86 resultados para Terrorists


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nexus between terrorism and organised crime consists in a strategic alliance between two non-state actors, able to exploit illegal markets, threaten the security of individuals, and influence policy-making on a global level. Recent Europol reports have pointed towards the importance of studying the links between organised crime and terrorist groups, and have underlined that the nature and extent of these connections have seldom been addressed from an academic perspective. Considering the degree of dangerousness that both organised crime and terrorism currently represent in the world, the collusion between these two phenomena is of urgent contemporary interest. Basing itself on geographical case-studies, this edited volume aims at contributing to the existing literature in three ways: by enriching the empirical knowledge on the nature of the crime-terror nexus and its evolution; by exploring the impact of the nexus within different economic, political and societal contexts; and by expanding on its theoretical conceptualization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The attempts at carrying out terrorist attacks have become more prevalent. As a result, an increasing number of countries have become particularly vigilant against the means by which terrorists raise funds to finance their draconian acts against human life and property. Among the many counter-terrorism agencies in operation, governments have set up financial intelligence units (FIUs) within their borders for the purpose of tracking down terrorists’ funds. By investigating reported suspicious transactions, FIUs attempt to weed out financial criminals who use these illegal funds to finance terrorist activity. The prominent role played by FIUs means that their performance is always under the spotlight. By interviewing experts and conducting surveys of those associated with the fight against financial crime, this study investigated perceptions of FIU performance on a comparative basis between American and non-American FIUs. The target group of experts included financial institution personnel, civilian agents, law enforcement personnel, academicians, and consultants. Questions for the interview and surveys were based on the Kaplan and Norton’s Balanced Scorecard (BSC) methodology. One of the objectives of this study was to help determine the suitability of the BSC to this arena. While FIUs in this study have concentrated on performance by measuring outputs such as the number of suspicious transaction reports investigated, this study calls for a focus on outcomes involving all the parties responsible for financial criminal investigations. It is only through such an integrated approach that these various entities will be able to improve performance in solving financial crime. Experts in financial intelligence strongly believed that the quality and timeliness of intelligence was more important than keeping track of the number of suspicious transaction reports. Finally, this study concluded that the BSC could be appropriately applied to the arena of financial crime prevention even though the emphasis is markedly different from that in the private sector. While priority in the private sector is given to financial outcomes, in this arena employee growth and internal processes were perceived as most important in achieving a satisfactory outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing instrumental techniques must be adaptable to the analysis of novel explosives if science is to keep up with the practices of terrorists and criminals. The focus of this work has been the development of analytical techniques for the analysis of two types of novel explosives: ascorbic acid-based propellants, and improvised mixtures of concentrated hydrogen peroxide/fuel. In recent years, the use of these explosives in improvised explosive devices (IEDs) has increased. It is therefore important to develop methods which permit the identification of the nature of the original explosive from post-blast residues. Ascorbic acid-based propellants are low explosives which employ an ascorbic acid fuel source with a nitrate/perchlorate oxidizer. A method which utilized ion chromatography with indirect photometric detection was optimized for the analysis of intact propellants. Post-burn and post-blast residues if these propellants were analyzed. It was determined that the ascorbic acid fuel and nitrate oxidizer could be detected in intact propellants, as well as in the post-burn and post-blast residues. Degradation products of the nitrate and perchlorate oxidizers were also detected. With a quadrupole time-of-flight mass spectrometer (QToFMS), exact mass measurements are possible. When an HPLC instrument is coupled to a QToFMS, the combination of retention time with accurate mass measurements, mass spectral fragmentation information, and isotopic abundance patterns allows for the unequivocal identification of a target analyte. An optimized HPLC-ESI-QToFMS method was applied to the analysis of ascorbic acid-based propellants. Exact mass measurements were collected for the fuel and oxidizer anions, and their degradation products. Ascorbic acid was detected in the intact samples and half of the propellants subjected to open burning; the intact fuel molecule was not detected in any of the post-blast residue. Two methods were optimized for the analysis of trace levels of hydrogen peroxide: HPLC with fluorescence detection (HPLC-FD), and HPLC with electrochemical detection (HPLC-ED). Both techniques were extremely selective for hydrogen peroxide. Both methods were applied to the analysis of post-blast debris from improvised mixtures of concentrated hydrogen peroxide/fuel; hydrogen peroxide was detected on variety of substrates. Hydrogen peroxide was detected in the post-blast residues of the improvised explosives TATP and HMTD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the wake of the “9-11” terrorists' attacks, the U.S. Government has turned to information technology (IT) to address a lack of information sharing among law enforcement agencies. This research determined if and how information-sharing technology helps law enforcement by examining the differences in perception of the value of IT between law enforcement officers who have access to automated regional information sharing and those who do not. It also examined the effect of potential intervening variables such as user characteristics, training, and experience, on the officers' evaluation of IT. The sample was limited to 588 officers from two sheriff's offices; one of them (the study group) uses information sharing technology, the other (the comparison group) does not. Triangulated methodologies included surveys, interviews, direct observation, and a review of agency records. Data analysis involved the following statistical methods: descriptive statistics, Chi-Square, factor analysis, principal component analysis, Cronbach's Alpha, Mann-Whitney tests, analysis of variance (ANOVA), and Scheffe' post hoc analysis. ^ Results indicated a significant difference between groups: the study group perceived information sharing technology as being a greater factor in solving crime and in increasing officer productivity. The study group was more satisfied with the data available to it. As to the number of arrests made, information sharing technology did not make a difference. Analysis of the potential intervening variables revealed several remarkable results. The presence of a strong performance management imperative (in the comparison sheriff's office) appeared to be a factor in case clearances and arrests, technology notwithstanding. As to the influence of user characteristics, level of education did not influence a user's satisfaction with technology, but user-satisfaction scores differed significantly among years of experience as a law enforcement officer and the amount of computer training, suggesting a significant but weak relationship. ^ Therefore, this study finds that information sharing technology assists law enforcement officers in doing their jobs. It also suggests that other variables such as computer training, experience, and management climate should be accounted for when assessing the impact of information technology. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing instrumental techniques must be adaptable to the analysis of novel explosives if science is to keep up with the practices of terrorists and criminals. The focus of this work has been the development of analytical techniques for the analysis of two types of novel explosives: ascorbic acid-based propellants, and improvised mixtures of concentrated hydrogen peroxide/fuel. In recent years, the use of these explosives in improvised explosive devices (IEDs) has increased. It is therefore important to develop methods which permit the identification of the nature of the original explosive from post-blast residues. Ascorbic acid-based propellants are low explosives which employ an ascorbic acid fuel source with a nitrate/perchlorate oxidizer. A method which utilized ion chromatography with indirect photometric detection was optimized for the analysis of intact propellants. Post-burn and post-blast residues if these propellants were analyzed. It was determined that the ascorbic acid fuel and nitrate oxidizer could be detected in intact propellants, as well as in the post-burn and post-blast residues. Degradation products of the nitrate and perchlorate oxidizers were also detected. With a quadrupole time-of-flight mass spectrometer (QToFMS), exact mass measurements are possible. When an HPLC instrument is coupled to a QToFMS, the combination of retention time with accurate mass measurements, mass spectral fragmentation information, and isotopic abundance patterns allows for the unequivocal identification of a target analyte. An optimized HPLC-ESI-QToFMS method was applied to the analysis of ascorbic acid-based propellants. Exact mass measurements were collected for the fuel and oxidizer anions, and their degradation products. Ascorbic acid was detected in the intact samples and half of the propellants subjected to open burning; the intact fuel molecule was not detected in any of the post-blast residue. Two methods were optimized for the analysis of trace levels of hydrogen peroxide: HPLC with fluorescence detection (HPLC-FD), and HPLC with electrochemical detection (HPLC-ED). Both techniques were extremely selective for hydrogen peroxide. Both methods were applied to the analysis of post-blast debris from improvised mixtures of concentrated hydrogen peroxide/fuel; hydrogen peroxide was detected on variety of substrates. Hydrogen peroxide was detected in the post-blast residues of the improvised explosives TATP and HMTD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation examines novels that use terrorism to allegorize the threatened position of the literary author in contemporary culture. Allegory is a term that has been differently understood over time, but which has consistently been used by writers to articulate and construct their roles as authors. In the novels I look at, the terrorist challenge to authorship results in multiple deployments of allegory, each differently illustrating the way that allegory is used and authorship constructed in the contemporary American novel. Don DeLillo’s Mao II (1991), first puts terrorists and authors in an oppositional pairing. The terrorist’s ability to traffic in spectacle is presented as indicative of the author’s fading importance in contemporary culture and it is one way that terrorism allegorizes threats to authorship. In Philip Roth’s Operation Shylock (1993), the allegorical pairing is between the text of the novel and outside texts – newspaper reports, legal cases, etc. – that the novel references and adapts in order to bolster its own narrative authority. Richard Powers’s Plowing the Dark (1999) pairs the story of an imprisoned hostage, craving a single book, with employees of a tech firm who are creating interactive, virtual reality artworks. Focusing on the reader’s experience, Powers’s novel posits a form of authorship that the reader can take into consideration, but which does not seek to control the experience of the text. Finally, I look at two of Paul Auster’s twenty-first century novels, Travels in the Scriptorium (2007) and Man in the Dark (2008), to suggest that the relationship between representations of authors and terrorists changed after 9/11. Auster’s author-figures forward an ethics of authorship whereby novels can use narrative to buffer readers against the portrayal of violent acts in a culture that is suffused with traumatizing imagery.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O presente Trabalho de Investigação Aplicada procura perceber qual a origem, os fatores que permitiram crescer e quais as principais técnicas táticas e procedimentos adotadas pelo Estado Islâmico, um grupo fundamentalista islâmico, que até ao verão de 2014, era relativamente desconhecido. Foi nesta altura, que este lançou uma série campanhas bem-sucedidas, conquistando vastas áreas de território na Síria e no Iraque, apanhando a comunidade internacional de surpresa. Para além de identificar as principais táticas adotadas por este grupo, este trabalho propõe ainda uma série de medidas que devem ser tomadas para o combater, tendo por base principalmente a doutrina de contrainsurgência estadunidense. A pergunta inerente à problemática estudada é então “Como se combatem as principais táticas, técnicas e procedimentos adotadas pelo Estado Islâmico?” Para responder a esta questão o trabalho recorreu a uma abordagem metodológica hipotético-dedutiva, pelo método da análise documental. Foi utilizada principalmente a técnica de recolha de dados a partir de dados documentais preexistentes. Concluiu-se que o Estado Islâmico utiliza um vasto leque de táticas através da chamada Guerra Hibrida, que inclui táticas convencionais, de guerrilha e terroristas, combinadas entre si. Verificou-se ainda que o nível tático não é suficiente para derrotar este grupo, sendo para tal necessária uma abordagem holística.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hasta hace casi una década, la guerra contra el terrorismo fue una lucha solitaria de los Estados. Actualmente y debido a las implicaciones globales de este fenómeno, las acciones contra este flagelo han adquirido connotación internacional. Gran parte de los países miembros de las Naciones Unidas han acogido esta guerra –contra un enemigo común, pero indefinido- como un compromiso político en favor de la paz y seguridad internacional. La producción constante de instrumentos internacionales que condenan el terrorismo y que exigen tomar medidas para combatirlo, demuestran que esa intención política originaria se ha decantado en el ordenamiento internacional como una obligación autónoma, de carácter consuetudinario; que hace que actualmente no haya país en el mundo que pueda excusarse de combatir al terrorismo (interno o transnacional) independientemente de las justificaciones que se puedan aludir para el no cumplimiento.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El interés de esta disertación es otorgar una respuesta a la fenomenología del Lobo Solitario, que se alza como amenaza frente a los Estados, y es necesaria su correcta comprensión para poder contrarrestar sus efectos sobre la sociedad. De esta manera, se propone un debate entre los conceptos de terrorismo expuesto por un lado por Bruce Hoffman, y por el otro por Luis de la Corte Ibáñez, quienes aportarán herramientas de análisis para lograr entender la fenomenología. Para terminar proponiendo la teoría de redes, expuesta por Arquilla y Ronfeldt y Charles Perrow, como mecanismo de solución a la brecha conceptual existente, definiendo a los lobos solitarios a nivel operacional como nodos sin red, y a nivel de adoctrinamiento como redes de débil acople.