303 resultados para Criminals


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article is concerned with knowledge management in policing police crime. Police crime is defined as crime committed by police officers on duty. There seems to be a tendency to consider police crime as a result of bad practice rather than the acts of criminals. However, examples illustrate that criminal acts are intentionally carried out by police officers on duty. The article looks at the kinds of knowledge which agencies require to investigate police complaints and police crime successfully.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study of criminal career paths is necessary to understand the methods of success employed by high-performing criminals. The aim of this article is to focus on the career path of Jack Herbert who set up and maintained extensive corruption networks between organised crime groups and police in the Australian state of Queensland. This study builds on Morselli’s work on the career paths of Sammy Gravano and Howard Marks that demonstrate how understanding social networks is an essential part of comprehending how organised criminals succeed. The data for this study were taken from the transcripts of the Fitzgerald Commission of Inquiry, which uncovered the extensive and resilient corruption network operated by Herbert. Herbert’s relationships have been plotted to establish the nature of his operations. The findings indicate that communication of trust both allows for success and sets the boundaries of a network. Most importantly, this case study identifies Herbert’s reliance on holding a monopoly as the cornerstone of his network power and position. This article adds to the literature on criminal career paths by moving away from a classic organised criminal grouping into the area of police corruption and uncovers the distinctive opportunities that this position offers the career criminal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis presented in this paper is that the land fraud committed by Matthew Perrin in Queensland and inflicted upon Roger Mildenhall in Western Australia demonstrates the need for urgent procedural reform to the conveyancing process. Should this not occur, then calls to reform the substantive principles of the Torrens system will be heard throughout the jurisdictions that adopt title by registration, particularly in those places where immediate indefeasibility is still the norm. This paper closely examines the factual matrix behind both of these frauds, and asks what steps should have been taken to prevent them occurring. With 2012 bringing us Australian legislation embedding a national e-conveyancing system and a new Land Transfer Act for New Zealand we ask what legislative measures should be introduced to minimise the potential for such fraud. In undertaking this study, we reflect on whether the activities of Perrin and the criminals responsible for stealing Mildenhall's land would have succeeded under the present system for automated registration utilised in New Zealand.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online victimisation of children is concerned with sexual abuse caused with the help of online technologies. Digital forensics is a powerful methodology to discover, prevent and bring criminals to justice. Digital forensics is dependent on tools and access to information from a variety of sources in digital government. This paper reports from a knowledge enhancement project to gain new insights into offender investigations in law enforcement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conducting research into crime and criminal justice carries unique challenges. This Handbook focuses on the application of 'methods' to address the core substantive questions that currently motivate contemporary criminological research. It maps a canon of methods that are more elaborated than in most other fields of social science, and the intellectual terrain of research problems with which criminologists are routinely confronted. Drawing on exemplary studies, chapters in each section illustrate the techniques (qualitative and quantitative) that are commonly applied in empirical studies, as well as the logic of criminological enquiry. Organized into five sections, each prefaced by an editorial introduction, the Handbook covers: • Crime and Criminals • Contextualizing Crimes in Space and Time: Networks, Communities and Culture • Perceptual Dimensions of Crime • Criminal Justice Systems: Organizations and Institutions • Preventing Crime and Improving Justice Edited by leaders in the field of criminological research, and with contributions from internationally renowned experts, The SAGE Handbook of Criminological Research Methods is set to become the definitive resource for postgraduates, researchers and academics in criminology, criminal justice, policing, law, and sociology.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Carbon trading fraudsters may have accounted for up to 90% of all market activity in some European countries, with criminals pocketing billions, mainly in Britain, France, Spain, Denmark and Holland, according to Europol and the European law enforcement agency.’ (Mason, 2009). ‘Carbon offset projects often result in land grabs, local environmental and social conflicts, as well as the repression of local communities and movements. The CDM approval process for projects allows little space for the voices of Indigenous Peoples and local communities – in fact, no project has ever been rejected on the grounds of rights violations, despite these being widespread’. (Carbon Trade Watch, 2013)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A number of recent developments in the United State (US), United Kingdom (UK) and Australia suggest that conditions may be ripe for a political shift in the reliance on escalating rates of imprisonment as a default criminal justice strategy for responding to crime. The default position is illustrated by the Yabsleyite response of former New South Wales (NSW) Premier Nathan Rees’s to questioning over the cost of prison building and NSW’s high recidivism rate: ‘[t]he advice to me is we have still got 500 cells empty, I don't mind if we fill them up, and if we fill them up and have to build another jail, we'll build another jail’ (Knox and Tadros 2008)...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The main focus of the research is on the genealogy of women's same-sex fornication in Finnish criminal law from 1889/1894 to 1971. Why were women included in the concept of same-sex fornication in Finland and why, where, and when was the law put into effect? Which women were tried, how did the trial proceedings evolve, and what kind of effects did the trials have afterwards? Which concepts were used? These questions have been approached through the analysis of the Finnish Penal Code, the criminal law science and four trial proceedings in Eastern Finland during the 1950s. The research draws on the epistemology of the closet and the concept of heteronormativity adapted from queer theories. It is method critical in utilising ethnography, micro history and feminist ethical self-reflection. The research consists of six scientific refereed articles (see appendix) and of a theoretical introduction. The main results of the research are: 1) The genealogy of Finnish decency [Sittlichkeit] can not be researched without oral histories, due to the late modernisation of Finnish society and the legal system, which does not follow the pattern of English, French and German societies. 2) The inclusion of women's same-sex fornication in the Finnish Penal Code is not incomprehensible when compared to the early modern European legislations and court practices. Women have been punished for the sins of Sodom, though not directly under the 1734 Swedish law. 3) Fornication and decency were ambivalent concepts in the 1889/1894 law, and juridical authorities offered controversial interpretations of them during the late 19th and early 20th centuries. 4) A peak in women's convictions occurred in the 1950s, and most of the trial proceedings took place in rural Eastern Finland. Neither the state nor the police were active in prosecuting; instead, the trial proceedings began "by accident". 5) From 1940 to 1960 police training lacked instructions concerning the interrogation of women suspected of same-sex fornication. 6) The figure of the penitent woman was produced in the chiasmic encounter of confession and police interrogation which moulded and was moulded by the epistemological matrix of shame, honour, and decency. Women's speech acts were judicialised as confessions which enabled the disciplinary tampering with the women's bodies. 7) Gender and personality, more than sexuality, or "criminality" defined the status of the convicted women in their village communities after the trials. 8) Relations between police training, sexuality, and decency have not been well researched in Finland. 9) Decriminalisation in 1971 did not mark the end of homophobic legal discourse, even though the 1999 reform of sexual crimes took the form of gender neutral conceptualisation