Moving Toward the Future of Policing

Total Page:16

File Type:pdf, Size:1020Kb

Moving Toward the Future of Policing CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Moving Toward the Future of Policing Gregory F. Treverton, Matt Wollman, Elizabeth Wilke, Deborah Lai NATIONAL SECURITY RESEARCH DIVISION The research described in this report was conducted within the RAND Center for Global Risk and Security under the auspices of the International Programs of the RAND Corporation. Library of Congress Control Number: 2011939018. ISBN: 978-0-8330-5320-6 The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2011 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/ permissions.html). Published 2011 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] Preface This book grew out of conversations with members of the Advisory Board of RAND’s Center for Global Risk and Security. It began when one board member who is now a co-author of this book, Matt Wollman, observed that when asked what their police forces will look like in 20 years, police chiefs almost always say “much like now,” perhaps with some adjustments in balances of gender and ethnicity. It seemed to us that this couldn’t be the right answer, given advances in technol- ogy, especially, but also in operating concepts by police authorities. Thus was born this book, an effort to think creatively but also use- fully about the future. It draws on the work of many others to create a vision of what future policing could look like, but it also concludes with concrete steps for moving toward that vision. It is aimed at those who make decisions in shaping law enforcement organizations, their equipment, training, and concepts of operations, as well as at potential partners in the private sector. It should also be of interest to concerned citizens, whose support is absolutely essential to effective policing. This book results from the generosity of donors to the center. We greatly appreciate their support, and we also thank Queenisha Rynders for her research assistance early in the project. This research was conducted within the RAND Center for Global Risk and Security, part of International Programs at the RAND Cor- poration. The center aims to improve public policy by providing deci- sionmakers and the public with rigorous, objective research on critical, crosscutting policy issues affecting global risk and security. iii iv Moving Toward the Future of Policing For more information on the RAND Center for Global Risk and Security, see http://www.rand.org/international_programs/cgrs.html or contact the director (contact information is provided on the web page). Contents Preface ............................................................................. iii Figures ............................................................................. ix Tables .............................................................................. xi Summary .........................................................................xiii Acknowledgments .............................................................. xxi Abbreviations .................................................................. xxiii CHAPTER ONE Framing the Future ............................................................... 1 Thinking About and Responding to Threats ................................... 4 Plan of This Book .................................................................. 9 CHAPTER TWO Policing Today ....................................................................15 The Political Era ...................................................................16 The Reform Era ...................................................................18 The Community Era ............................................................. 24 Order-Maintenance Policing ................................................. 26 Deterrence Through Presence .................................................29 Directed Patrol and Crackdowns ............................................ 30 Problem-Oriented Policing ....................................................31 The Intelligence-Led Policing Era ...............................................32 Charting the Mismatch ..........................................................39 CHAPTER THREE Crime Does Not Respect Jurisdiction....................................... 43 v vi Moving Toward the Future of Policing The Force of Jurisdictions ....................................................... 44 Trying to Do Better: More-Formal Cooperation .............................49 Policing Across Borders: The United States and Mexico .................... 56 The Limits of International Cooperation .......................................61 CHAPTER FOUR The Technology Revolution Enables Change ...............................69 The Challenge of Technology ....................................................70 Technology and Changes in Policing ...........................................72 Technologies on the Horizon ....................................................74 Data Collection and Processing ...............................................76 Problem-Solving.................................................................78 Partnerships ......................................................................81 Organizational Structure ......................................................85 Integrating Technology into Police Departments ............................ 86 CHAPTER FIVE The Threat Will Continue to Morph .........................................89 Taking Advantage of Seams .................................................... 90 Technological Advances ......................................................... 94 Technology-Enabled Crime and the Internet ............................... 94 Cyber Crime .................................................................... 97 Virtual Crimes and Real Crimes in Virtual Worlds ...................... 100 Social, Demographic, and Economic Shifts ................................. 101 Increasing Movement of Goods, Services, and Information ............. 103 The More-Distant Future Will Manifest New Challenges ................. 104 CHAPTER SIX Concepts of Operations Are Critical ....................................... 107 How Might Operations Change in the Future? ............................. 108 Changing Organizations ....................................................... 111 New Workforce Demands ..................................................... 113 Constraints on Changing ConOps ........................................... 116 The Challenge of Changing Cultures: The FBI as a Case in Point ..... 117 Budgetary Considerations and Outsourcing .............................. 121 Legal and Political Restrictions ............................................. 125 Technology, Jurisdiction, and ConOps ....................................... 130 Contents vii CHAPTER SEVEN Moving Toward the Vision ................................................... 131 Summing Up the Vision ....................................................... 131 Concrete Steps ..................................................................
Recommended publications
  • Guide to Combat Crime Related to Falsified Medical Products
    COMBATING FALSIFIED MEDICAL PRODUCT-RELATED CR ME A GUIDE TO GOOD LEGISLATIVE PRACTICES UNITED NATIONS OFFICE ON DRUGS AND CRIME COMBATING FALSIFIED MEDICAL PRODUCT-RELATED CRIME: A GUIDE TO GOOD LEGISLATIVE PRACTICES UNITED NATIONS Vienna, 2019 i Acknowledgements This Guide was prepared by the Organized Crime Branch, Division for Treaty Affairs, United Nations Office on Drugs and Crime, and was funded by France. This Guide benefited from the invaluable contributions of numerous experts in falsified medical products from all continents of the world, acting in their individual capacity. The United Nations Office on Drugs and Crime also wishes to thank the Council of Europe, the Economic Community of West African States, the European Union, the International Council of Nurses, the International Criminal Police Organization (INTERPOL), the New Partnership for Africa’s Development, the World Customs Organization and the World Health Organization for providing their expertise. Core team Hugo Bonar, Antonio De Vivo, Marion Ehalt, Karen Kramer, Riikka Puttonen and Christian Tournié Legal editing Colin Craig © United Nations, May 2019. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication may be reproduced in whole or in part and in any form for educational or nonprofit purposes without special permission from the copyright holder, provided acknowledgement of the source is made. UNODC would appreciate receiving a copy of any publication that uses this publication as a source.
    [Show full text]
  • Zero Tolerance Policing
    RESEARCHING CRIMINAL JUSTICE SERIES Zero tolerance policing Maurice Punch Zero tolerance policing Maurice Punch First published in Great Britain in 2007 by The Policy Press The Policy Press University of Bristol Fourth Floor, Beacon House Queen’s Road Bristol BS8 1QU UK Tel no +44 (0)117 331 4054 Fax no +44 (0)117 331 4093 E-mail [email protected] www.policypress.org.uk © Maurice Punch 2007 ISBN 978 1 84742 055 8 British Library Cataloguing in Publication Data A catalogue record for this report is available from the British Library. Library of Congress Cataloging-in-Publication Data A catalog record for this report has been requested. The right of Maurice Punch to be identified as author of this work has been asserted by him in accordance with Sections 77 and 78 of the 1988 Copyright, Designs and Patents Act. All rights reserved. No part of this publication may be reproduced or transmitted, in any form or by any means, without the prior permission of the copyright owners. The statements and opinions contained within this publication are solely those of the author and not of the University of Bristol or The Policy Press. The University of Bristol and The Policy Press disclaim responsibility for any injury to persons or property resulting from any material published in this publication. The Policy Press works to counter discrimination on grounds of gender, race, disability, age and sexuality. Cover image courtesy of iStockphoto® Cover design by Qube Design Associates, Bristol Printed in Great Britain by Latimer Trend, Plymouth To the
    [Show full text]
  • Prevent, Prepare and Protect: Regional Crime Fighting & Counterterrorism Special Report 2
    A GOVERNMENT TECHNOLOGY® S P E C I A L R E P O R T S PON S O R E D B Y: Prevent, Prepare and Protect: Regional Crime Fighting & Counterterrorism Special Report 2 “THAT’ S WHERE ORACLE IN T EGRAT I O N T ECHN O L O GY F I ts I N , I N K N O C K I N G D O W N T H os E S IL os — G AT H E R I N G A N D S H A R I N G T HAT I N F O RMAT I O N AM O N G D E T EC T IVE S .” LOU ANEMONE, former chief, New York Police Department A B E ttE R P E R spECTIVE Homeland security experts gather valuable crime statistics to present a bigger picture. For most of its history, law enforcement in the United In 1994, under the leadership of Police Commissioner States has been a localized affair. A sort of patchwork of William Bratton, Anemone and the late Deputy Police miniature kingdoms, each jurisdiction was responsible Commissioner Jack Maple created a management account- for itself. Even within cities themselves, individual pre- ability process known as COMPSTAT, short for Comput- cincts often manage crime on their turf — and they man- er Statistics. COMPSTAT revolutionized law enforcement age it alone. However, a new version of the legendary by giving police a computerized system for crime analysis COMPSTAT system, now powered by Oracle, is improv- and mapping. Developed by the NYPD, the system now is ing how police fight crime.
    [Show full text]
  • Television Academy Awards
    2019 Primetime Emmy® Awards Ballot Outstanding Comedy Series A.P. Bio Abby's After Life American Housewife American Vandal Arrested Development Atypical Ballers Barry Better Things The Big Bang Theory The Bisexual Black Monday black-ish Bless This Mess Boomerang Broad City Brockmire Brooklyn Nine-Nine Camping Casual Catastrophe Champaign ILL Cobra Kai The Conners The Cool Kids Corporate Crashing Crazy Ex-Girlfriend Dead To Me Detroiters Easy Fam Fleabag Forever Fresh Off The Boat Friends From College Future Man Get Shorty GLOW The Goldbergs The Good Place Grace And Frankie grown-ish The Guest Book Happy! High Maintenance Huge In France I’m Sorry Insatiable Insecure It's Always Sunny in Philadelphia Jane The Virgin Kidding The Kids Are Alright The Kominsky Method Last Man Standing The Last O.G. Life In Pieces Loudermilk Lunatics Man With A Plan The Marvelous Mrs. Maisel Modern Family Mom Mr Inbetween Murphy Brown The Neighborhood No Activity Now Apocalypse On My Block One Day At A Time The Other Two PEN15 Queen America Ramy The Ranch Rel Russian Doll Sally4Ever Santa Clarita Diet Schitt's Creek Schooled Shameless She's Gotta Have It Shrill Sideswiped Single Parents SMILF Speechless Splitting Up Together Stan Against Evil Superstore Tacoma FD The Tick Trial & Error Turn Up Charlie Unbreakable Kimmy Schmidt Veep Vida Wayne Weird City What We Do in the Shadows Will & Grace You Me Her You're the Worst Young Sheldon Younger End of Category Outstanding Drama Series The Affair All American American Gods American Horror Story: Apocalypse American Soul Arrow Berlin Station Better Call Saul Billions Black Lightning Black Summer The Blacklist Blindspot Blue Bloods Bodyguard The Bold Type Bosch Bull Chambers Charmed The Chi Chicago Fire Chicago Med Chicago P.D.
    [Show full text]
  • European Convention on Extradition
    European Treaty Series - No. 24 European Convention on Extradition Paris, 13.XII.1957 The governments signatory hereto, being members of the Council of Europe, Considering that the aim of the Council of Europe is to achieve a greater unity between its members; Considering that this purpose can be attained by the conclusion of agreements and by common action in legal matters; Considering that the acceptance of uniform rules with regard to extradition is likely to assist this work of unification, Have agreed as follows: Article 1 – Obligation to extradite The Contracting Parties undertake to surrender to each other, subject to the provisions and conditions laid down in this Convention, all persons against whom the competent authorities of the requesting Party are proceeding for an offence or who are wanted by the said authorities for the carrying out of a sentence or detention order. Article 2 – Extraditable offences 1 Extradition shall be granted in respect of offences punishable under the laws of the requesting Party and of the requested Party by deprivation of liberty or under a detention order for a maximum period of at least one year or by a more severe penalty. Where a conviction and prison sentence have occurred or a detention order has been made in the territory of the requesting Party, the punishment awarded must have been for a period of at least four months. 2 If the request for extradition includes several separate offences each of which is punishable under the laws of the requesting Party and the requested Party by deprivation of liberty or under a detention order, but of which some do not fulfil the condition with regard to the amount of punishment which may be awarded, the requested Party shall also have the right to grant extradition for the latter offences.
    [Show full text]
  • CH 10 Confessions
    CONFESSIONS .............................................................................................. 1 §10-1 Fifth Amendment Rights .......................................................................... 1 §10-2 Suppression Motions and Hearings ..................................................... 12 §10-3 Miranda Warnings ................................................................................... 17 §10-3(a) Generally ......................................................................................... 17 §10-3(b) Non-Police Interrogation ............................................................. 26 §10-3(c) “In custody” .................................................................................... 28 §10-3(d) “Interrogation” ............................................................................... 49 §10-4 Waiver of Rights ....................................................................................... 53 §10-4(a) Generally ......................................................................................... 53 §10-4(b) Interrogation After the Right to Counsel Attaches ............... 62 §10-4(c) Interrogation After Request for Counsel ................................. 68 §10-4(d) Interrogation After Request to Remain Silent ....................... 82 §10-5 Voluntariness ............................................................................................ 89 §10-5(a) Generally ......................................................................................... 89 §10-5(b) Examples:
    [Show full text]
  • World Law Bulletin, February 2001
    WLB 2001.02, February 2001 Indian rights The LAW Intellectual property law Internet security regulation Islamic edicts LIBRARY of Judicial independence Lifelong learning Marriage law CONGRESS Nuclear power plant Press freedom Privacy Wrongful birth case Updates: WORLD • World Trade Organization LAW • European Union Developments BULLETIN FOREIGN LAW FOCUS: Germany: Constitutional Court Rules on the Recognition of Jehovah’s Administration of medicines Witnesses Auditors China/Vietnam joint statement Embryo research People’s Republic of China: Farmers’ associations Extradition Law Firearms trading Foreign investment Income tax 2 WLB, No. 2001.02 –Lifelong learning law –Tax law amended The WORLD LAW EUROPE BULLETIN: a monthly France–Embryo research awareness service prepared by the Staff –“Wrongful birth” case of the Law Library of Congress. The Netherlands–Action against illegal trading in Editors: Constance Axinn Johnson and firearms Wendy I. Zeldin. For more information --Cameras and Privacy or research tailored to your needs, call: Slovakia–Auditors the Directorate of Legal Research, Ukraine–Hearings on press freedom at 7-4351 or fax: 7-1820. The Bulletin and information on Law SOUTH PACIFC Library services for Congress can be Australia–Judicial Independence found online: http://lcweb.loc.gov/law/congress. LAW AND ORGANIZATIONS– INTERNATIONAL AND REGIONAL GLIN: The Global Legal Information China/Vietnam–Cooperation statement Network, a primary source of authentic legal information serving congressional research needs, is accessed through
    [Show full text]
  • Is the Mafia Taking Over Cybercrime?*
    Is the Mafia Taking Over Cybercrime?* Jonathan Lusthaus Director of the Human Cybercriminal Project Department of Sociology University of Oxford * This paper is adapted from Jonathan Lusthaus, Industry of Anonymity: Inside the Business of Cybercrime (Cambridge, Mass. & London: Harvard University Press, 2018). 1. Introduction Claims abound that the Mafia is not only getting involved in cybercrime, but taking a leading role in the enterprise. One can find such arguments regularly in media articles and on blogs, with a number of broad quotes on this subject, including that: the “Mafia, which has been using the internet as a communication vehicle for some time, is using it increasingly as a resource for carrying out mass identity theft and financial fraud”.1 Others prescribe a central role to the Russian mafia in particular: “The Russian Mafia are the most prolific cybercriminals in the world”.2 Discussions and interviews with members of the information security industry suggest such views are commonly held. But strong empirical evidence is rarely provided on these points. Unfortunately, the issue is not dealt with in a much better fashion by the academic literature with a distinct lack of data.3 In some sense, the view that mafias and organised crime groups (OCGs) play an important role in cybercrime has become a relatively mainstream position. But what evidence actually exists to support such claims? Drawing on a broader 7-year study into the organisation of cybercrime, this paper evaluates whether the Mafia is in fact taking over cybercrime, or whether the structure of the cybercriminal underground is something new. It brings serious empirical rigor to a question where such evidence is often lacking.
    [Show full text]
  • Vol. 13, No. 1: Full Issue
    Denver Journal of International Law & Policy Volume 13 Number 1 Fall Article 13 May 2020 Vol. 13, no. 1: Full Issue Denver Journal International Law & Policy Follow this and additional works at: https://digitalcommons.du.edu/djilp Recommended Citation 13 Denv. J. Int'l L. & Pol'y (1983). This Full Issue is brought to you for free and open access by the University of Denver Sturm College of Law at Digital Commons @ DU. It has been accepted for inclusion in Denver Journal of International Law & Policy by an authorized editor of Digital Commons @ DU. For more information, please contact [email protected],dig- [email protected]. DENVER JOURNAL OF INTERNATIONAL LAW AND POLICY VOLUME 13 1983-1984 Denver Journal of International Law and Policy VOLUME 13 NUMBER 1 FALL 1983 MYRES S. MCDOUGAL DISTINGUISHED LECTURE NUCLEAR WEAPONS AND INTERNATIONAL LAW: ILLEGALITY IN CONTEXT .................... Burns H. Weston 1 The University of Denver College of Law was honored to have Professor Burns H. Weston, Professor of Law at the University of Iowa, as its guest speaker for the eighth annual Myres S. McDougal Distinguished Lecture. Professor Weston chose to address the topic of assessing the legality of nu- clear weapons and warfare, and he notes it is the special obligation of law- yers, "together with our clerical friends, to point up the normative rights and wrongs of coercive nuclearism." In his remarks, Professor Weston ac- knowledges that while there are no explicit treaties or treaty provisions which render nuclear weapons illegal per se, there are six "core rules" appli- cable to nuclear weapons which may be derived from the conventional and customary laws of war.
    [Show full text]
  • Cybercrime-As-A-Service: Identifying Control Points to Disrupt Keman Huang Michael Siegel Stuart Madnick
    Cybercrime-as-a-Service: Identifying Control Points to Disrupt Keman Huang Michael Siegel Stuart Madnick Working Paper CISL# 2017-17 November 2017 Cybersecurity Interdisciplinary Systems Laboratory (CISL) Sloan School of Management, Room E62-422 Massachusetts Institute of Technology Cambridge, MA 02142 Cybercrime-as-a-Service: Identifying Control Points to Disrupt KEMAN HUANG, MICHAEL SIEGEL, and STUART MADNICK, Massachusetts Institute of Technology Cyber attacks are increasingly menacing businesses. Based on literature review and publicly available reports, this paper analyses the growing cybercrime business and some of the reasons for its rapid growth. A value chain model is constructed and used to describe 25 key value-added activities, which can be offered on the Dark Web as a service, i.e., “cybercrime-as-a-service,” for use in a cyber attack. Understanding the specialization, commercialization, and cooperation of these services for cyber attacks helps to anticipate emerging cyber attack services. Finally, this paper identifies cybercrime control-points that could be disrupted and strategies for assigning defense responsibilities to encourage collaboration. CCS Concepts: • General and reference Surveys and overviews; • Social and professional topics Computing and business; Socio-technical systems; Computer crime; • Security and privacy Social aspects of security and privacy; → → → Additional Key Words and Phrases: Cyber Attack Business; Value Chain Model; Cyber-crime-as-a-Service; Hacking Innovation; Control Point; Sharing Responsibility 1 INTRODUCTION “Where there is commerce, there is also the risk for cybercrime”[139]. Cybercrime is a tremendous threat to today’s digital society. It is extimated that the cost of cybercrime will grow from an annual sum of $3 trillion in 2015 to $6 trillion by the year 2021 [115].
    [Show full text]
  • An Analysis of the Nature of Groups Engaged in Cyber Crime
    International Journal of Cyber Criminology Vol 8 Issue 1 January - June 2014 Copyright © 2014 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2014, Vol 8 (1): 1–20. This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime Roderic Broadhurst,1 Peter Grabosky,2 Mamoun Alazab3 & Steve Chon4 ANU Cybercrime Observatory, Australian National University, Australia Abstract This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cyber crime and different forms of criminal organization are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organizational structures are involved in cyber crime. Enterprise or profit-oriented activities, and especially cyber crime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command. Keywords: Cybercrime, Organized Crime, Crime Groups; Internet Crime; Cyber Offenders; Online Offenders, State Crime.
    [Show full text]
  • Sheila Nevins Joins MTV Studios to Launch MTV Documentary Films
    Sheila Nevins Joins MTV Studios to Launch MTV Documentary Films May 7, 2019 Longtime president of HBO Documentary Films to shepherd new generation of documentary filmmakers exploring issues that impact youth NEW YORK--(BUSINESS WIRE)--May 7, 2019-- MTV, a unit of Viacom (NASDAQ:VIAB), today announced that Sheila Nevins — the legendary producer who redefined modern documentary storytelling and won dozens of Emmy® and Peabody® Awards as President of HBO Documentary Films — will joinMTV to launch MTV Documentary Films. As part of MTV Studios, the new division will develop documentary films and specials for third-party streaming services, premium networks and MTV platforms. Under Nevins’ leadership, MTV Documentary Films will embrace a new generation of filmmakers exploring the social, political and cultural trends and stories important to young people. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20190507005987/en/ “MTV has always been at the forefront of youth culture, and the generation that is growing up now will change the world in ways we can’t even imagine,” said Nevins. “I’m excited to join MTV with electrifying stories that explore the crises and commitments that young people face every day.” “Throughout her stellar career, Sheila has elevated documentaries into one of the most compelling, culturally influentially forms of modern storytelling,” said Chris McCarthy, President of MTV. “As we grow and expand MTV, we’re excited for Sheila to bring a new generation of filmmakers to the forefront and continue to extend our creativity and cultural impact.” Nina L. Diaz, President of Entertainment for MTV, added, “What we started two decades ago with MTV News and Docs continues to inspire today.
    [Show full text]