922 resultados para Traffic law enforcement
Resumo:
Individual cues to deception are subtle and often missed by lay people and law enforcement alike. Linguistic statement analysis remains a potentially useful way of overcoming individual diagnostic limitations (e.g. Criteria based Content Analysis; Steller & Köhnken, 1989; Reality monitoring; Johnson & Raye, 1981; Scientific Content Analysis; Sapir, 1996). Unfortunately many of these procedures are time-consuming, require in-depth training, as well as lack empirical support and/or external validity. The current dissertation develops a novel approach to statement veracity analysis that is simple to learn, easy to administer, theoretically sound, and empirically validated. ^ Two strategies were proposed for detecting differences between liars' and truth-tellers' statements. Liars were hypothesized to strategically write statements with the goal of self-exoneration. Liars' statements were predicted to contain more first person pronouns and fewer third person pronouns. Truth-tellers were hypothesized to be motivated toward being informative and thus produce statements with fewer first person pronouns and more third person pronouns. Three studies were conducted to test this hypothesis. The first study explored the verbal patterns of exoneration and informativeness focused statements. The second study used a traditional theft paradigm to examine these verbal patterns in guilty liars and innocent truth tellers. In the third study to better match the context of a criminal investigation a cheating paradigm was used in which spontaneous lying was induced and written statements were taken. Support for the first person pronoun hypothesis was found. Limited support was found for the third person pronoun hypothesis. Results, implications, and future directions for the current research are discussed.^
Resumo:
Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.
Resumo:
Gunshot residue (GSR) is the term used to describe the particles originating from different parts of the firearm and ammunition during the discharge. A fast and practical field tool to detect the presence of GSR can assist law enforcement in the accurate identification of subjects. A novel field sampling device is presented for the first time for the fast detection and quantitation of volatile organic compounds (VOCs). The capillary microextraction of volatiles (CMV) is a headspace sampling technique that provides fast results (< 2 min. sampling time) and is reported as a versatile and high-efficiency sampling tool. The CMV device can be coupled to a Gas Chromatography-Mass Spectrometry (GC-MS) instrument by installation of a thermal separation probe in the injection port of the GC. An analytical method using the CMV device was developed for the detection of 17 compounds commonly found in polluted environments. The acceptability of the CMV as a field sampling method for the detection of VOCs is demonstrated by following the criteria established by the Environmental Protection Agency (EPA) compendium method TO-17. The CMV device was used, for the first time, for the detection of VOCs on swabs from the hands of shooters, and non-shooters and spent cartridges from different types of ammunition (i.e., pistol, rifle, and shotgun). The proposed method consists in the headspace extraction of VOCs in smokeless powders present in the propellant of ammunition. The sensitivity of this method was demonstrated with method detection limits (MDLs) 4-26 ng for diphenylamine (DPA), nitroglycerine (NG), 2,4-dinitrotoluene (2,4-DNT), and ethyl centralite (EC). In addition, a fast method was developed for the detection of the inorganic components (i.e., Ba, Pb, and Sb) characteristic of GSR presence by Laser Induced Breakdown Spectroscopy (LIBS). Advantages of LIBS include fast analysis (~ 12 seconds per sample) and good sensitivity, with expected MDLs in the range of 0.1-20 ng for target elements. Statistical analysis of the results using both techniques was performed to determine any correlation between the variables analyzed. This work demonstrates that the information collected from the analysis of organic components has the potential to improve the detection of GSR.
Resumo:
Ce mémoire explore le vécu et la construction de l’expérience de jeunes racisés ayant reçu des constats d’infraction dans le cadre de leur occupation de l’espace public montréalais. Il s’agit spécifiquement d’appréhender, à partir de la sociologie de l’expérience de Dubet (1994), le profil et les conditions de vie, la présence dans l’espace public, les raisons et la nature des constats d’infraction, les stratégies mises en œuvre face au profilage racial ainsi que les conséquences du profilage racial sur les jeunes racisés. Se situant dans une perspective qualitative, la méthodologie de recherche a reposé sur le recueil de dix entrevues semi-dirigées, soit neuf jeunes hommes et une jeune fille entre 18 et 30 ans ayant eu des contacts avec la police dans le cadre du contrôle de l’espace public à Montréal. Basée essentiellement sur l’approche mixte de Miles et Huberman (2003), l’analyse du corpus a permis de rendre compte de l’hétérogénéité de l’expérience des jeunes racisés et profilés interrogés et de dégager deux types d’expérience de profilage racial : les contestataires et les résignés. Si les interactions avec les forces de l’ordre engendrent des traitements perçus comme discriminatoires, l’expérience se construit en fonction de la nature des interactions, du niveau de maturité et de la tranche d’âge des jeunes et elle se décline en une logique de soumission et une logique de lutte pour la contestation des constats d’infraction. Les résultats de la recherche démontrent par ailleurs la pertinence de l’accompagnement du jeune au niveau de la prise de conscience de ses droits et de la contestation des tickets reçus.
Resumo:
The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.
Resumo:
Knowledge-Based Management Systems enable new ways to process and analyse knowledge to gain better insights to solve a problem and aid in decision making. In the police force such systems provide a solution for enhancing operations and improving client administration in terms of knowledge management. The main objectives of every police officer is to ensure the security of life and property, promote lawfulness, and avert and distinguish wrongdoing. The administration of knowledge and information is an essential part of policing, and the police ought to be proactive in directing both explicit and implicit knowledge, whilst adding to their abilities in knowledge sharing. In this paper the potential for a knowledge based system for the Mauritius police was analysed, and recommendations were also made, based on requirements captured from interviews with several long standing officers, and surveying of previous works in the area.
Resumo:
There is much more to the work of the courts than the occasional high-profile case that attracts public attention. The bulk of our work involves everyday problems that affect ordinary Iowans.
Resumo:
The Crime Victim Assistance Division (CVAD) was created by the Iowa General Assembly and founded by Attorney General Tom Miller in July 1989. In 1989, the Division administered two programs with six staff. Today, CVAD administers eight programs with 24 staff. This is the annual report for SFY2014.
Resumo:
We are pleased to present this report of our work and accomplishments on behalf of crime victims and survivors. The eight programs of the CVAD served over 225,000 Iowa crime victims over SFY11, SFY12 & SFY13. This report statistically outlines the services being provided in each of these individual programs. CVAD Staff and funded victim service providers work day in and day out to provide essential, victim-centered services to those who have been harmed by violent crime. This report aims to capture the work being performed around the State of Iowa with CVAD funds. Significant accomplishments have occurred during this reporting period, including the initial planning phases of a restructuring of domestic violence, sexual assault, shelter-based and homicide survivor programming and services; enhancements in automated victim notification and continued strides in restitution collection.
Resumo:
This study followed four cohorts of youth in an effort to determine the impact of waiving youth from the juvenile courts to the adult justice system. The four cohorts included a group of youth who were automatically processed in the adult system due to the severity of the charges against them, a group waived to the adult system after starting in the juvenile court, a group returned to the juvenile court after having initially been waived to the adult system, and a group of “youthful offenders” who started supervision in the juvenile court with the option of moving into the adult system upon reaching age 18.
Resumo:
Information on registering as a victim, what to expects and outcomes from hearings and requirements.
Resumo:
This report attempts to examine a very narrow, yet vital, segment of the criminal justice process, racial disproportionality among juvenile arrest and offense rates. The purpose of this report was to demonstrate the utility of South Carolina's incident based crime data, the South Carolina Incident Based Reporting System, as an analytical tool to address matters of policy relevance.
Resumo:
The South Carolina State Law Enforcement Division publishes Crime in South Carolina, an annual report that provides general information about crime trends, provides crime data at the county level for the most recent year available, compares national and state crime trends and provides descriptive information about crime.
Resumo:
The South Carolina State Law Enforcement Division publishes Crime in South Carolina, an annual report that provides general information about crime trends, provides crime data at the county level for the most recent year available, compares national and state crime trends and provides descriptive information about crime.
Resumo:
The South Carolina State Law Enforcement Division (SLED) reports to the Office of State Budget its annual accountability report that includes an executive summary, a description of the leadership system, customer focus and satisfaction and other performance criteria, mission, and program descriptions and budgets.