819 resultados para Crime and criminals
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
Justice systems around the world are increasingly turning to videoconferencing as a means to reduce delays and reduce costs in legal processes. This preliminary research examined whether interviewing a witness remotely - without physical co-presence of the witness and interviewer - could facilitate the production of quality facial composite sketches of suspects. In Study 1, 42 adults briefly viewed a photograph of a face. The next day they participated in Cognitive Interviews with a forensic artist, conducted either face-to-face or remotely via videoconference. In Study 2, 20 adults participated in videoconferenced interviews, and we manipulated the method by which they viewed the developing sketch. In both studies, independent groups of volunteers rated the likeness of the composites to the original photographs. The data suggest that remote interviews elicited effective composites; however, in Study 1 these composites were considered poorer matches to the photographs than were those produced in face-to-face interviews. The differences were small, but significant. Participants perceived several disadvantages to remote interviewing, but also several advantages including less pressure and better concentration. The results of Study 2 suggested that different sketch presentation methods offered different benefits. We propose that remote interviewing could be a useful tool for investigators in certain circumstances. © 2013 Taylor & Francis.
Resumo:
Witnesses often experience lengthy delays prior to being interviewed, during which their memories inevitably decay. Video-communication technology - favored by intergovernmental organizations for playing larger roles in judicial processes - might circumvent some of the resourcing problems that can exacerbate such delays. However, whereas video-mediation might facilitate expeditious interviewing, it might also harm rapport-building, make witnesses uncomfortable, and thereby undermine the quality and detail of their reports. Participants viewed a crime film and were interviewed either one day later via video-link, one day later face-to-face, or 1-2 weeks later face-to-face. Video-mediation neither influenced the detail or the accuracy of participants' reports, nor their ratings of the quality of the interviews. However, participants who underwent video-mediated interviews after a short delay gave more accurate, detailed reports than participants who waited longer to be interviewed face-to-face. This study provides initial empirical evidence that video-mediated communication (VMC) could facilitate the expeditious conduct of high-quality investigative interviews. © 2013 © 2013 Taylor & Francis.
Resumo:
Sex work is a subject of significant contestation across academic disciplines, as well as within legal, medical, moral, feminist, political and socio-cultural discourses. A large body of research exists, but much of this focuses on the sale of sex by women to men and ignores other performances, practices, meanings and embodiments in the contemporary sex industry. A queer agenda is important in order to challenge hetero-centric gender norms and to develop new insights into how gender, sex, power, crime, work, migration, space/place, health and intimacy are understood in the context of commercial sexual encounters. Queer Sex Work explores what it might mean to 'be', 'do' and 'think' queer(ly) in the study and practice of commercial sex. It brings together a multiplicity of empirical case studies - including erotic dance venues, online sex working, pornography, grey sexual economies, and BSDM - and offers a variety of perspectives from academic scholars, policy practitioners, activists and sex workers themselves. In so doing, the book advances a queer politics of sex work that aims to disrupt heteronormative logics whilst also making space for different voices in academic and political debates about commercial sex. This unique and multidisciplinary volume will be indispensable for scholars and students of the global sex trade and of gender, sexuality, feminism and queer theory more broadly, as well as policymakers, activists and practitioners interested in the politics and practice of sex work in local, national and international contexts.
Resumo:
This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.
Resumo:
Existing instrumental techniques must be adaptable to the analysis of novel explosives if science is to keep up with the practices of terrorists and criminals. The focus of this work has been the development of analytical techniques for the analysis of two types of novel explosives: ascorbic acid-based propellants, and improvised mixtures of concentrated hydrogen peroxide/fuel. In recent years, the use of these explosives in improvised explosive devices (IEDs) has increased. It is therefore important to develop methods which permit the identification of the nature of the original explosive from post-blast residues. Ascorbic acid-based propellants are low explosives which employ an ascorbic acid fuel source with a nitrate/perchlorate oxidizer. A method which utilized ion chromatography with indirect photometric detection was optimized for the analysis of intact propellants. Post-burn and post-blast residues if these propellants were analyzed. It was determined that the ascorbic acid fuel and nitrate oxidizer could be detected in intact propellants, as well as in the post-burn and post-blast residues. Degradation products of the nitrate and perchlorate oxidizers were also detected. With a quadrupole time-of-flight mass spectrometer (QToFMS), exact mass measurements are possible. When an HPLC instrument is coupled to a QToFMS, the combination of retention time with accurate mass measurements, mass spectral fragmentation information, and isotopic abundance patterns allows for the unequivocal identification of a target analyte. An optimized HPLC-ESI-QToFMS method was applied to the analysis of ascorbic acid-based propellants. Exact mass measurements were collected for the fuel and oxidizer anions, and their degradation products. Ascorbic acid was detected in the intact samples and half of the propellants subjected to open burning; the intact fuel molecule was not detected in any of the post-blast residue. Two methods were optimized for the analysis of trace levels of hydrogen peroxide: HPLC with fluorescence detection (HPLC-FD), and HPLC with electrochemical detection (HPLC-ED). Both techniques were extremely selective for hydrogen peroxide. Both methods were applied to the analysis of post-blast debris from improvised mixtures of concentrated hydrogen peroxide/fuel; hydrogen peroxide was detected on variety of substrates. Hydrogen peroxide was detected in the post-blast residues of the improvised explosives TATP and HMTD.
Resumo:
Brazilians greeted the long-awaited decision of making Rio de Janeiro the host of the 2016 Olympic Games with tremendous exhilaration. Although Rio’s fantastic natural beauty certainly added to its attraction in hosting the games, its alarming rates of urban crime and violence largely associated with drug trafficking immediately triggered worldwide criticism, and put at issue its ability to guarantee the security for the games. Brazilians have been vying for a position as an emerging global economy and understand the importance of the Games for international prestige. This makes the stakes very high when hosting the Olympic Games in the wake of the 2014 Soccer World Cup, which will also be held in Brazil. This paper explores these criticisms and assesses Rio’s ability to prepare for this important event. The paper further explores the consensus that Brazilians will be more equipped to address actions taken by organized crime capable of affecting the Olympic Games than to face a terrorist attack. Brazil – and Rio – does not figure in the “terrorism map” as a region particularly linked to terrorism. Aside from uncorroborated suspicions of activities by terrorist organizations on the Tri-Border region (Argentina, Brazil, and Paraguay), Brazil does not elicit many concerns regarding terrorism.1 Yet, there is no way to guarantee that terrorist organizations will not try to make use of the 2016 Rio Olympic Games to advance their agenda. This being in mind, Rio and Brazil in general face a long road ahead to prepare, prevent, protect and respond to a possible terrorist attack during the 2016 Olympics. It is clear that prevention and preparation towards potential threats to the Games must necessarily include cooperation and exchange of best practices with other countries. 1 U.S. Department of State has confirmed that this area may have been used to transport weapons and conduct financial affairs in the past. This type of activity has been made more difficult with the fortification of border controls in more recent times.
Resumo:
Faced with the violence, criminality and insecurity now threatening peace and democratic governance in Central America, the region’s governments have decided to use the Armed Forces to carry out actions in response to criminal actions, looking to improve their performance. Although public demand for including the Armed Forces in these functions takes place within a legally legitimate framework, it is motivated by tangible circumstances such as increased levels of violence, delinquency and crime. Despite being coupled with the perception of institutional weakness within the security and judicial system (particularly police) and the recognition of prestige, efficiency, discipline and severity in fulfilling the Armed Forces’ missions, these arguments are insufficient to legitimize the use of the military as a police force. Within this context, this paper reflects on the implications or consequences of the use of the Armed Forces in duties traditionally assigned to the police in the Central American region with the goal of contributing to the debate on this topic taking place in the Americas. To achieve this end, first we will focus on understanding the actual context in which a decision is made to involve the Armed Forces in security duties in the region. Second, we will examine the effects and implications of this decision on the Armed Forces’ relations within their respective societies. Third and finally, considering this is already a reality in the region, this paper will provide recommendations. The main findings of this research, resulting from the application of an analyticaldescriptive and historically based study, are organized in three dimensions: the political dimension, by implication referring to the relationship between the ultimate political authority and the Armed Forces; the social dimension, by implication the opinion of citizens; and other implications not only affecting the structural and cultural organization of armies and police but also the complementary operational framework within a context of comprehensive response by the State. As a main conclusion, it poses there is an environment conducive to the use of the Armed Forces in citizen’s security, in view of the impact of threats provoked by criminal structures of a military nature currently operating in Central America. However, this participation creates an inevitable social and political impact if implemented in isolation or given a political leading role and/or operational autonomy. This participation poses risks to the institutions of the Armed Forces and the police as well. Finally, this paper identifies an urgent need for the Armed Forces’ role to be more clearly defined with regard to security matters, limiting it to threats that impact States’ governability and existence. Nonetheless, Central American States should seek a COMPREHENSIVE response to current crime and violence, using all necessary institutions to confront these challenges, but with defined roles and responsibilities for each and dynamic coordination to complement their actions.
Resumo:
The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.
Resumo:
Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.
Resumo:
In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^
Resumo:
Existing instrumental techniques must be adaptable to the analysis of novel explosives if science is to keep up with the practices of terrorists and criminals. The focus of this work has been the development of analytical techniques for the analysis of two types of novel explosives: ascorbic acid-based propellants, and improvised mixtures of concentrated hydrogen peroxide/fuel. In recent years, the use of these explosives in improvised explosive devices (IEDs) has increased. It is therefore important to develop methods which permit the identification of the nature of the original explosive from post-blast residues. Ascorbic acid-based propellants are low explosives which employ an ascorbic acid fuel source with a nitrate/perchlorate oxidizer. A method which utilized ion chromatography with indirect photometric detection was optimized for the analysis of intact propellants. Post-burn and post-blast residues if these propellants were analyzed. It was determined that the ascorbic acid fuel and nitrate oxidizer could be detected in intact propellants, as well as in the post-burn and post-blast residues. Degradation products of the nitrate and perchlorate oxidizers were also detected. With a quadrupole time-of-flight mass spectrometer (QToFMS), exact mass measurements are possible. When an HPLC instrument is coupled to a QToFMS, the combination of retention time with accurate mass measurements, mass spectral fragmentation information, and isotopic abundance patterns allows for the unequivocal identification of a target analyte. An optimized HPLC-ESI-QToFMS method was applied to the analysis of ascorbic acid-based propellants. Exact mass measurements were collected for the fuel and oxidizer anions, and their degradation products. Ascorbic acid was detected in the intact samples and half of the propellants subjected to open burning; the intact fuel molecule was not detected in any of the post-blast residue. Two methods were optimized for the analysis of trace levels of hydrogen peroxide: HPLC with fluorescence detection (HPLC-FD), and HPLC with electrochemical detection (HPLC-ED). Both techniques were extremely selective for hydrogen peroxide. Both methods were applied to the analysis of post-blast debris from improvised mixtures of concentrated hydrogen peroxide/fuel; hydrogen peroxide was detected on variety of substrates. Hydrogen peroxide was detected in the post-blast residues of the improvised explosives TATP and HMTD.
Resumo:
The Brazilian prison system is going through a serious crisis, not only due to the growth in the number of prisoners and the consequent overcrowding of prisons, but also for the violation of human rights, institutionalization and difficulty in social rehabilitation of inmates. Furthermore, the harmful effects of the prison system affect their workers, who generally are not prioritized by researchers, health programs and government policies. The literature pointing to some consequences of work in prison, among them, the mental illness, stress, alcohol abuse, etc., but little is known about this profession, their problems, the difficulties of their work routine, so as subjective processes involved. So, what are the effects of this work in the prison in the lives of correctional officers? What strategies developed to address the work in prison? This research aims to analyze the effects of this work in the prison in the lives of correctional officers from the state prison in Parnamirim, located in the metropolitan region of Natal-RN. Within the theoretical and methodological perspective of institutional analysis and cartography were carried conversation circles, interviews, in addition to participant observation of the correctional officers work’s routine. The results point to a working routine marked by the performance of procedures that involve risk to the worker, generating situations of tension and stress. Besides, the culture of violence (which is implemented in jail everyday) as well as the training and initial learning of the profession, are responsible for the militarization process of the subjectivities of the correctional officers, producing hard subject, disciplined, stiff, likely to violent practices and other rights violations. Other mapped effects relate to the acquisition of knowledge about the human (“psy” knowledge) responsible for forging the conception of the criminal as "dangerous subject", which, in turn, acts as subjectivity vector in the daily life of prison guards by setting up a way of life crossed by fear and insecurity outside the work environment. Produces a control in the open about their lives and their families, limiting them with regard to family and community life and the realization of leisure activities in public spaces. In this sense, it appears that the arrest acts producing “bad meetings” (from Espinosa's perspective), once it produces sad affections responsible for weakening the conatus, limiting the possibilities of action of these subjects. Although agents develop some strategies to deal with the difficulties of working in prison (among which stand out the development of other professional or leisure activities, spirituality / religiosity and the ability to separate the labor moments from those of their the personal lives, is advocated that such strategies do not offer significant resistance, since they do not question the contemporary legal-criminal logic. The thesis presented supports the proposals of penal abolitionism to present other conceptions of crime and justice through the invention of other practical and conceptual strategies.
Resumo:
A dissertação preocupou-se em analisar as relações de bandidos e ex-bandidos com o pentecostalismo na Assembleia de Deus Fortificada em Cristo (ADFEC), situada na favela Jardim São Jorge, periferia da Cidade Ademar, região Sul da capital de São Paulo. Interessou-nos compreender as interações desses agentes e de qual maneira a igreja desempenhou seu trabalho em um espaço pentecostal. A pesquisa, teve como objetivo fundamental, examinar as aproximações da criminalidade e o pentecostalismo indicando suas rupturas e características peculiares. O trabalho de campo se dedicou em coletar dados que comprovassem atuação da ADFEC juntos aos agentes do crime, e em que medida a filiação religiosa dos agentes ganhava importância. Por fim, buscamos refletir sobre a adesão de bandidos e ex-bandidos ao pentecostalismo e a influência dessa adesão no cotidiano da comunidade.