We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Indians experience violence at twice the rate of any other racial group in the United States. Violence against Indian women is particularly severe; in fact, Congress stated the rate of violence against Indian women has become an “epidemic.” Aside from its prevalence, violence against Indians is unique because, unlike other racial groups, the majority of crimes committed against Indians are perpetrated by non-Indians. The high rate of crimes against Indians is attributable to Indian country’s peculiar jurisdictional rules. Most notably, tribes cannot prosecute non-Indians. This limitation is not a product of the 1700s or 1800s; rather, it is a result of the Supreme Court’s 1978 decision in Oliphant v. Suquamish Indian Tribe. Oliphant has been widely critiqued in legal scholarship, but it remains the law. Jurisdictional limitations are compounded by Indian country’s geographic isolation, meaning tribes rely on law enforcement agents that are often located more than 100 miles away. Not only are state and federal law enforcement far away; they have little incentive to prioritize Indian country crime. Consequently, criminals have been known to target reservations.
This chapter focuses on the police and other law enforcement agencies. Mapping their transformation since the 1979 Revolution, it highlights the tensions and overlapping jurisdictions between different law enforcement agencies and units, arguing that their security mission has expanded alongside their disciplinary and religious morality mission, especially since the disputed 2009 elections. To maintain order, the Islamic Republic has taken several measures, such as the expansion of law enforcement units, the establishment of several special forces for crowd control and anti-riot missions, and heavy investment in the training and equipment of these forces. The police force has also dramatically intensified its ideological programs for the indoctrination of its members and has made changes to recruitment by shifting focus toward more conservative parts of society. Despite some attempts at reform, Iran’s various police forces are not consistently subject to the rule of law, nor are they accountable to elected institutions.
Law enforcement officials face numerous decisions regarding their enforcement choices. One important decision, that is often controversial, is the amount of knowledge that law enforcement distributes to the community regarding their policing strategies. Assuming the goal is to minimize criminal activity (alternatively, maximize citation rates), our theoretical analysis suggests that agencies should reveal (shroud) their resource allocation if criminals are uncertainty seeking, and shroud (reveal) their allocation if criminals are uncertainty averse. We run a laboratory experiment to test our theoretical framework, and find that enforcement behavior is approximately optimal given the observed non-expected utility uncertainty preferences of criminals.
The main goal of this chapter is to introduce one type of AI used for law enforcement, namely predictive policing, and to discuss the main legal, ethical, and social concerns this raises. In the last two decades, police forces in Europe and in North America have increasingly invested in predictive policing applications. Two types of predictive policing will be discussed: predictive mapping and predictive identification. After discussing these two practices and what is known about their effectiveness, I discuss the legal, ethical, and social issues they raise, covering aspects relating to their efficacy, governance, and organizational use, as well as the impact they have on citizens and society.
E-commerce applications have significantly changed how people transact with each other. This includes digital advances that drive illegal wildlife trade. In Indonesia, the Conservation Act of 1990 was enacted before the internet revolution and does not, therefore, adequately cover online illegal wildlife trade. In this study we identified wildlife traded illegally through advertisements published by five large national e-commerce companies and one social media platform operating in Indonesia, using 39 keywords. We also analysed data on wildlife cybercrime court case outcomes, associated criminal networks and their modus operandi. Over 12 months, we found 996 advertisements for wildlife and wildlife products, including of 45 nationally protected species, from 421 accounts. Amongst the six platforms monitored, Facebook Marketplace had the highest illegal wildlife trade traffic. We found that those prosecuted for online illegal wildlife trade were given low sentences. Our analysis of wildlife legislation, focus group discussions and expert interviews showed that the Government of Indonesia Trade Law (2014) and Law on Electronic Information and Transactions (2008) cannot be used to prosecute online illegal wildlife trade cases because these laws do not acknowledge regulations for protected species. Our study emphasizes the urgency of revising the Conservation Act and changing the definition of trade to include advertisements of protected species. We recommend development of screening tools for advertisements and accounts on e-commerce platforms, review of community/user guidelines to prohibit trade of protected species, and strengthening the approach of combining multi-context laws with stakeholder cooperation to prosecute online illegal wildlife trade cases.
Maritime security, also known as non-military security, refers to a condition in which the maritime rights and interests of a State, recognised by the United Nations Convention on the Law of the Sea and other rules of international law, are free from harm, danger or attack. This chapter discusses seven acknowledged threats to maritime security in the exclusive economic zone (EEZ) and the international legal framework for addressing them. The seven threats are piracy and armed robbery against ships; terrorist acts involving shipping, offshore installations and other maritime interests; illicit trafficking in arms and weapons of mass destruction; illicit traffic in narcotic drugs and psychotropic substances; smuggling and trafficking of persons by sea; illegal, unreported and unregulated fishing; and intentional and unlawful damage to the marine environment. The discussion then turns to the measures coastal States can take to protect their maritime security interests in the EEZ in the context of the longstanding doctrine of exclusive flag State jurisdiction. The concluding section examines emerging international efforts to combat threats to maritime security on a regional basis and discusses a potential solution to treat maritime security in the EEZ as collective security interests to meet the jurisdictional gap.
Chapter 20 focuses on the UK legal landscape around the investigatory powers of UK law enforcement authorities (LEAs) and the duties of service providers to cooperate with them. The primary legislative framework from which LEAs derive their powers to obtain digital evidence is the Investigatory Powers Act 2016. The chapter examines the different categories of data that may be requested from communication services providers and the legal procedures governing such lawful access. It also looks at other legal sources available to LEAs, to provide a comprehensive framework for cooperation between service providers and LEAs in obtaining digital evidence. Last, the chapter explores the cooperation of UK LEAs with non-UK-based service providers, as well as that of UK-based service providers with foreign LEAs.
Chapter 21 provides an account of the governing legal framework with respect to the gathering of digital evidence by US law enforcement authorities (LEAs) and the rules that bind US service providers – an issue that, given the quantity of data of interest in the hands of US-based providers, increasingly matters to LEAs around the world. It describes the general statutory and constitutional scheme governing data collection in the United States, with a focus on the federal level. It then examines specific questions with respect to cross-border cooperation, particularly in light of the Clarifying Lawful Overseas Use of Data (CLOUD) Act, which seeks to better facilitate cross-border access to data, in specified circumstances, and in accordance with baseline procedural and substantive protections. The chapter’s concluding thoughts point to both the need for more attention to cross-border access to data and some of the lacunae in US law.
This chapter is about how police officers in China enforce anti-prostitution laws. These regulations outlaw the exchange of sex for money or other material goods in all of its forms, and for all individuals who engage in it. Yet in practice, police enforcement primarily targets low-tier sex workers. Of the array of possible sanctions, these women are more likely incarcerated than fined, and they are placed in institutions with a rehabilitative mission that, in practice, is not met. In addition, law enforcement officials often engage in illegal and abusive practices when arresting sex workers. Clients are not completely immune from punishment, but they are less likely to be arrested than are the women they solicit. The major exception to that pattern involves high-profile men whose actions have crossed the Chinese Communist Party (CCP). Their cases are taken out of the hands of street-level police officers and into the world of elite politics, with prostitution charges used to help secure their downfall.
What does Chinese law have to say about people who are involved in sex work and the places where it occurs? Prostitution control is a universal problem for which states have adopted a variety of policies to address the public order, public health, and commercial challenges that it presents. This chapter describes that range of regulatory possibilities. It then explains the official choices that China has made, through discussions of the policing, health, and taxation rules and institutions that the People’s Republic of China (PRC) has adopted to regulate prostitution.
This chapter is about how police officers engage with sex workers when they are not enforcing anti-prostitution laws against them. By focusing their enforcement efforts on low-tier sex workers, the police help create a space for the middle tier of China’s sex industry – entertainment venues and their hostesses—to thrive. I find that law enforcement officers engage actively and in myriad ways with the sex industry when they are not focused on arresting sex workers. Some of their actions are purely extractive interactions. Yet other police behavior, while still self-serving, also benefits sex workers. Making sense of police actions in this context requires shifting our framework from exclusively viewing police as powerful figures in relation to sex workers to also viewing them as street-level bureaucrats who are accountable to the local government and the vast police bureaucracy of which they are at the forefront. This approach provides a different perspective on police officers, underscoring their weakness within China’s bureaucratic system rather than their strength in relation to the sex workers. Their vulnerability vis-à-vis the state even affects how they engage with sex workers and underscores conditions under which the job security of frontline police officers in fact depends on a cooperative local sex industry.
Legal status is an important social determinant of health. Immigration enforcement policies may be an important contributor to health disparities in the form of interior border checkpoints (IBCs). These checkpoints may prevent immigrants and their families from seeking needed medical care. Currently, we do not know how these barriers are perceived by the public. We administered a survey of 6,178 respondents from 13 November to 19 November of 2023 that contained a survey experiment to assess public attitudes on the issue. Respondents were generally not supportive of detaining individuals at IBCs or medical facilities for emergencies regardless of characteristics of the care-seeking individual. A majority was supportive of detention when medical treatment was complete. Respondents were generally more sympathetic towards children and pregnant women. Partisanship and sympathy expressed towards immigrants influenced attitudes towards detention. Findings based on race and ethnicity showed inconsistencies. A majority of Americans did not believe that IBCs should impede undocumented immigrants from accessing medical care, especially in emergency situations and for children and pregnant women. Our findings indicate that there is broad public support for expanding existing policies to allow for undocumented individuals to pass through IBCs to access medical care.
Although in all of the EU member states, law enforcement institutions have to adhere to European standards of facial recognition technology (FRT) usage, each country has local national standards that transpose these requirements into the framework of FRT in practice. However, recognising that each society has an important role in controlling the implementation of legal acts, especially where they relate to human rights, society and related interest groups have to regard the proper implementation of FRT regulation as necessary; otherwise it remains declarative and void. If public awareness and pressure to have a law implemented properly are high, the implementing institutions are forced to take action.
This chapter analyses the regulation of FRT usage by Lithuanian law enforcement institutions. Public discussion relating to FRT usage in the media, the involvement of non-governmental organisations, and other types of social control are also discussed. Finally, the chapter considers the changes that may be brought to national regulation of FRT by the EU Artificial Intelligence Act.
This chapter discusses the current state of laws regulating facial recognition technology (FRT) in the United States. The stage is set for the discussion with a presentation of some of the unique aspects of regulation in the United States and of the relevant technology. The current status of FRT regulation in the United States is then discussed, including general laws (such as those that regulate the use of biometrics) and those that more specifically target FRT (such as those that prohibit the use of such technologies by law enforcement and state governments). Particular attention is given to the different regulatory institutions in the United States, including the federal and state governments and federal regulatory agencies, as well as the different treatment of governmental and private users of FRT. The chapter concludes by considering likely future developments, including potential limits of or challenges to the regulation of FRT.
Terrestrial and marine protected areas have long been championed as an approach to biodiversity conservation. For protected areas to be effective, equitable and inclusive, the involvement of local residents in their management and governance is considered important. Globally, there are many approaches to involving local residents in protected area law enforcement. However, opportunities for comparing different approaches have been limited by the lack of a clear common framework for analysis. To support a more holistic understanding, we present a framework for analysing the contributions of local residents to protected area law enforcement. Informed by a review of the literature and discussions with conservation practitioners, the framework comprises five key dimensions: (1) the different points in the enforcement system at which local residents are involved, (2) the nature of local participation in decision-making, (3) the type of external support provided to local residents, (4) the different motivating forces for participation, and (5) the extent to which local participation is formalized. We apply the framework to three real-world case studies to demonstrate its use in analysing and comparing the characteristics of different approaches. We suggest this framework could be used to examine variation in local participation within the enforcement system, inform evaluation and frame constructive discussions between relevant stakeholders. With the global coverage of protected areas likely to increase, the framework provides a foundation for better understanding the contributions of local residents to protected area law enforcement.
This chapter examines the contextual elements of article 2(4) of the UN Charter and the requirement that a prohibited ‘threat or use of force’ be in ‘international relations’. It analyses the meaning of this term and whether it requires that the object of a prohibited use of force be another State and draws conclusions about the types of acts that fall within and outside the scope of this term (and thus the scope of article 2(4)). The type of acts discussed include use of force on another State’s territory or against its extraterritorial sovereign manifestations, to reclaim disputed territory not within de facto control, those in violation of international demarcation lines, those directly arising from a political dispute between States, use of force by a State within its own territory against its own population, in the exercise of law enforcement jurisdiction against private foreign actors, against entities falling short of Statehood, those with no nexus to another State (such as against an international organisation or on terra nullius) and the use of force within a State’s own territory against small-scale incursion by another State’s armed forces.
Amid the growing calls for the complete prohibition of the use by law enforcement authorities of live facial recognition (LFR) technology in public spaces, this article advocates for an incremental approach to regulating the use of the technology. By analysing legislative instruments, judicial decisions, deployment practices of UK law enforcement authorities, various procedural and policy documents, as well as available safeguards, the article suggests incremental adjustments to the existing legal framework instead of sweeping regulatory change. The proposed approach calls for adopting national legal rules governing watch lists and introducing spatial, temporal and contextual limitations on the deployment of technology based on the assessment of proportionality and necessity. To enhance the effectiveness of overt surveillance using LFR, the article recommends adopting a transparency procedure that promotes accountability without undermining the objectives of law enforcement. Alternatively, the overt use of the technology should be limited to deterring the commission of crimes and safeguarding public safety, where transparency does not undermine its effectiveness. Limiting the scope of overt use of LFR technology entails that law enforcement agencies primarily utilise covert surveillance, with prior judicial approval, except in urgent cases, as this would improve effective criminal investigation and public safety. The legal adjustments proposed in this article can be implemented through flexible secondary legislation or local policies, rather than rigid statutory rules.
The effect of individual governmental drug policies and regulations has, in many cases, been the main driving force behind the direction the opioid epidemic has taken in the United States and many countries around the world. Unfortunately these policies have sometimes had dramatically different effects than were initially intended. Changes in policy which allowed for increased availability of opioid medications had the unintended consequence of widespread opioid addiction and overdose deaths. Policies which aimed to crack down on the diversion of these medications from legitimate medical use resulted in the spike in heroin use as those people who were now addicted to opioids had to turn elsewhere. As demand for heroin surged, so too did manufacturing and sales, and as law enforcement targeted illicit heroin trafficking, cartels turned to the more potent and easier to hide synthetic opioids such as fentanyl and carfentanil. It seems that every governmental policy change or new regulation intended to stop the opioid epidemic is met with a creative solution by the people profiting to keep the opioid trade open.