines, though Gottfredson and Hirschi’s focus on parental socialization as the de facto component driving the development of self-control in individuals is not supported. Buker (2011) states that the formation of self-control, and therefore the underlying component of Gottfredson and Hirschi’s theory, is more complex than originally thought. The nature and development of self-control is tied to parental socialization processes, effective parenting, and several biological and social structural factors affect the development of self-control (Buker, 2011).

Application of Self-Control Theory to Computer Hacking

Moffitt’s (1993) work in exploring the development of antisocial and deviant behaviors in juveniles, leading to the understanding that the majority of youth engage in antisocial behaviors and subsequently desist from further such behaviors as they age, has become a core tenant in criminological literature. Although the root causes of engaging in such behaviors is still debated, Gottfredson and Hirschi’s General Theory of Crime, or Self-Control Theory, provides a solid framework from which to examine the development of delinquent behaviors in youth. In fact, self-control theory has already received empirical support for the theory’s primary argument that individuals with low self-control are more likely to engage in deviant and/or criminal behaviors (Moon et al., 2010).

Focusing on computer hacking and its associated subculture, Gottfredson and Hirschi’s other argument that low self-control coupled with ample opportunity creates the environment in which deviant behavior occurs, becomes readily apparent. The decision to commit a crime, in this case the hacking of a computer system, relies on an assessment by the potential offender of several factors; such factors include, but are not limited to, cursory assessments of the risks and costs of the opportunity presented, self-awareness of the offender’s ability to perform the hack and attain their desired goal, and the availability of a suitable target for the desired goal to be attained (Richet, 2013). Youth, especially teenagers, tend to have lower potential for earning wealth as well as fewer opportunities for the obtainment of income, which leads to a greater propensity to discount risks and future ramifications of their actions when examining the potential opportunities and benefits to be gained from computer hacking (Richet, 2013).

Understanding that low self-control and the availability of an opportunity are the primary two components of Gottfredson and Hirschi’s theoretical framework is the first step in understanding the explanatory power of the general theory of crime as applied to computer hacking. However, there must also be a greater understanding of both components individually in the face of seeming contradictions between the idea of technologically savvy individuals with the patience and skills to break into computer systems and the idea of individuals with low self-control who engage in more traditional street crimes.

The barriers to hacking now, as opposed to even a few years ago, are much lower and less complex (Richet, 2013). Hacking communities have formed and disseminated their knowledge through the help of the Internet, in addition to creating automated tools available freely to anyone (Richet, 2013; Yar, 2013). As Yar (2013) expresses, such tools allow even the inexperienced novice to create and execute a cyber-attack. Further, Bossler and Burruss (2011) detail the ease with which a sub-sect of hackers, referred to as ‘script kiddies,’ are able to utilize such tools to obtain the immediate gratification they seek without understanding the underlying technology. More than half of all data breaches investigated by authorities have been shown to require little or no skill, and to be capable of being carried out by the use of such tools (Bossler & Burruss, 2011). In short, ample opportunity exists for youth to become involved in the hacking subculture with minimal effort, presenting greater opportunities for offending.

Holt, Bossler, and May (2010) found that low self-control positively correlates with the commission of cyber deviance in general, with three factors relating to the measurement of opportunity also showing significant correlations to engaging in cyber deviance: spending time on the Internet for non-school purposes, possessing greater technological skills, and having personal access to a computer. Similarly, Bachmann (2010) found that two of the six components that comprise measures of low self-control, rational thinking styles and propensity to engage in risky behaviors, showed significant importance in predicting success in hacking endeavors (it should be noted that the other four characteristics were not measured as a part of the study). Impulsiveness and shortsightedness also play a role in the engagement of individuals in hacking behaviors, with such characteristics blinding the offender to the ramifications of such a breach of trust as well as insensitivity to the amount of effort required on the part of the targeted victim(s) to attempt to prevent such behaviors (Marcum et al., 2014). Finally, an empirical test of the general theory of crime to explain a wide range of computer related criminal behaviors found that low self-control showed a significant positive relationship to the commission of such acts (Moon et al., 2010). Summarily, the combination of low self-control and relatively easy access to hacking tools and guides provides youth a perceived low-risk opportunity to engage in risk-seeking behaviors that provide near-instant gratification of desires (Richet, 2013).

As illustrated, hackers tend to possess personality characteristics linked to measures of low self-control. In addition, hacking behaviors are illustrative of Gottfredson and Hirschi’s conceptualization of risk-seeking, impulsive, shortsighted behaviors. Finally, such behaviors often manifest themselves in youth, and especially in adolescent males (Moffitt, 1993). Logically, technological advancement has made the knowledge and tools necessary for a generation of inherently technologically savvy youth to engage in behaviors that have become as accepted and ingrained in their daily lives as downloading music onto an iPod (Richet, 2013). It should subsequently become apparent that the decision to engage in computer hacking presents an appealing outlet for youth by providing cognitive challenges coupled with the thrill of overcoming barriers and gaining access to computer systems, which in turn creates greater risks that perpetuates the cycle of increased thrill and excitement with each successful hack (Bachmann, 2010). In essence, the instant gratification of an easy thrill initiates the offender into a subculture where greater risks and challenges may present themselves, but the initial gateway into computer hacking begins with an impulsive act based on easily accessible information and tools that launch the offender along a journey wherein the long-term risks are easily ignored or perceived to be low.

Critical Analysis of Self-Control Theory as an Explanation for Computer Hacking

Although low measures of self-control can explain the initial engagement in computer hacking among youth, there are exceptions that must be taken into account. For example, Gottfredson and Hirschi have argued that offenders do not specialize and that offenders committing different types of criminal activity, such as white-collar crime, are the same individuals who engage in traditional street crimes (Bossler & Burruss, 2011). Similarly, individuals who can generally be distinguished from street criminals based on such characteristics as technical knowledge, cognitive ability, greater organization or focus, and other such characteristics commit cyber-crimes. Bossler and Burruss (2011) go on to report findings from Benson and Moore that identify self-control as unrelated to corporate offending when studying offenders in higher levels of an organization, that such crimes are not necessarily simple, and that many such offenses require detailed planning and the ability to examine future consequences and activities. Much like white-collar offenders, computer hackers are not necessarily the same types of individuals as those who engage in street crimes, hackers involving higher levels of technical skills and knowledge typically possess higher levels of self-control, and the classification of “hacker” most likely contains a mixture of individuals with both high and low levels of self-control; further, the available literature on hackers and the hacking subculture includes instances of hacking crimes that required high levels of preparation, technological mastery and learning, and a focus on long-term benefits (Bossler & Burruss, 2011).

Interestingly, and much as explained previously, Bossler and Burruss (2011) found that individuals with lower levels of self-control were more likely to engage in the hacking subculture and, subsequently, learn techniques and methods from other hackers. In effect, low self-control predisposes individuals to become involved with the hacking subculture in the presence of an opportunity to learn and apply hacking techniques. It should also be noted, however, that individuals who were not exposed to easily accessed information and guidance from other hackers required high levels of self-control to learn such techniques and methods on their own, which stands in stark contrast to the core tenets of self-control theory (Bossler & Burruss, 2011). In fact, the association with other hackers lends credence to an interaction between both self-control theory and social learning theory, with low self-control appearing to explain the mingling of like-minded individuals possessing low-self control within virtual environments as well as the effect of deviant peer associations enhancing the effects of low self-control, thereby causing individuals to pursue cyber deviance and cybercrime (Holt et al., 2010).

Donner et al. (2014) report strong links between low self-control and the decision to engage in an array of cybercriminal activities, including hacking into unauthorized systems. Given lower measures of self-control coupled with access to hacking knowledge and associations with other hackers, one could simply declare partial support for self-control theory in explaining computer hacking. However, Gottfredson and Hirschi declare crime to be simple, that anyone could commit any crime if they so choose, and that nothing in a criminal offense requires the sharing or support of individuals through knowledge transmission or social support (Bossler & Burruss, 2011). It should be obvious that these statements cannot apply to computer hacking and the surrounding subculture, even though low self-control certainly factors into explaining the initial involvement in said subculture. Therefore, the general theory of crime must be modified and expanded in order to adequately explain certain specialized crimes such as computer hacking, and the interactions between low self-control and social learning must be explored under the auspices of one overarching theoretical framework.

Conclusion

Similar to white-collar crime, computer hacking is a specialized type of crime that may require some knowledge, planning, or skill that separates the offender from the traditional street crime offender. Although low self-control adequately explains initial involvement in the hacking subculture, especially in the context of relatively simple access to an abundance of guides and automated tools and social networks providing support and additional information, the general theory of crime falls short of explaining the development and commission of criminal acts by hackers with advanced skill and knowledge (Bossler & Burruss, 2011). It is more likely that two classifications of hacker exist: youth who become involved with the hacking subculture without enhanced skills and technical knowledge whose involvement in such activities is explained by Gottfredson and Hirschi’s general theory of crime, and those hackers who possess technological skills, knowledge, and cognitive prowess whose involvement in the hacking subculture cannot be explained by low levels of self-control. Further research should investigate the interplay of low self-control with social learning theory in light of the fact that deviant peer associations predict involvement in computer hacking activities more reliably than low self-control alone (Holt et al., 2010).

References

Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1), 643-656. Retrieved from http://search.proquest.com/docview/870326323?accountid=2909

Bossler, A.M., & Burruss, G.W. (2012). Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1-1977). Hershey, PA: IGI Global. doi:10.4018/978-1-61350-323-2

Buker, H. (2011). Formation of self-control: Gottfredson and Hirschi's general theory of crime and beyond. Aggression and Violent Behavior, 16(2011), 265-276. doi:10.1016/j.avb.2011.03.005

Donner, C.M., Marcum, C.D., Jennings, W.G., Higgens, G.E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34(2014), 165-172. doi:10.1016/j.avb.2011.03.005

Holt, T.J., Bossler, A.M., & May, D.C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice : AJCJ, 37(3), 378-395. doi:10.1007/s12103-011-9117-3

Marcum, C.D., Higgens, G.E., Ricketts, M.L., & Wolfe, S.E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581-591. doi:10.180/01639625.2013.867721

Moffitt, T. (1993). Adolescence-limited and life-course-persistent antisocial behavior: A developmental taxonomy. Psychological Review, 100(4), 674-701.

Moon, B., McCluskey, J.D., & McCluskey, C.P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(2010), 767-772. doi:10.1016/j.jcrimjus.2010.05.003

Pratt, T.C., & Cullen, F.T. (2000). The empirical status of gottfredson and hirschi's general theory of crime: A meta-analysis. Criminology, 38(3), 931-964. Retrieved from http://search.proquest.com/docview/220711584?accountid=2909

Richer, J.L. (2013). From young hackers to crackers. International Journal of Technology and Human Interaction, 9(3), 53-62. doi:10.4018/jthi.2013070104

Saunders, I. (2007-05-27). 7 Virtual cultures. The year's work in critical and cultural theory, 15(1), 128-145. doi:10.1093/ywcct/mbm007

Turner, M.G., & Piquero, A.R. (2002). The stability of self-control. Journal of Criminal Justice, 30(2010), 457-471. doi:10.1016/S0047-2352(02)00169-1

Yar, M. (2013). Cybercrime and society (2nd ed.). Thousand Oaks, California. SAGE Publications.

Read More
All Posts, Graduate School Essays Jesse Hart All Posts, Graduate School Essays Jesse Hart

"Broken Windows" Policing

Wilson and Kelling (in Cole & Gertz, 2013) discuss the concept of the “broken windows” theory which, in summary, posits that disorderly or unruly behaviors left unchecked lead to greater disorder and, possibly, criminal behavior. In an effort to maintain order in a neighborhood, and thus attempt to mitigate or reduce potential criminal behaviors, police officers often utilize their authority to remove potential threats to order through charges with little legal meaning such as “suspicious person,” “vagrancy,” or “public drunkenness” (Wilson & Kelling, in Cole & Gertz, 2013). The decriminalization of such behaviors, or the cessation of treating such behaviors as illegal, removes an invaluable tool from law enforcement officials in maintaining order within neighborhoods and, by extension, invites a rise in disorder that could lead to increased criminal activity. In short, Wilson and Kelling’s (in Cole & Gertz, 2013) declaration that the decriminalization of disreputable behavior is a mistake is accurate.

In order to better understand why Wilson and Kelling are correct in their assertion, a more in-depth look at the “broken windows” theory is first necessary. In 1969, Philip Zimbardo conducted experiments to test the broken-window theory. He arranged to have an automobile without license plates with its hood up placed in the Bronx, and a comparable vehicle placed in Palo Alto, California (Wilson & Kelling, in Cole & Gertz, 2013). Vandals attacked the vehicle in the Bronx within ten minutes, and everything of value was stripped within twenty-four hours; random destruction of the vehicle began shortly afterward (Wilson & Kelling, in Cole & Gertz, 2013). The vehicle in Palo Alto remained untouched for more than a week, until Zimbardo smashed part of the vehicle in with a sledgehammer; within a few hours, the vehicle had been turned upside down and destroyed (Wilson & Kelling, in Cole & Gertz, 2013).

Zimbardo’s experiment highlights the core idea behind the broken-window theory: one broken window, if left untended, indicates a lack of concern about a location and invites more broken windows. Similarly, one undeterred panhandler in a neighborhood becomes the first “broken window,” and if law enforcement or concerned citizens cannot keep a single panhandler from annoying passersby then opportunistic criminals may believe their chances of being caught or identified in such a neighborhood are greatly diminished (Wilson & Kelling, in Cole & Gertz, 2013).

There are, of course, concerns that the utilization of the aforementioned charges to maintain order within a neighborhood may infringe on an individual’s rights or be applied inequitably by police officers. According to Wilson and Kelling (in Cole & Gertz, 2013), there may be agreement on certain behaviors that male a person undesirable, but there must also be assurance that age, skin color, national origin, harmless mannerisms, or other such factors do not become the basis for distinguishing between undesirable and desirable persons within a neighborhood. There is not a wholly satisfactory answer to such a concern, aside from the hope that the selection, training, and supervision of police officers results in a clear sense of the limit of their discretionary authority (Wilson & Kelling, in Cole & Gertz, 2013).

The broken-window theory suggests that minor disturbances and undesirable behaviors in a neighborhood, if left unchecked, lead to greater disorder and potentially criminal behavior. Such behaviors also create a sense of fear in residents of those neighborhoods, which leads to people avoiding one another and weakening controls in the neighborhood (Wilson & Kelling, in Cole & Gertz, 2013) and thus inviting further disorder. By utilizing charges of “suspicious person,” “vagrancy,” and “public drunkenness” police officers are able to help maintain order and, subsequently, reduce fear and the potential for crime legally. To decriminalize such behaviors would reduce the ability of police officers to assist neighborhoods in maintaining order, and would certainly be a mistake.

Sources:

Cole, G. & M. Gertz (eds.) (2012). The criminal justice system: Politics and policies, 10th ed. Belmont, CA: West/Wadsworth.

Worrall, J. (2008). Crime control in America: What works? 2nd ed. Boston: Pearson.

Read More

The Efficient and Effective Use of Investigators

iStock_000012541891Large_resized.jpg

The efficient and effective use of detectives and detective resources to investigate criminal offenses is strongly influenced by the policies and practices surrounding case assignment to investigators. By first understanding the nature and effectiveness of investigative operations, a clearer picture of how the assignment of cases affects police outputs and outcomes emerges. In addition, the subsequent understanding that it is not only inefficient, but also ineffective, to assign all unsolved cases to detectives provides practical insight for police administrators to utilize in developing strategies for case assignment polices.

Although variations in activities performed by investigators will be evident across differing departments, Chaiken et al. (1977) found that an approximation of ninety-three percent of investigators' time is spent on activities that are not directly related to solving previously reported crimes, based on the Kansas City Police Department's case assignments. Through an examination of the aforementioned cases, reviews with investigators from other cities, and comparisons to their own study's observational notes, Chaiken et al. (1977) conclude that the aforementioned approximation of time applies to other departments as well. It is therefore imperative to understand what activities comprise the bulk of investigators' time. Roughly forty-five percent of investigators' time is spent on activities such as administrative assignments, traveling, general surveillance, and making speeches, which are not case-specific activities; another twenty-two percent of investigators' time, again roughly estimated, is spent on crimes that are never solved (Chaiken et al., 1977). This leaves an estimated thirty-three percent of investigators' time spent on cases that are solved, but of that total about twenty-six percent is spent on work related to cleared cases after they have been solved, which includes preparing cases for court (Chaiken et al., 1977).

While much of the aforementioned data on the percentages of time investigators spend on certain activities provides insights into potential organizational restructuring and reallocation of duties to increase the effectiveness of detectives, that is beyond the scope of this article; recognizing and understanding that approximately seven percent of investigators' time is spent actually performing investigative work, and that twenty-two percent of their time is spent on cases that go unsolved, clearly illustrates that the structure and determination of case assignments significantly impacts investigators' outputs. Further, a significant amount of the time spent on unsolved crimes could theoretically be reallocated to increasing investigator effectiveness through strategic case assignment practices. Before examining case assignment practices, however, it is necessary to first understand the strongest indicator of whether or not a case will be solved: information.

The availability and reliability of information received by police about incidents and offenders directly impacts the ability of police officers to solve crimes and identify and apprehend those who commit crimes (Skogan and Antunes, 1979). In fact, as cited by Skogan and Antunes (1979), the RAND Corporation concluded an analysis of the criminal investigation process in 1975 with the finding that the information a victim supplies to the responding patrol officer is the single most important determinant of whether a case will be solved; if information that uniquely identifies the offender is not supplied, the likelihood of the perpetrator being identified is reduced exponentially. Brandl and Frank (1994) provide further support for the conclusion that the amount and quality of information available to the police is of paramount importance in their study of burglary and robbery cases assigned to investigators in a Midwestern municipal police department from July 1, 1989 through June 30, 1990, though it should be noted that their study was aimed at identifying the impact of time spent on cases compared to the amount of information available.

Identifying the significant findings of Brandl and Frank’s (1994) analysis plays a key role in understanding how case assignment practices impact the efficiency and effectiveness of investigators, especially when examined in conjunction with Eck’s (1992) triage hypothesis. Eck (1992) posited that cases may be divided into three groups, though the groups most likely represent a range along a continuum: 1) cases that cannot be solved with a reasonable investigative effort, 2) cases solved by circumstance, which only require proper follow-up activities by police, and 3) cases that may be solved with a reasonable investigative effort but that will not be solved otherwise. Combined with Brandl and Frank’s (1994) finding that cases wherein moderate information about a suspect is available the probability of an arrest increased significantly with more investigative time, as well as the finding that investigators spent more time on cases with moderate suspect information available than on cases where information was strong or weak, Eck’s (1992) triage hypothesis provides a solid framework from which case assignment strategies may be devised.

Using Eck’s (1992) triage hypothesis as a guideline, case assignments may be distributed to investigators or specialized teams based on a number of factors: the type of criminal offense, the amount of information available about the perpetrator(s), and whether the specialized knowledge and training of a detective is necessary or if routine follow-up is all that is required to close the case. This not only serves the purpose of increasing efficiency through the reallocation of police resources, such as utilizing clerical support staff in documenting and filing away an unsolvable case, but also significantly increases the effectiveness of investigative personnel by only being assigned cases that possess some measure of potential solvability, except as noted below. Understanding the impact of such a system is best understood through an analysis of Chaiken et al.’s (1977) findings on which actions investigators are typically assigned may be shifted to other personnel.

Patrol officers who are trained as generalist-investigators, according to Chaiken et al. (1977), may be utilized to supplement investigative activities and shift some responsibilities that do not require specialized investigative skills away from detectives, thereby freeing up the time of detectives for devotion to cases wherein some suspect information is known but the case is not solvable without an investment of effort. Such responsibilities would include the apprehension of suspects in cases where the identity of the perpetrator or perpetrators is known at the time of the crime as well as routine investigative actions such as listing stolen automobiles in the “hot car” file, asking victims to look through previously assembled mug shot collections, awaiting calls with further information from the public, and tracing ownership of weapons utilized in crimes; further, for cases where little or no information is available about an offender, generalist-investigators may serve the public relations duty of demonstrating that the police care about the victim and the crime without tying up the time of detectives (Chaiken et al., 1977).

The aforementioned generalist-investigator function would directly relate to Eck’s (1992) triage hypothesis by assigning cases solved by circumstance to support personnel within the police department, allowing the other two groups of cases to be assigned to specialized divisions. One such division, the Major Offenses Unit as defined by Chaiken et al. (1977), would receive all unsolved serious crime cases, both belonging to Eck’s (1992) unsolvable cases group and the solvable with investigative effort group. The assignment of unsolvable cases to a specialized unit may seem counterintuitive, however this would serve the function of ensuring that all major crimes receive attention in an effort to both demonstrate that the police care about those crimes that most severely impact the public, and the assurance that any later leads on unsolved cases that may be discovered through the investigation of other crimes will not be overlooked as a result of separate case assignments among individual investigators.

Finally, using a similar approach as the aforementioned Major Offenses Unit and drawing upon the research of Skogan and Antunes (1979) regarding increasing police productivity, traditional detectives would be assigned to policing teams, additionally comprised of patrol officers and generalist-investigators, who would be responsible for all police activities within a specified geographic area, with the exception of those cases that would be transferred to the Major Offense Unit. These teams would be assigned all non-serious crimes that fall into Eck’s (1992) solvable with investigative effort category, while those crimes that are deemed unsolvable are shifted to clerical support staff for documentation and filing. Naturally some overlap could occur, since the generalist-investigators and patrol officers in these teams would also be working on those cases solvable by circumstance, but this would serve the important responsibility of providing detectives more time to focus on those crimes within their assigned regions that may be solvable with investigative effort.

Although imperfect, the proposed modifications in utilizing detective resources and time, as well as that of support personnel, present a step forward in increasing efficiency and effectiveness, thereby contributing directly to investigators’ outputs. Police administrators seeking to strategically restructure case assignment policies will be well served to utilize Eck’s (1992) triage hypothesis and Brandl and Frank’s (1994) supporting work as a framework from which justification for the reassignment of cases to either support personnel, generalist-investigators, detectives working in policing teams, or a Major Offenses Unit is clearly illustrated.

Sources:

Brandl, S. and Frank, J. (1994) The Relationship Between Evidence, Detective Effort, and the Disposition of Burglary and Robbery Investigations, American Journal of Police, 13: 149‑168.

Chaiken, J.M., Greenwood, P.W., & Petersilia, J. (1977). The Criminal Investigation Process: A Summary Report, Policy Analysis, 3:187-218.

Eck, J. (1992). “Criminal Investigation” in Donna Hale and Gary Cordner (eds.) What Works in Policing (Cincinnati: Anderson Publishing) pp. 19-34.

Skogan, W. G., and Antunes, G. E. "Information, Apprehension and Deterrence: Exploring the Limits of Police Productivity," in David Bayley (ed.) What Works in Policing. (Cincinnati: Anderson Publishing) Chapter 4, pp. 108-137

Read More

Evaluating the Effectiveness of Random Preventive Patrol

iStock_000003167045Large.jpg

Random preventive patrol strategies are based on the idea that visible police presence in an area provides a general deterrent effect on crime and that, subsequently, the general public's fear of crime is reduced by that same police presence. It would be expected, as a result, that crimes that would normally take place in fairly public areas, such as general property offenses or street crimes, would be more significantly impacted by preventive patrolling practices, whereas offenses typically committed in relative seclusion would be less susceptible to the deterrence effects of preventive patrolling. The utilization of police resources for random preventive patrol activities is, however, ineffective at deterring crime and apprehending offenders. Research suggests that targeted preventive activities in strategic zones where the majority of crimes occur, or when treatments driven by specific policies or practices aimed at meeting strategically defined goals are utilized, is far more effective in reducing crime (Sherman and Weisburd, 1995).

The first study that aimed to discern the effectiveness of preventive patrolling practices took place in Kansas City, Missouri in 1972-1973. The Kansas City Preventive Patrol Experiment took place within fifteen beats, and each beat was assigned to a proactive group where preventive patrols were increased, a control group where no changes were made to preventive patrolling practices, or a reactive group where preventive patrolling was suspended (Kelling et Al., 1974). Generalized, the findings of the Kansas City Experiment showed no significant impact on crime deterrence, citizen fear of crime, community attitudes toward the police, or police response time (Kelling et Al., 1974).

The Kansas City Experiment suffered from a number of errors in methodology, as outlined by Larson (1975), but also provided a number of interesting facts surrounding patrol deployment and perceived police presence as an unintended by-product. It is important to first note the most applicable shortcomings identified in the Kansas City Experiment in order to understand why the general finding that preventive patrol activities appeared to have no significant impact cannot be taken at face value. Perhaps most importantly, the areas designated as reactive beats still received a significant visible police presence through responses to service calls, the routine operations of specialized units, and patrol-initiated activities such as building or car checks and stopping motorists for traffic violations (Larson, 1975). Further, as a result of using multiple patrol units dispatched in response to calls for service in the reactive groups, and coupled with an increased use of emergency lights and sirens, there was no diminished public awareness of a police presence in these areas (Larson, 1975). In essence, according to Larson (1975), the nature and design of the Kansas City Experiment served to empirically test whether patrol units could be spatially redistributed within a confined region or zone without an actual or perceived degradation in service, instead of actually testing whether preventive patrol practices were effective. Understanding the shortcomings of the Kansas City Experiment results in a clearer understanding of why the conclusion that routine preventive patrol activities has little or no value is not justifiable. In fact, Larson's (1975) analysis of the experiment provides the framework for understanding Sherman and Weisburd's (1995) hypothesis that patrol dosage in the Kansas City Experiment actually varied by a statistically insignificant amount from normal patrol levels, which is why the Kansas City Experiment seemingly provided support for the concept that preventive patrol has no effect even though other studies provided contradictory evidence and conclusions. It is through targeted patrol dosage in specific zones, or hot spots, and through the use of strategically defined objectives during patrol activities, that the effectiveness of certain types of preventive patrol efforts becomes identifiable.

Sherman and Weisburd (1995), McGarrell et Al. (2001), and Braga (2001) all provide insights into the effects of “hot spot” policing, which is a form of place-oriented preventive patrol. McGarrell et Al. (2001) also examined the effects of providing a clear strategic goal for officers during preventive patrol activities, namely the locating and seizure of illegally possessed firearms, and its subsequent effect on crime. These studies provide the basis for the conclusion that certain preventive patrol practices are effective under certain circumstances and random preventive patrol activities are ineffective, even though the conclusions of the aforementioned Kansas City Experiment dominated police thinking about patrol strategies for more than two decades (Sherman and Weisburd, 1995).Sherman and Weisburd (1995) tested the effects of intensified, but intermittent, patrol on identified “hot spots” of criminal activity in Minneapolis, Minnesota. In the study, one hundred and ten locales were identified and split into two even groups, with the experimental group receiving substantially increased levels of patrol dosage as opposed to the control group. It is worth noting that the experiment was designed only to measure the effect of heightened police presence at these locations, and that the activities of officers during the time they were within each zone was not restricted; in fact, the observed activities of officers during the time spent within the boundaries of the hot spot included activities unrelated to patrol, such as reading, sunning, and general conversation (Sherman and Weisburd, 1995). The study found clear, albeit modest, general deterrence effects as a result of increased police presence in the targeted areas, though with two caveats: first, there was no test of whether criminal activity was merely displaced to other areas so general deterrence effects throughout the community can not be claimed, and second, the experiment had not been replicated and therefore may be limited in external validity thus far (Sherman and Weisburd, 1995).

Along a similar line of inquiry, McGarrell et Al. (2001) evaluated the effect of directed patrol efforts, wherein police units were freed from the responsibility of responding to calls for service and were instructed to proactively patrol their assigned neighborhood with an emphasis on locating and seizing illegally owned firearms. Two different methodologies were utilized in order to examine the effects of a general deterrence approach versus a specific deterrence approach: in target area one, police were instructed to increase traffic stops to maximum levels in order to create a sense of significantly increased police presence, testing a general deterrence strategy that was also anticipated to lead to seizures of illegal weapons and drugs; in target area two, police were instructed to focus on investigating suspicious persons, a specific deterrence strategy, and conducting more thorough investigations for illegal weapons and drugs with each suspicious person (McGarrell et Al., 2001). Interestingly, the results of the study show a significant reduction in firearms related crimes in the specific deterrence beat, but actually show an increase in the general deterrence beat (McGarrell et Al., 2001). One possible explanation provided by McGarrell et Al. (2001) for the success of the targeted offender/specific deterrence approach lies in the possible interpretation of police actions within that zone, as a result of proactive, directed preventive patrol efforts, as heightened surveillance as well as removing firearms from those potential offenders most likely to use them. In effect, a directed strategy for preventive patrol activities in higher crime locations yields a significant impact in the reduction of violent crimes.

Perhaps the most compelling evidence for the effectiveness of place-oriented preventive patrol as opposed to random preventive patrol comes from Braga’s (2001) analysis and systematic review of “hot spot” policing studies. Out of nine studies, seven showed noteworthy crime reductions as a result of place-oriented patrol activities, and it should be noted that intervention types ranged among three broad categories: enforcement problem-oriented-policing (POP) interventions, directed and aggressive patrol programs, and the use of crackdowns and raids (Braga, 2001). It is also important to note that methodological problems in the research and evaluation designs of two studies most likely accounts for the lack of observed reduced criminal activity in said studies, and the remaining study showing no discernable impact on reducing crime suffered from issues in implementation that could account for a lack of significance in results (Braga, 2001). Overall, Braga’s (2001) review contributes to a growing body of research evidence supporting the conclusion that targeting “hot spots” of crime with focused, strategic intervention efforts is effective at reducing crime, both at the targeted zone and in surrounding areas, and is far more effective than random preventive patrol activities. These findings also provide positive indications that displacement of crime from a targeted zone to a less actively patrolled zone may be unfounded, though only five of the studies in Braga’s (2001) review measured the potential displacement of criminal activity.

Given the briefly summarized results of the aforementioned experiments and systematic reviews, it is difficult to justify random preventive patrol efforts in light of far more effective results from directed patrol activities in the reduction of crime. Theoretically, random preventive patrol activities should provide general deterrence effects for publicly visible crimes, such as vandalism, disorderly conduct, robberies and burglaries, and potentially aggravated assault. However, targeted patrol activities appear to have the same effect with regards to increased public visibility in providing a level of general deterrence while simultaneously providing far more effective specific deterrence effects, as noted in the studies and reviews above. Therefore, the effectiveness of random preventive patrol activities is conclusively inefficient when compared with other methods of targeting and reducing criminal activity within any given zone.

Sources

Anthony Braga (2001). “The Effects Of Hot Spots Policing On Crime,” The Annals of The American Society of Science, pp. 104-125.

Richard C. Larson (1975). “What Happened to Patrol Operations in Kansas City? A Review of the Kansas City Preventive Patrol Experiment” Journal of Criminal Justice, 3:267-297.

Edmund McGarrell, Steven Chermak, Alexander Weiss, and Jeremy Wilson (2001) “Reducing Firearms Violence Through Directed Police Patrol,” Criminology and Public Policy, 1(1):119-148.

Lawrence W. Sherman and David Weisburd, (1995) "General Deterrent Effects of Police Patrol in Crime "Hot Spots": A Randomized, Controlled Trial," Justice Quarterly, 12: 625‑648.

Read More

Moving Forward: Utilizing a Developmental Model in the Juvenile Justice System

The developmental model of juvenile justice advocated by Scott and Steinberg (2008) identifies major guiding principles necessary for successful reform of the juvenile court and, listed with the concerns they are designed to address, are as follows: 1) the implementation of proportionate sentences with sufficiently narrow ranges in order to promote fairness and limit possible abuses due to bias as a result of broad judicial or prosecutorial discretion, 2) restrictive transfer rules that enable the juvenile court to maintain jurisdiction over the majority of adolescents in an effort to minimize the potential harm exposure to the criminal court poses on adolescent offenders' development, 3) the implementation of empirically supported treatment programs in conjunction with punitive sanctions that promote healthy development of youth in all jurisdictions, 4) intensive interventions in the lives of very young serious offenders to hopefully successfully intervene in the potential development of chronic, serious offenders, 5) and extended dispositional jurisdiction over youth entering the juvenile justice system at a later age in order to maintain fairness in sentencing as well as the application of proportionate punitive sanctions. The reforms suggested are not a drastic departure from the traditional juvenile court, but include significant changes in policy and procedure designed to remedy the shortcomings of its original implementation. At the same time, these guidelines are a significant departure from the recent focus on purely punitive sanctioning models prevalent in the contemporary juvenile justice system.

It should be noted that these proposed guidelines do present their own set of limitations. Some youth possess a history of antisocial behavior and do not fit within the normal pattern of adolescent offending that is driven by developmental influences (Scott and Steinberg, 2008). These youth may enter the justice system facing serious charges and may have a substantial criminal record by mid-adolescence; though such youth represent a very small percentage of youthful offenders, they pose a significant threat to public safety and do not fit the developmental model advocated thus far (Scott and Steinberg, 2008). Scott and Steinberg (2008) acknowledge that successful identification and intervention in the lives of these youth poses a daunting challenge, and the potential for disproportionate sentencing and excessive punishment is inherent in such interventions, especially if the same programs utilized are not available to all youth. While a single model for the juvenile court will not yield positive outcomes for all youth, the developmental model aims to provide a framework of stable, satisfactory responses to juvenile delinquency that promotes the social welfare of youth while holding adolescents accountable, although to a lesser degree than adults, for their actions.

The examination of the developmental model above raises an interesting question: in light of the shift to contemporary policies and practices in juvenile justice, are political leaders, practitioners, and the public willing to take a different approach to juvenile justice? Interestingly enough, many state legislatures are already moving toward more moderate policies as the high economic costs of recent reforms and the impact of harsher sanctions for such young offenders begin to be realized (Scott and Steinberg, 2008). Further, research by Scott and Steinberg (2008) shows that public attitudes toward juvenile justice are hardened immediately after a highly publicized offense, but soften and trend more toward rehabilitation after some time passes. In fact, surveys consistently indicate that the preferences of the public align more with the proposals presented by the developmental model presented than with the current, contemporary regime (Scott and Steinberg, 2008).

Support for the developmental model is further emphasized by recent news throughout the United States. On June 25, 2012, the Supreme Court barred mandatory life sentences for juveniles convicted of murder, indicating a shift in viewing youthful felons from irredeemable predators to victims of circumstance that possess the potential for rehabilitation (Bronner, 2012). A report published in June 2013 identified nine states that previously incarcerated youth at high rates that have enacted policies that shift the majority of young offenders toward community interventions (Rosales, 2013). Some states have reversed changes that lowered the age at which youthful offenders were automatically transferred to the criminal court, including Connecticut, a state that once sent the highest number of juveniles to the adult court (Chen, 2010). Georgia legislators unanimously passed major reforms implementing new sentencing laws that keep non-violent drug and property offenders out of prison and directing them to intervention programs and graduated scales of punishment, and are looking to do something similar for the juvenile justice system (The Economist, 2013). Finally, in Illinois, the state most credit with the establishment of the juvenile court, the Illinois Juvenile Justice Commission published a report condemning the state youth prison system and finding that the majority of incarcerated young offenders would be better served in treatment or educational programs (NPR, 2012).

It is evident that the traditional model of the juvenile justice system was ineffective in dealing with the problem of adolescent crime. It is just as evident that the contemporary approach to punitive sanctions and incarceration has been ineffective in remedying the shortcomings of the traditional model. The developmental model advocated by Scott and Steinberg (2008) provides a framework to address the shortcomings of the traditional model with regards to accountability and responsibility of youthful offenders, while also promoting the social welfare of juveniles and basing sentencing and disposition on empirically supported treatments and interventions. Further supporting the work of Scott and Steinberg (2008), recent reforms and research on public preferences and perspectives align with the guidelines advocated by the developmental model of juvenile justice.

Sources:

Scott, E., & Steinberg, L. (2008). Rethinking Juvenile Justice. Cambridge, MA: Harvard University Press.

Bronner, E. (2012, June 26). News Analysis - Ruling Reflects Rethinking on Juvenile Justice - NYTimes.com. Retrieved June 22, 2013, from http://www.nytimes.com/2012/06/27/us/news-analysis-ruling-reflects-rethinking-on-juvenile-justice.html?pagewanted=all&_r=0

Chen, S. (2010, January 15). States rethink 'adult time for adult crime' - CNN.com. Retrieved June 22, 2013, from http://www.cnn.com/2010/CRIME/01/15/connecticut.juvenile.ages/index.html#cnnSTCText

The Economist (2013, February 2). Juvenile justice: Suffer the children | The Economist. Retrieved June 22, 2013, from http://www.economist.com/news/united-states/21571176-georgia-rethinks-how-its-justice-system-deals-young-offenders-suffer-children

NPR (2012, April 18). Kids Behind Bars: Illinois Rethinks Juvenile Justice : NPR. Retrieved June 22, 2013, from http://www.npr.org/2012/08/18/159131971/illinois-seeks-new-approach-to-juvenile-justice

Rosalas, C. (2013, June 18). Report singles out 9 states, including Texas, for turnaround in adopting policies to reduce youth incarceration | Crime Blog. Retrieved June 22, 2013, from http://crimeblog.dallasnews.com/2013/06/report-singles-out-9-states-including-texas-for-turnaround-in-adopting-policies-to-reduce-youth-incarceration.html/

Read More

Balancing Individualized Treatment with Legislative Restrictions in the JJS

Balancing individualized, offender-based treatments with the need for consistency and proportionate sanctions has been a subject of ongoing debate and criticism regarding the juvenile court. In an effort to maintain balance between these two goals, sentencing guidelines and systems of graduated sanctions with targeted treatment have been enacted within the juvenile justice system in various jurisdictions. The question still remains, however, of whether these approaches help maintain the aforementioned balance, and at what expense?

Many states have enacted guidelines for graduated sanctioning systems, modeled to a considerable extent on the Comprehensive Strategy released by the Office of Juvenile Justice and Delinquency Prevention (OJJDP) to provide offense-based, tiered levels of increasingly stricter sanctions while also suggesting rehabilitative strategies where appropriate, in an effort to maintain individualized sanctioning of youthful offenders and to emphasize the need for, and use of, risk and needs assessments (Mears, 2002). In similar fashion, and to a large extent the same mentality behind the development of the Comprehensive Strategy, graduated sanctions and incentives are key components of many intervention programs (Kurlychek, 1999).

In conjunction with the aforementioned guidelines, sentencing guides also play a major role in the determination of treatment for youth adjudicated delinquent in the juvenile court. These guides aim to provide consistent and proportionate sanctions against offenders brought before the juvenile court in an effort to reduce or eliminate the potential for abuse of the discretionary authority of juvenile court judges, especially in light of research indicating that the court could be used to provide a form of social control over various targeted populations (Mears, 2002). According to Mears (2002), these guidelines are voluntary in some states, are mandatory in others, and in some states incentives are provided to promote use of the guidelines.

Taken together, sentencing guidelines and the implementation of graduated sanctions that include targeted treatment could provide a framework that assists the juvenile justice system in maintaining balance between individualized treatment and sanctioning, consistency and proportionality in sentencing, and balancing the community needs for retribution, incapacitation of serious and chronic offenders, and specific and general deterrence. However, this balance is not evident in practice with current sentencing guidelines. Most state guideline systems utilize offense-based criteria for the determination of sanctions to be applied, and the priority often shifts from addressing the needs of the offender to punitive sanctions (Mears, 2002). In fact, with sentencing guidelines in many jurisdictions, prosecutors become the determiner of whether and how to file charges, and often that discretion is coupled with legislative action in jurisdictions that impose automatic sanctions for specific offenses (Mears, 2002). This shift in discretion to prosecutors effectively eliminates the ability of the juvenile court to balance the needs of the offender, the circumstances surrounding the offense, and potential risk of re-offending when sentencing occurs.

As evident in the information provided, sanctioning guidelines are not effective in providing balanced, individualized sanctions for youthful offenders, though they do provide consistency in sanctioning within jurisdictions. A system of graduated sanctions that is coupled with targeted treatment for youthful offenders, however, is both recommended and empirically supported as a response for the treatment of juvenile offenders according to Kurlychek (1999), and as noted by the research-based, data-driven, and outcome-focused approach and success of the comprehensive strategy developed by the OJJDP (Howell, 2003). Utilizing these two systems together, and providing some discretion to the juvenile court during disposition of a case in order to lessen automatic sanctions against first time offenders or those unlikely to re-offend, creates a framework that can be applied across jurisdictions without irrevocably negatively impacting the life course of those offenders found to be less culpable during the time within which they are subject to the authority of the juvenile court.

It should also be noted, however, that reliance solely on systems of graduated sanctions is not a perfect approach. While considerable progress has been made in the identification of major risk factors that lead to delinquent behavior (and therefore influence the nature and focus of recommendations for the rehabilitative components found within systems of graduated sanctions and targeted treatments) much of the research on protective factors, as well as longitudinal studies that will provide more accurate information about the causes of delinquency than cross-sectional studies to date, is still in its infancy (Howell, 2003). With additional research and study, these components can be added to risk and needs assessment tools to further enhance and modify guidelines for use by the juvenile justice system in promoting effectively balanced, consistent, and proportionate sentencing of youthful offenders that encompasses each of the goals of the juvenile court while maintaining the rehabilitative and targeted, individualized treatment component.

Sources:

Howell, J.C. (2003). Diffusing research into practice using the comprehensive strategy for serious, violent, and chronic juvenile offenders. Youth Violence & Juvenile Justice 1: 219-245.

Kurlychek, M., Torbet, P., & Boznyski, M. (1999). Focus on Accountability: Best Practices for Juvenile Court and Probation. U.S Department of Justice, Office of Juvenile Justice and Delinquency Prevention, Washington DC.

Mears, D. (2002). Sentencing guidelines and transformation of juvenile justice in the 21st century. Journal of Contemporary Criminal Justice 18: 6-19.

Read More

Effectiveness of Juvenile Transfer to Criminal Court

Juveniles may be transferred to the criminal court system in one of six assorted methods: judicial waiver by the juvenile court judge, prosecutorial waiver in jurisdictions where the prosecutor has filing discretion, statutory exclusion due to legislation requiring youth of certain ages charged with certain offenses being excluded from juvenile court, legislative action wherein states set an age lower than eighteen years of age as the boundary for criminal court, youth who are no longer subject to parental authority (such as by marriage) are automatically transferred to criminal court but may be referred back to juvenile court, and through blended sentencing wherein juvenile and adult sanctions can be imposed by one court (McGowan et al., 2007). The goal of these assorted transfer mechanisms, aside from holding youth more responsible for offenses committed, lies in the philosophy that stricter punitive sanctions would act as specific and general deterrents by requiring adolescents to be subject to the harsher and more adversarial experiences of criminal court and sentencing. There are, however, significant harms caused by the automatic transfer of large groups of juveniles to the criminal court based on age or offense alone, and research indicates that the theoretical basis for deterrence as a result of transfer results in either no effect on youth via general deterrence, or a negative effect on youth in cases of specific deterrence (McGowan et al., 2007, Fagan, 2008).

McGowan et al. (2007) found that only one of five studies reported any evidence that transfer of juveniles to the adult system deterred either violent or other re-offending, and the other four studies identified a harmful effect in which juveniles transferred to adult court committed more subsequent violent and total crime than retained juveniles. Further supporting these findings, Fagan (2008) reports that rates of juvenile offending are not lower in states where the transfer of juveniles to criminal court is more commonplace than in other states.

With the aforementioned points in mind, turning to an assessment of the risks inherent in the current transfer policies of juvenile offenders may shed light on why transfer policies have had little to no affect on deterring juvenile crime. Perhaps the most significant issue, especially with regards to legislative or prosecutorial methods of transfer wherein the determination for transfer lies solely on age of the offender or offense committed, lies in the transfer of not just those youth whose crimes and reoffending risks merit more punitive sanctions, but also in the transfer of youth who are not chronic or serious offenders or whose risk of reoffending is significantly low, and who are subsequently negatively impacted by their exposure to the criminal court system (Fagan, 2008).

A related issue is the transfer of youth under the age of eighteen years of age, again through legislative action that automatically transfers these youth based on age or offense, into the criminal court system. Empirically supported research has shown that adolescents under the age of sixteen lack the competence to understand and participate in the judicial system and make judgments comparable to adults found incompetent to stand trial (McGowan et al., 2007). Further, Cauffman and Steinberg (2012) report that brain development, especially in those systems responsible for controlling many aspects of social and emotional maturity, continues through late adolescence and into early adulthood. Many states have enacted laws lowering the age of legal responsibility for specific offenses below the aforementioned ages, which results in the immediate wholesale transfer of many offenders who possess traits that reduce culpability and, theoretically, increase potential risk of negative impacts from being transferred into the criminal court system.

From an examination of the above points it seems clear that returning the selection of youth to transfer to criminal court to juvenile court judges would be most prudent, along with defining eligibility for transfer on more criteria than age or offense alone (Fagan, 2008). However, as noted by Kupchik (2003), the differences between the processing of cases between the criminal court and the juvenile court is not as significant as commonly believed, and therefore may not account for the apparent ineffectiveness of transfer policy alone on deterring criminal offenses. In fact, in the analysis of a single court in New York City, Kupchik (2003) found that the same philosophy that guided the creation of the juvenile court was utilized by the criminal court “part” (a separate court designed to exclusively handle youthful offenders but remaining an extension of the adult criminal court) in sentencing offenders.

It is this last piece of data that makes it difficult to answer whether transfer policies should be eliminated, though it is apparent that modifying transfer policies is absolutely necessary in order to promote a socially responsible and just approach to adolescent crime. Fagan (2008) summarily states it best in saying that discretionary transfer, as opposed to wholesale transfer, would minimize harm by limiting the number of adolescents subjected to the criminal court, identify youth whose malleability and proclivity to reform warrants juvenile court intervention, and maintain proportional punishment for offenders whose crimes are too serious to be handled by the juvenile court.

Sources

Cauffman, E., & Steinberg, L. (2012). Emerging findings from research on adolescent development and juvenile justice. Victims & Offenders 7: 428-449.

McGowan, A., Hahn, R., Liberman, A., Crosby, A. et al. (2007). Effects on violence of laws and policies facilitating the transfer of juveniles from the juvenile justice system to the adult justice system: A systematic review. American Journal of Preventive Medicine 32: S7–S28.

Fagan, J. (2008). Juvenile crime and criminal justice: resolving border disputes. Future of Children 18: 81-118.

Kupchik, A. (2003). Prosecuting adolescents in criminal court: Criminal or juvenile justice? Social Problems 50: 439-460

Read More

Developmental Immaturity and Culpability in Juvenile Justice

The juvenile justice system was founded on the intuitive idea that youthful offenders were developmentally different from adults and, therefore, the system required a different approach to intervention and treatment of youths who commit delinquent or criminal acts. Recent studies by Scott and Steinberg (2008) and Cauffman and Steinberg (2012), as well as Supreme Court decisions in Roper v. Simmons, Graham v. Florida, and Miller v. Alabama, have provided compelling evidence and support for the concept of developmental immaturity resulting in reduced culpability of adolescent offenders. Understanding the information provided in the aforementioned sources yields interesting insights surrounding the impact to juvenile justice policy and practice.

Two broad theories have been posed to evaluate the blameworthiness of offenders in American criminal law doctrine: choice theory and character theory (Scott and Steinberg, 2008). Choice theory can best be summarized by the notion that a person who commits a criminal act is fully responsible and deserves full punishment if they are capable of rational thought and have a fair opportunity to not engage in the criminal act. Using an offender’s general social standing, prior history, and related psychological and psychosocial information to show that engaging in a criminal act is abnormal, and therefore not the result of deficient moral character, best summarizes character theory. According to Scott and Steinberg (2008), both theoretical frameworks support the idea that adolescents are less culpable for criminal offenses as a result of poorer decision-making skills and constrained opportunities to avoid criminogenic environments (i.e. choice theory), and adolescents are also in a state of developmental flux wherein their moral character is not fully formed (i.e. character theory).

Further expounding on the aforementioned ideas, Cauffman and Steinberg (2012) explain that brain systems responsible for controlling many aspects of social and emotional maturity continue development throughout adolescence and into adulthood, and recent work in developmental neuroscience has linked both physiological and functional markers in brain development with the aforementioned psychological changes. These developmental changes support the idea that adolescents, as a group, are less culpable based on the theoretical frameworks outlined by choice theory and character theory because of the unique manner in which humans mature. Additional support for reduced culpability of adolescents has been presented in U.S. Supreme Court rulings in Roper v. Simmons, Graham v. Florida, and Miller v. Alabama. In each of the aforementioned cases, the Court has ruled that youthful offenders possess diminished responsibility on the basis of immaturity and vulnerability to negative influences, as well as greater potential for reform due to the changeability of their character.

One final point that should be made with regard to understanding developmental differences in adolescents revolves around current practices of incarceration and transfer to adult court. Cauffman and Steinberg (2012) report that trying adolescents as adults or submitting them to harsh sanctions does little to deter delinquent behavior, and may actually have negative effects on youths' mental stability and health, psychosocial development, and proclivity for further antisocial behavior. Keeping the key points outlined above in mind, it becomes imperative to ask the following question: what does this mean for current and future juvenile justice policy and practice?

According to Cauffman and Steinberg (2012), studies of adolescent development should not be utilized as a single point of reference for “solving” the issue of juvenile delinquency. However, informed responses to juvenile offending as a result of understanding the lessons of developmental science allows the juvenile justice system to respond to youthful offenders in developmentally appropriate ways that will not harm their future prospects by treating adolescents as adults (Cauffman and Steinberg, 2012). In fact, Cauffman and Steinberg (2012) go on to explicitly state that no single policy regime will provide positive outcomes for all adolescents entering into the juvenile court system, but understanding and utilizing developmental research as a guide will provide a strong foundation for policies and practices that enhance public safety by implementing effective treatments for adolescents instead of ineffective punitive sanctions.

The supporting evidence is overwhelmingly conclusive that adolescents are developmentally different from adults in ways that mitigate culpability. Continuing to study these differences, and using that knowledge to influence policies and practices in juvenile justice, remains crucial to the success of the juvenile justice system. As evidenced by the Supreme Court rulings referenced above, it is also critical in maintaining fair and just sanctions for adolescents who become subjected to the adult court system. In short, the principle of proportionality and its direct relation to culpability, as have been long established in criminal law, must be upheld in accordance with developmental differences among all offenders, not just the mentally incompetent or handicapped.

Sources:

Cauffman, E., & Steinberg, L. (2012). Emerging findings from research on adolescent development and juvenile justice. Victims & Offenders 7: 428-449.

Scott, E. S., & Steinberg, L. (2008). Rethinking Juvenile Justice. Cambridge, Massachusetts: Harvard University Press

Graham v. Florida and Sullivan v. Florida. (n.d.). American Psychological Association (APA). Retrieved May 30, 2013, from http://www.apa.org/about/offices/ogc/amicus/graham.aspx

Miller v. Alabama and Jackson v. Hobbs . (n.d.). American Psychological Association (APA). Retrieved May 30, 2013, from http://www.apa.org/about/offices/ogc/amicus/miller-hobbs.aspx

Read More

Development and Philosophy of the Juvenile Court

The juvenile justice system has been critiqued and criticized numerous times since its inception. Examining the works of Mack (1909), Platt (1969), Caldwell (1961), and Fox (1996) reveals that, although development of the court has taken various shapes and has often been rooted in differing ideals and guiding principles, the overall philosophical view of the purpose of the juvenile court has remained relatively unchanged and, surprisingly, was not unique or pioneered by the creation of the juvenile court. Over time, however, reforms have changed the juvenile court from the original concept of a hybrid between a court of law and a social agency charged with the protection and stewardship of juveniles to, for all intents and purposes, simply a court of law with additional flexibility in the sentencing of youthful offenders.

In order to best understand the path the development of the juvenile court has taken it is best to begin with the reasons for its creation. While there is some debate on the official origin of the juvenile court, it is widely accepted that its formation is credited to Chicago in 1899. According to Mack (1909) the court was formed as a result of society's general question of: “why is the state not bound by duty to protect and guard, and subsequently care for and guide, the children that reside within its borders when those children have committed an act in violation of the law or socially acceptable moral behavior?” This idea is expounded upon and reinforced by Platt's (1969) analysis of the rise of the “child-saving” movement, is reaffirmed yet again by Caldwell (1961) as he provides background on the development of the juvenile court and poses questions on how the system must change to effectively achieve the standards set forth by the United States Children's Bureau, and though Fox (1996) debates the origin of this perspective, the admission is present that the underlying theme played a crucial role in the development of the juvenile court. It can therefore be surmised that the development of a separate juvenile court was driven by a need for society to intervene in the lives of youthful offenders who, without the intervention of an authority, would either continue along a path of delinquency and criminality that posed further dangers to the safety and preservation of society or would be in danger due to the shortcomings of their parents or guardians.

The most concise presentation of the guiding principles for the development of the juvenile court were those set forth by Katherine Lenroot, who was then chief of the United States Children's Bureau (Caldwell, 1961). Those standards, in summary, stated that a juvenile court should have broad jurisdiction over persons under the age of eighteen, be presided over by a specially trained judge, maintain informal procedure and private hearings, keep detention at a minimum and preferably in private boarding homes, be comprised of a highly qualified probation staff, have resources for individual and specialized treatment at its disposal, be supervised by the state, and maintain an adequate record system safe-guarded against indiscriminate public viewing. Although Lenroot's guidelines were not presented until 1949, attempts were made in separating the adult and child correctional and rehabilitative institutions as early as 1824, when the New York legislature passed a law authorizing a House of Refuge for youth who were deemed reformable by the court (Fox, 1996). With the exception of maintaining informal procedure, these guidelines are just as important today as they were in 1949.

Among the chief concerns raised surrounding the juvenile court is the need for formalized procedures that maintain equitable and justifiable sanctions while retaining an informal setting. This concern was raised by Mack (1909) when he discusses the importance of the personality of the judge and their necessity to preserve the legal and natural rights of men and children, and was heavily examined, discussed, and expounded upon by Caldwell (1961) along with his analysis of what must change to provide structure within the juvenile court.

In stark contrast to the other authors referenced, Fox (1996) presents a scathing commentary on the failures of the juvenile court with regards to properly caring for youth through boarding homes and private programs versus simply incarcerating them with mere differences in terminology and aesthetics. In fact, Fox states that the only unique aspect of the juvenile court, and the one aspect that set it apart from other courts, was directly tied to the chief concern previously mentioned: the development of a personal and intimate rapport between the court, in this case the judge, and the youth referred to the court. This innovation has since faded, and the juvenile court has become, and later officially reinforced as, purely a court of law.

For the current incarnation of the juvenile court to maintain its goal of specialized, individualized justice, the return of forming a more intimate relationship between judge and offender must be a priority. Until such time as the court resumes a more parental role in the disposition of sentencing, the concerns presented above remain moot. However, if the juvenile court once again moves in such a direction, the aforementioned concerns must be taken into consideration in the development of formalized guidelines for the adjudication of delinquents in order to ensure fair and equitable treatment in all juvenile courts.

Sources:

Caldwell, R.G. (1961). The Juvenile court: its development and some major problems. TheJournal of Criminal Law & Criminology 51: 493-511.

Fox, S. (1996). The early history of the court. The Future of Children 6: 29-39.

Mack, J. (1909). The juvenile court. Harvard Law Review 23: 104-122.

Platt, A. (1969). The rise of the child-saving movement: a study in social policy and correctionalreform. The Annals of the American Academy of Political and Social Science 381:21-38.

Read More

A Dual-Classification of Antisocial Individuals

In 1993, Terrie Moffitt posited the theory that juvenile delinquents as a population of study are comprised of two distinctly different types of individuals: the life-course-persistent antisocial individual and the adolescence-limited antisocial individual. Moffitt's theory provides a number of insights into the nature of delinquency, as well as important implications for juvenile justice policy and procedure.In order to best understand the implications of Moffitt's theory for juvenile justice policy and practice, it is best to begin with an overview of the differences between the two types of antisocial individuals presented and the difficulties inherent in distinguishing between the two groups. In summarized form, life-course-persistent antisocial individuals are those whose behavioral problems begin in childhood, remain consistent through adolescence, and persevere through adulthood. Adolescence-limited antisocial individuals, however, go through a temporary, situationally behaviorally problematic period that generally occurs between the time of pubescent maturity and young adulthood. It is important to note that, according to Moffitt (1993), adolescent newcomers to antisocial behaviors, despite a lack of prior experience, equal their preschool-onset peers with regards to the variety and frequency of laws broken as well as the number of times referred to juvenile court. Therefore, based on the commonly used indexes of adolescent delinquency, and when viewed through cross-sectional studies by researchers, the two groups become indistinguishable.With regards to distinguishing between the two groups, especially as related to the way in which antisocial youth are seen by the juvenile justice system, it becomes imperative to obtain knowledge of an adolescent's behavior from early childhood through the current time-frame. Without such knowledge, a differential diagnosis between the two types of antisocial individuals is impossible, and successful intervention and treatment then becomes less likely depending upon the type of offender and the sanctions imposed. As an example, many adolescence-limited youths will receive sanctions that will serve to maintain their delinquent behaviors instead of providing them with opportunities to “age out” of their delinquent behavior, such as incarceration, an interrupted education, the formation of a drug habit, or teen parenthood. In addition, interventions with life-course-persistent adolescents are typically met with lackluster results due to their proclivity to turn positive opportunities into ways in which they can maintain continuity with their antisocial behavior. An example of this behavior includes turning residential treatment programs into opportunities to learn from and associate with criminal peers.Further exacerbating the need to gain knowledge of an adolescent's pre-adolescent behavior when taking into account juvenile justice practices, Moffit explains that adolescence-limited youths' antisocial behavior is normative, not abnormal. In fact, Moffitt references a study by Farrington, Ohlin, and Wilson in 1986 in which it is stated that four fifths of males have some contact with police for a minor infringement during their adolescent years. Based on self-report data, it is statistically abnormal to refrain from engaging in some type of antisocial or delinquent behavior.The aforementioned data points provide interesting insights into the nature of delinquency among adolescents. Approximately five percent of offenders have been repeatedly shown to be responsible for around fifty percent of known crimes. Moffitt's taxonomy suggests that this five percent is primarily comprised of life-course-persistent adolescents, and that these youth act as the gateway to delinquent behavior for adolescence-limited youths. It should be noted, however, that the theoretical causes for delinquent behavior between these two groups is quite different. Life-course-persistent antisocial individuals exhibit a number of characteristics that suggest psychopathology, with the root causes being related to subtle or underlying cognitive or neuropsychological deficiencies that become problematic through physical, social, and environmental influences. Adolescence-limited antisocial individuals, on the other hand, develop problematic behaviors as a result of a lack of socially ascribed maturity at a time when they develop biological maturity, and look to delinquent behavior as a way of achieving mature status.Taking into account the summarization provided, juvenile justice policies and practices must be flexible enough to account for two distinctly different types of antisocial individuals when considering sanctions. Such flexibility can only be achieved by successfully compiling data on juvenile offenders from as early in the life course as possible, preferably using multiple types of risk assessments from different sources, such as parents, caregivers, and educators. In addition, to truly intervene successfully in the lives of potential life-course-persistent antisocial persons, possible social, environmental, and physical influences must be identified when assessments indicate possible neuropsychological or physical deficiencies that have been shown to be linked to the development of criminal behavior. Such assessments would provide historical data regarding the levels of antisocial behaviors exhibited in youth across their developmental years and into adolescence, and would assist the juvenile justice system greatly in forming intervention and treatment plans that prove most successful without increasing the likelihood of antisocial continuity.SourcesMoffitt, T. E. (1993). Adolescence-Limited and Life-Course-Persistent Antisocial Behavior: A Developmental Taxonomy. Psychological Review, 100(4), 674-701.

Read More

Trends in Juvenile Delinquency and Justice

Author's Note: I started graduate school, so a lot of my writing time is impeded by having to actually write for classes. Once my essays are complete and graded, I'll post them here so that you all at least have something to read if I do not get to write other pieces for fun for a little bit. Enjoy!


Public perception and concern over the emergence of a new breed of juvenile delinquent, namely the violent predator, fueled Snyder's analysis of the Maricopa County juvenile population in 1998. This study resulted in some very interesting findings, especially with regards to the effectiveness of the system and the types of offenses committed by youths. In addition, Snyder's findings help shed light on ways to reevaluate, and potentially improve, the policies and practices of the juvenile justice system.The Maricopa County study looked at the “graduating classes” of officially recognized juvenile delinquents from 1980 to 1995. These cohorts were identified by using the entire youth population that turned eighteen and aged out of the juvenile system in their respective years. In all, 151,209 youth were identified as officially recognized by the juvenile system during this timeframe, which accounted for a combined 325,259 referrals to the court. Three categories of offenses were used to identify each juvenile career type: nonserious nonviolent offenses, serious nonviolent offenses, and violent offenses.In order to best understand what Snyder's findings mean, it is important to note some of the key statistical data that provide the basis for interpreting the effectiveness of the juvenile justice system and the potential ways in which reevaluating policy and practice are affected. The average age at which a youth's first delinquent offense occurred remained fairly constant across all sixteen cohorts, and ranged between 15.2 and 15.8 years of age. The average number of referrals to the system increased from 1980 to 1995 by approximately 55%. It is important to note that this increase in referrals is greater than the increase in the size of the groups, which means that the 1995 cohort had more referrals per career than the 1980 cohort. Finally, a large majority of youth referred to the system, approximately 60% in fact, were referred only once.While the preceding data alone does not present a complete understanding of Snyder's findings, it does provide a baseline from which further analysis yields interesting insights. In examining the effectiveness of the juvenile justice system the rate of recidivism provides the most important data point. In addition to noting that the majority of youth were referred only once, only 1% of the population studied was referred more than once for violent offenses. This indicates that successful intervention by the system early in the career of an offending youth is absolutely critical in preventing further delinquent activities. Snyder also found that each referral to the system increased the likelihood of an offender being referred for a violent offense. This further emphasizes that early, successful intervention is crucial in lowering violent crime among the juvenile population, and provides a clear goal in reevaluating the practices and policies related to intervening in the careers of juvenile offenders as early as possible.As noted earlier, the number of referrals from 1980 to 1995 increased, with the proportion of chronic offenders averaging 13% in the eighties and 17% in the nineties. The records show that this increase was a result of more chronic offenders, not more active, serious, or violent offenders. This increase could be explained by the expanded reach of the juvenile justice system, as Snyder mentions, but could also indicate a growing trend of unsuccessful intervention the first time a youth is referred to the court. Since chronic offenders of any type (nonserious, serious, and violent) only made up 14.6% of the entire population studied, or 22,112 of the 151,209 cases studied, and the proportion of chronic offenders averaged 17% at its peak, the explanation that a larger number of juveniles involved in repeat referrals as a result of an expanded reach of the system makes the most sense.These points illustrate that rethinking intervention strategies in an effort to lower the number of referrals among juveniles should be an ongoing process. One flaw easily recognized in understanding the effectiveness of the juvenile justice system, however, is that no clear data is available on how many juveniles are not referred to the courts or who are referred directly to the adult justice system due to changes in policy and law. In order to best understand whether the juvenile justice system is actually largely meeting its goals as Snyder indicates, another study that tracks these same cohorts across the rest of their careers up to the present is necessary. In addition, analysis of intake records for the adult court system over the same time-frame should be studied to ensure additional juveniles were not overlooked in the original study.Overall, Snyder's findings indicate positive trends in juvenile justice and delinquency. Continued expansion of programs designed to intervene in the lives of at-risk juveniles, as well as expansion of programs designed to intervene at the point of first contact with the juvenile system, are cornerstones of an effective, proactive approach to lowering both initial referrals and repeat referrals to the courts. It is clear, however, that sufficient data on juvenile delinquency does not exist at present.Sources:Snyder, H.N. (1998). Serious, violent, and chronic juvenile offenders—an assessment of the extent of and trends in officially recognized serious criminal behavior in a delinquent population. In: Loeber, R., & Farrington, D. (Eds), Serious & violent juvenile offenders: risk factors and successful interventions. Thousand Oaks, CA: Sage.

Read More

Search Posts

 

Featured Posts, Family Weblog

Featured Posts, Jesse’s Weblog