Skip to main content

Technology, Opportunity, Crime and Crime Prevention: Current and Evolutionary Perspectives

  • Chapter
  • First Online:
Crime Prevention in the 21st Century

Abstract

This chapter seeks to link technology and crime science, including situational crime prevention. It starts by briefly considering the nature of technology. It then looks at the relationship between technology, opportunity, problems and solutions. But opportunity is a more subtle concept than many in the field assume, needing further development for present purposes. It is therefore discussed in relation to both traditional frameworks of crime science and to a more integrated and detailed counterpart, the Conjunction of Criminal Opportunity. But all the opportunity frameworks need supplementing by an account of the dynamics of crime, especially through the concepts of scripts and script clashes. A major section then examines the relationship between crime and technological change, covering adaptations and clashes over longer timescales, in the shape of co-evolutionary arms races between offenders and preventers. This spans both biological and cultural evolution. Then come sections on the practicalities of adopting a deliberately evolutionary approach to prevention—gearing up against crime, innovation and design—and finally some weaknesses of purely technological approaches to crime prevention. The conclusion reviews the significance of understanding technology for crime science. This enhanced understanding of how changing technology can both create and block opportunity for crime, nuisance and terrorism (henceforth, crime) is needed to help us anticipate, detect and respond to the many changes in the crime and security world we can expect to encounter during the rest of the twenty-first century.

I am grateful to Benoit Leclerc for his helpful editing, Richard Wortley and anonymous reviewers for their inputs to this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Thanks to Richard Wortley for this point. But it is worth noting that the capabilities technology brings mean that defeat may rarely be absolute. This is illustrated by the jewel thieves who drilled through a metre of concrete to reach the safe deposit boxes of London’s Hatton Garden diamond dealers in 2015—ironically using diamond-tipped cutters.

  2. 2.

    Alternative imagery for problems/solutions includes that of ‘glass half-full versus glass half-empty’; for multiple ones Arthur uses chains.

  3. 3.

    Thanks to Benoit Leclerc for these ideas.

  4. 4.

    Thanks to Benoit Leclerc for this clash.

  5. 5.

    Thanks to Benoit Leclerc for Misrepresentation, and Ken Pease for Misbegetting.

References

  • Armitage, R. (2012). Making a brave transition from research to reality. In P. Ekblom (Ed.), Design against crime: Crime proofing everyday objects (Crime prevention studies, Vol. 27). Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Armitage, R., & Monchuk, L. (2009). Reconciling security with sustainability: The challenge for eco-homes. Built Environment, 35(3), 308–327.

    Article  Google Scholar 

  • Armitage, R., & Monchuk, L. (2011). Sustaining the crime reduction impact of Secured by Design: 1999 to 2009. Security Journal, 24(4), 320–343.

    Article  Google Scholar 

  • Arthur, W. B. (2009). The nature of technology. What it is and how it evolves. London: Allen Lane.

    Google Scholar 

  • Beautement, A., Sasse, M. A., & Wonham, M. (2008). The compliance budget: Managing security behaviour in organisations. In NSPW'08: Proceedings of the 2008 Workshop on New Security Paradigms Workshop (pp. 47–58). New York: Association for Computing Machinery.

    Chapter  Google Scholar 

  • Brantingham, P., & Brantingham, P. (2008). Crime pattern theory. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis. Cullompton: Willan.

    Google Scholar 

  • Brown, R. (2013). Reviewing the effectiveness of electronic vehicle immobilisation: Evidence from four countries. Security Journal. doi:10.1057/sj.2012.55.

    Google Scholar 

  • Butler, S. (1863). To the editor of the press, Christchurch, New Zealand, 13 June. Wellington: Victoria University.

    Google Scholar 

  • Christensen, C., & Raynor, M. (2003). The innovator's solution. Harvard: Harvard Business Press.

    Google Scholar 

  • Clarke, R. (1999). Hot products: Understanding, anticipating and reducing demand for stolen goods (Police research series paper, Vol. 112). London: Home Office.

    Google Scholar 

  • Clarke, R., & Eck, J. (2003). Become a problem solving crime analyst in 55 small steps. London: Jill Dando Institute, University College London.

    Google Scholar 

  • Clarke, R., & Newman, G. (2006). Outsmarting the terrorists. London: Praeger Security International.

    Google Scholar 

  • Cohen, L., & Felson, M. (1979). Social change and crime rate changes: A routine activities approach. American Sociological Review, 44, 588–608.

    Article  Google Scholar 

  • Collins, B., & Mansell, R. (2004). Cyber trust and crime prevention: A synthesis of the state-of-the-art science reviews. London: Department for Business, Innovation and Science. Retrieved January 21, 2015, from www.foresight.gov.uk/Cyber/Synthesis of the science reviews.pdf.

  • Cornish, D. (1994). The procedural analysis of offending and its relevance for situational prevention (Crime prevention studies, Vol. 3). Monsey, NY: Criminal Justice Press.

    Google Scholar 

  • Cornish, D., & Clarke, R. (Eds.). (1986). The reasoning criminal: Rational choice perspectives on offending. New York: Springer.

    Google Scholar 

  • Dawkins, R. (1982). The extended phenotype. Oxford: Oxford University Press.

    Google Scholar 

  • Dawkins, R. (2003). The evolution of evolvability. In S. Kumar & P. Bentley (Eds.), On growth, form and computers. London: Academic Press.

    Google Scholar 

  • Dawkins, R., & Krebs, J. (1979). Arms races between and within species. Proceedings of the Royal Society of London B, 205(1161), 489–511. doi:10.1098/rspb.1979.0081.

    Article  Google Scholar 

  • Dennett, D. (1995). Darwin’s dangerous idea. London: Penguin.

    Google Scholar 

  • DTI. (2000). Turning the corner. Report of Foresight Programme’s Crime Prevention Panel. London: Department of Trade and Industry.

    Google Scholar 

  • Ekblom, P. (1997). Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention, 2, 249–265.

    Google Scholar 

  • Ekblom, P. (1999). Can we make crime prevention adaptive by learning from other evolutionary struggles? Studies on Crime and Crime Prevention, 8, 27–51.

    Google Scholar 

  • Ekblom, P. (2002). Future imperfect: Preparing for the crimes to come. Criminal Justice Matters, 46, 38–40. London: Centre for Crime and Justice Studies, Kings College.

    Google Scholar 

  • Ekblom, P. (2005). How to police the future: Scanning for scientific and technological innovations which generate potential threats and opportunities in crime, policing and crime reduction. In M. Smith & N. Tilley (Eds.), Crime science: New approaches to preventing and detecting crime. Cullompton: Willan.

    Google Scholar 

  • Ekblom, P. (2010). The conjunction of criminal opportunity theory. Sage Encyclopedia of Victimology and Crime Prevention, 1, 139–146.

    Google Scholar 

  • Ekblom, P. (2011). Crime prevention, security and community safety using the 5Is framework. Basingstoke: Palgrave Macmillan.

    Book  Google Scholar 

  • Ekblom, P. (2012a). Happy returns: Ideas brought back from situational crime prevention’s exploration of design against crime. In G. Farrell & N. Tilley (Eds.), The reasoning criminologist: Essays in honour of Ronald V. Clarke (Crime science series, pp. 163–198). Cullompton: Willan.

    Google Scholar 

  • Ekblom, P. (Ed.). (2012b). Design against crime: Crime proofing everyday objects (Crime prevention studies, Vol. 27). Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Ekblom, P. (2014). Designing products against crime. In G. Bruinsma & D. Weisburd (Eds.), Encyclopedia of criminology and criminal justice. New York: Springer Science + Business Media.

    Google Scholar 

  • Ekblom, P. (2015). Terrorism—Lessons from natural and human co-evolutionary arms races. In M. Taylor, J. Roach, & K. Pease (Eds.), Evolutionary psychology and terrorism. London: Routledge.

    Google Scholar 

  • Ekblom, P., Bowers, K., Gamman, L., Sidebottom, A., Thomas, C., Thorpe, A., et al. (2012). Reducing handbag theft in bars. In P. Ekblom (Ed.), Design against crime: Crime proofing everyday objects (Crime prevention studies, Vol. 27). Boulder, CO: Lynne Rienner.

    Google Scholar 

  • Ekblom, P., & Pease, K. (2014). Innovation and crime prevention. In G. Bruinsma & D. Weisburd (Eds.), Encyclopedia of criminology and criminal justice. New York: Springer Science + Business Media.

    Google Scholar 

  • Ekblom, P., & Sidebottom, A. (2008). What do you mean, ‘Is it secure?’ Redesigning language to be fit for the task of assessing the security of domestic and personal electronic goods. European Journal on Criminal Policy and Research, 14, 61–87.

    Article  Google Scholar 

  • Ekblom, P., Sidebottom, A., & Wortley, R. (2015). Evolutionary psychological influences on the contemporary causes of terrorist events. In M. Taylor, J. Roach, & K. Pease (Eds.), Evolutionary psychology and terrorism. London: Routledge.

    Google Scholar 

  • Ekblom, P., & Tilley, N. (2000). Going equipped: Criminology, situational crime prevention and the resourceful offender. British Journal of Criminology, 40, 376–398.

    Article  Google Scholar 

  • Eldredge, N., & Gould, S. (1972). Punctuated equilibria: An alternative to phyletic gradualism. In T. Schopf (Ed.), Models in paleobiology. San Francisco: Freeman Cooper.

    Google Scholar 

  • Felson, M., & Eckert, M. (2015). Crime and everyday life (5th ed.). London: Sage.

    Google Scholar 

  • Gilfillan, S. (1935). Inventing the ship. Chicago: Follett.

    Google Scholar 

  • Gill, M. (2005). Reducing the capacity to offend: Restricting resources for offending. In N. Tilley (Ed.), Handbook of crime prevention and community safety. Cullompton: Willan.

    Google Scholar 

  • Godfrey-Smith, P. (2012). Darwinism and cultural change. Philosophical Transactions of the Royal Society B, 367, 2160–2170.

    Article  Google Scholar 

  • Goldstein, H. (1990). Problem-oriented policing. Philadelphia: Temple University Press.

    Google Scholar 

  • Kirschner, M., & Gerhart, J. (2005). The plausibility of life: Resolving Darwin’s dilemma. New Haven, CT: Yale University Press.

    Google Scholar 

  • Krebs, B. (2011). Retrieved January 22, 2015, from http://krebsonsecurity.com/2011/09/gang-used-3d-printers-for-atm-skimmers/

  • Laland, K., Odling-Smee, J., Feldman, M., & Kendal, J. (2009). Conceptual barriers to progress within evolutionary biology. Foundations of Science, 14(3), 195–216.

    Article  Google Scholar 

  • Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In W. Beijker & J. Law (Eds.), Shaping technology (pp. 205–224). Cambridge, MA: MIT Press.

    Google Scholar 

  • Lockton, D., Harrison, D., & Stanton, N. (2008). Design with intent: Persuasive technology in a wider context. In H. Oinas-Kukkonen, P. Hasle, M. Harjumaa, K. Segerståhl, & P. Øhrstrøm (Eds.), Persuasive technology: Third International Conference, PERSUASIVE 2008, Oulu, Finland, June 4–6, 2008, Proceedings (Lecture notes in computer science, Vol. 5033). Berlin: Springer.

    Google Scholar 

  • Lulham, R., Camacho Duarte, O., Dorst, K., & Kaldor, L. (2012). Designing a counterterrorism trash bin. In P. Ekblom (Ed.), Design against crime: Crime proofing everyday objects. Boulder, CO: Lynne Rienner.

    Google Scholar 

  • McElwee, G., & Smith, R. (Eds.). (2015). Exploring criminal and illegal enterprise: New perspectives on research, policy & practice. London: Emerald Group.

    Google Scholar 

  • Meyer, S., & Ekblom, P. (2011). Specifying the explosion-resistant railway carriage—A desktop test of the Security Function Framework. Journal of Transportation Security, 5, 69–85.

    Article  Google Scholar 

  • Mitcham, C. (1979). Philosophy and the history of technology. In G. Bugliarello (Ed.), The history and philosophy of technology (pp. 163–189). Champaign-Urbana, IL: University of Illinois Press.

    Google Scholar 

  • Morgan, M., & Carrier, D. (2013). Protective buttressing of the human fist and the evolution of hominin hands. Journal of Experimental Biology, 216, 236–244.

    Article  Google Scholar 

  • Nelson, R. (2007). Universal Darwinism and evolutionary social science. Biology and Philosophy, 22, 73–94.

    Article  Google Scholar 

  • Ogburn, W. (1922). Social change with respect to culture and original nature. New York: B.W. Huebsch.

    Google Scholar 

  • Pawson, R., & Tilley, N. (1997). Realistic Evaluation. London: Sage.

    Google Scholar 

  • Pease, K. (1997). Predicting the future: The roles of routine activity and rational choice theory. In G. Newman, R. V. Clarke, & S. Shoham (Eds.), Rational choice and situational crime prevention: Theoretical foundations. Aldershot, UK: Dartmouth Press.

    Google Scholar 

  • Pease, K. (2001). Cracking crime through design. London: Design Council.

    Google Scholar 

  • Roach, J., & Pease, K. (2013). Evolution and crime. London: Routledge.

    Google Scholar 

  • Roach, N., Venkadesan, M., Rainbow, M., & Lieberman, D. (2013). Elastic energy storage in the shoulder and the evolution of high-speed throwing in Homo. Nature, 498, 483–486.

    Article  Google Scholar 

  • Sagarin, R., & Taylor, T. (Eds.). (2008). Natural security: A Darwinian approach to a dangerous world. Berkeley: University of California Press.

    Google Scholar 

  • Schneier, B. (2012). Liars and outliers: Enabling the trust that society needs to thrive. New York: Wiley.

    Google Scholar 

  • Shover, N. (1996). Great pretenders: Pursuits and careers of persistent thieves. London: Westview Press.

    Google Scholar 

  • Sten, K. (2014). The emerging dynamics of innovation: The case of IT Industry in India. Master’s thesis, Copenhagen Business School. Retrieved March 25, 2015, from http://studenttheses.cbs.dk/bitstream/handle/10417/4797/katri_sten.pdf?sequence = 1

  • Tenner, E. (1996). Why things bite back: Technology and the revenge of unintended consequences. New York: Knopf.

    Google Scholar 

  • Tilley, N. (1993). Understanding car parks, crime and CCTV: Evaluation lessons from safer cities (Crime prevention unit paper, Vol. 42). London: Home Office.

    Google Scholar 

  • Tocheri, M., Orr, C., Jacofsky, M., & Marzke, M. (2008). The evolutionary history of the hominin hand since the last common ancestor of Pan and Homo. Journal of Anatomy, 212(4), 544–562.

    Article  Google Scholar 

  • Tooby, J., & DeVore, I. (1987). The reconstruction of hominid behavioral evolution through strategic modelling. In W. Kinzey (Ed.), The evolution of human behavior: Primate models (pp. 183–227). New York: SUNY Press.

    Google Scholar 

  • Trott, P. (2005). Innovation management and new product development, 2005. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • van Valen, L. (1973). A new evolutionary law. Evolutionary Theory, 1, 1–30.

    Google Scholar 

  • Welsh, B., & Farrington, D. (2008). Effects of closed circuit television surveillance on crime. A systematic review. Oslo: Campbell Collaboration.

    Google Scholar 

  • Whitehead, S., Mailley, J., Storer, I., McCardle, J., Torrens, G., & Farrell, G. (2008). IN SAFE HANDS: A review of mobile phone anti-theft designs’. European Journal on Criminal Policy and Research, 14, 39–60.

    Article  Google Scholar 

  • Whiten, A., & Erdal, D. (2012). The human socio-cognitive niche and its evolutionary origins. Philosophical Transactions of the Royal Society B, 367, 2119–2129.

    Article  Google Scholar 

  • Wortley, R. (2008). Situational precipitators of crime. In R. Wortley & L. Mazerolle (Eds.), Environmental criminology and crime analysis. Cullompton: Willan.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Ekblom .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ekblom, P. (2017). Technology, Opportunity, Crime and Crime Prevention: Current and Evolutionary Perspectives. In: LeClerc, B., Savona, E. (eds) Crime Prevention in the 21st Century. Springer, Cham. https://doi.org/10.1007/978-3-319-27793-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27793-6_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27791-2

  • Online ISBN: 978-3-319-27793-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics