874 resultados para FSB and Russian Organized Crime


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliographical references.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pt.5: Hearings before the Public Health, Education, Welfare, and Safety Subcommittee.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Oartigo tem como objectivo reconstruir de forma crítica o discurso da união europeia relativa-mente ao crime organizado, tentando estabelecer uma relação entre este e um discurso mais lato sobre a criação e desenvolvimento da área de liber-dade, Segurança e Justiça (alsj). ésalientada a forma como os argumen-tos justificadores de uma cooperação mais profunda da alsjassentaram na necessidade de compensar pelas exter-nalidades negativas do mercado interno e de proteger a liberdade de circulação de possíveis abusos. esta tendência levou à gradual institucio-nalização da área de Justiça e assuntos internos a nível europeu, caracterizada por uma luta permanente entre a sua intergovernamentalização e a comuni-tarização This article aims at tracing, critically, the European Union’s discourse on organized crime, by establishing its relation with a wider discourse on the creation and development of the Area of Freedom, Security and Justice (afsj). It pointed out how the rationale for the afsj’s deeper integration was the need to compensate for the negative externalities of the Internal Market and to protect the liberty of movement from abuse. This trend led to the definition of a balance between freedom and security, characterized by a gradual eu institutionalization of Justice and Home Affairs and a permanent struggle between the intergovernmentalisation and the communitarization of this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A difficult transition to a new paradigm of Democratic Security and the subsequent process of military restructuring during the nineties led El Salvador, Honduras, Guatemala and Nicaragua to re-consider their old structures and functions of their armed forces and police agencies. This study compares the institutions in the four countries mentioned above to assess their current condition and response capacity in view of the contemporary security challenges in Central America. This report reveals that the original intention of limiting armies to defend and protect borders has been threatened by the increasing participation of armies in public security. While the strength of armies has been consolidated in terms of numbers, air and naval forces have failed to become strengthened or sufficiently developed to effectively combat organized crime and drug trafficking and are barely able to conduct air and sea operations. Honduras has been the only country that has maintained a proportional distribution of its armed forces. However, security has been in the hands of a Judicial Police, supervised by the Public Ministry. The Honduran Judicial Police has been limited to exercising preventive police duties, prohibited from carrying out criminal investigations. Nicaragua, meanwhile, possesses a successful police force, socially recognized for maintaining satisfactory levels of security surpassing the Guatemalan and El Salvadoran police, which have not achieved similar results despite of having set up a civilian police force separate from the military. El Salvador meanwhile, has excelled in promoting a Police Academy and career professional education, even while not having military attachés in other countries. Regarding budgetary issues, the four countries allocate almost twice the amount of funding on their security budgets in comparison to what is allocated to their defense budgets. However, spending in both areas is low when taking into account each country's GDP as well as their high crime rates. Regional security challenges must be accompanied by a professionalization of the regional armies focused on protecting and defending borders. Therefore, strong institutional frameworks to support the fight against crime and drug trafficking are required. It will require the strengthening of customs, greater control of illicit arms trafficking, investment in education initiatives, creating employment opportunities and facilitating significant improvements in the judicial system, as well as its accessibility to the average citizen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While violence against children is a common occurrence only a minority of incidents come to the attention of the authorities. Low reporting rates notwithstanding, official data such as child protection referrals and recorded crime statistics provide valuable information on the numbers of children experiencing harm which come to the attention of professionals in any given year. In the UK, there has been a strong tendency to focus on child protection statistics while children as victims of crime remain largely invisible in annual crime reports and associated compendia. This is despite the implementation of a raft of policies aimed at improving the system response to victims and witnesses of crime across the UK. This paper demonstrates the utility of a more detailed analysis of crime statistics in providing information on the patterns of crime against children and examining case outcomes. Based on data made available by the Police Service for Northern Ireland, it highlights how violent crime differentially impacts on older children and how detection rates vary depending on case characteristics. It makes an argument for developing recorded crime practice to make child victims of crime more visible and to facilitate assessment of the effectiveness of current initiatives and policy developments. Copyright © 2013 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study of Victorian crime and punishment is a rich area of research that has attracted the interest not only of literary scholars but also of social historians, legal historians, and criminologists. Related scholarship therefore often situates itself at the intersection of traditional disciplinary boundaries, facilitating interdisciplinary conversation. Crime and punishment was a pressing issue for the Victorians and provoked a wealth of responses from contemporaneous commentators in literature, culture, and science. As a new phase of industrialization brought immense wealth for some and abject poverty for others, Victorian urban centers in particular were afflicted by crime. Without an effective system of social welfare in place, social inequality and deprivation drove women, men, and children into petty crime and more serious offenses, resulting in severe punishment ranging from incarceration via penal transportation to hanging. Public executions, not abolished until 1868, attracted huge crowds of spectators, including authors such as Charles Dickens and William Thackeray, who wrote about these experiences. A forerunner of the popular press, street literature conveyed and illustrated these events for a broad audience. Execution broadsides of famous cases, printing the alleged last lamentations of convicts on the scaffold in verse, are estimated to have sold by the million. As the legal system was undergoing reform (comprising changes in legal evidence procedure, divorce law, women’s property rights, and punishment for sexual offenses, for example), sensational trials caused furor and stimulated commentary in literature and the media. Crime and punishment was discussed in a range of literary and popular genres, poetry, and reformist writing. The “Newgate School” of fiction was accused of glamorizing crime, and the popular penny dreadfuls were feared to corrupt public morals. Sensational fiction in the 1860s, which often drew on real-life criminal cases and newspaper reports, depicted the supposedly respectable middle-class family home as a center of transgression. Similarly, detective fiction typically focused on crime in the world of the middle classes. For the student new to the subject of crime and punishment, this area’s interdisciplinary nature can pose an initial challenge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Prevention of Organised Crime Act 121 of 1998 [POCA] embodies a serious attempt by the South African government to effectively police and curb organised crime, money laundering and criminal gang activities in South Africa. The Act provides inter alia for a range of crippling fines and for orders such as confiscation and forfeiture. Asset forfeiture and confiscation orders can affect the rights of third parties directly and indirectly in a number of ways. Young persons and children can beaffected indirectly because asset forfeiture and confiscation orders may violate the right to parental care of the dependent young persons and children of the person who is subject to the order. This brief article will investigate aspects of the protection afforded to the rights of children when such orders are made in terms of the provisions of the Prevention of Organised Crime Act.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Crime in the Professions critically examines the nature and extent of crime and deviance in the professions and how it should be dealt with. The increasing professionalization of the work force and the changes in the way in which professionals carry out their work, such as through the use of computing and communications technology, have created new opportunities for professionals to break the law. Looking in detail at the nature and extent of crime committed by professionals such as doctors, accountants and nurses the book offers some innovative solutions on preventing and controlling professional crime. In addition to examining the nature and extent of crime in the professions, it also addresses some critical issues of regulation for the future, concerning new and emerging professional groups and issues relating to emerging technologies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Given the serious nature of computer crime, and its global nature and implications, it is clear that there is a crucial need for a common understanding of such criminal activity internationally in order to deal with it effectively. Research into the extent to which legislation, international initiatives, and policy and procedures to combat and investigate computer crime are consistent globally is therefore of enormous importance. The challenge is to study, analyse, and compare the policies and practices of combating computer crime under different jurisdictions in order to identify the extent to which they are consistent with each other and with international guidelines; and the extent of their successes and limitations. The purpose ultimately is to identify areas where improvements are needed and what those improvements should be. This thesis examines approaches used for combating computer crime, including money laundering, in Australia, the UAE, the UK and the USA, four countries which represent a spectrum of economic development and culture. It does so in the context of the guidelines of international organizations such as the Council of Europe (CoE) and the Financial Action Task Force (FATF). In the case of the UAE, we examine also the cultural influences which differentiate it from the other three countries and which has necessarily been a factor in shaping its approaches for countering money laundering in particular. The thesis concludes that because of the transnational nature of computer crime there is a need internationally for further harmonisation of approaches for combating computer crime. The specific contributions of the thesis are as follows: „h Developing a new unified comprehensive taxonomy of computer crime based upon the dual characteristics of the role of the computer and the contextual nature of the crime „h Revealing differences in computer crime legislation in Australia, the UAE, the UK and the USA, and how they correspond to the CoE Convention on Cybercrime and identifying a new framework to develop harmonised computer crime or cybercrime legislation globally „h Identifying some important issues that continue to create problems for law enforcement agencies such as insufficient resources, coping internationally with computer crime legislation that differs between countries, having comprehensive documented procedures and guidelines for combating computer crime, and reporting and recording of computer crime offences as distinct from other forms of crime „h Completing the most comprehensive study currently available regarding the extent of money laundered in four such developed or fast developing countries „h Identifying that the UK and the USA are the most advanced with regard to anti-money laundering and combating the financing of terrorism (AML/CFT) systems among the four countries based on compliance with the FATF recommendations. In addition, the thesis has identified that local factors have affected how the UAE has implemented its financial and AML/CFT systems and reveals that such local and cultural factors should be taken into account when implementing or evaluating any country¡¦s AML/CFT system.