912 resultados para Federal aid to law enforcement agencies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Instituto de Geociências, 2015.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security networks are increasing in number and in importance across the security field as a means of providing inter-agency coordination. On the basis of a detailed qualitative study of networks in the field of national security in Australia, this article aims to advance our knowledge of the internal properties of security networks and conditions shaping their performance. It places ‘cooperation’, ‘coordination’ and ‘collaboration’ on a continuum, with cooperation at one end and collaboration at the other end, and aims to illustrate how each of these ‘Cs’ shape the performance of security networks. The central argument is that the performance of security networks increases as the network moves from cooperation to collaboration. Drawing on interviews with senior members of security, law enforcement and intelligence agencies, the article aims to highlight the lessons for how to strategically manage security networks in ways that promote collaboration.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Knowledge-Based Management Systems enable new ways to process and analyse knowledge to gain better insights to solve a problem and aid in decision making. In the police force such systems provide a solution for enhancing operations and improving client administration in terms of knowledge management. The main objectives of every police officer is to ensure the security of life and property, promote lawfulness, and avert and distinguish wrongdoing. The administration of knowledge and information is an essential part of policing, and the police ought to be proactive in directing both explicit and implicit knowledge, whilst adding to their abilities in knowledge sharing. In this paper the potential for a knowledge based system for the Mauritius police was analysed, and recommendations were also made, based on requirements captured from interviews with several long standing officers, and surveying of previous works in the area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This edited collection brings together leading scholars to comparatively investigate national security, surveillance and terror in the early 21st century in two major western jurisdictions, Canada and Australia. Observing that much debate about these topics is dominated by US and UK perspectives, the volume provides penetrating analysis of national security and surveillance practices in two under-studied countries that reveals critical insights into current trends. Written by a wide range of experts in their respective fields, this book addresses a fascinating array of timely questions about the relationship among national security, privacy and terror in the two countries and beyond. Chapters include critical assessments of topics such as: National Security Intelligence Collection since 9/11, The Border as Checkpoint in an Age of Hemispheric Security and Surveillance, Unmanned Aerial Vehicles and Law Enforcement, as well as Federal Government Departments and Security Regimes. An engaging and empirically driven study, this collection will be of great interest to scholars of security and surveillance studies, policing, and comparative criminology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study followed four cohorts of youth in an effort to determine the impact of waiving youth from the juvenile courts to the adult justice system. The four cohorts included a group of youth who were automatically processed in the adult system due to the severity of the charges against them, a group waived to the adult system after starting in the juvenile court, a group returned to the juvenile court after having initially been waived to the adult system, and a group of “youthful offenders” who started supervision in the juvenile court with the option of moving into the adult system upon reaching age 18.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The SIG identifies Executive Branch employee fraud through mandatory reporting by each agency; law enforcement reporting; agencies’ annual reports to the Office of the Comptroller General; and open source reporting. In FY 2015-2016, the SIG received twelve notifications of fraud involving 18 Executive Branch employees at ten statewide agencies, which resulted in estimated losses of $1,188,529. This indicates a low risk of employee fraud in the Executive Branch given its $26 billion budget and 60,000 employees.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Con el inicio del periodo Post-Guerra Fría el Sistema Internacional comienza a experimentar un incremento en el fortalecimiento de su componente social; la Sociedad de Estados alcanza un mayor nivel de homogenización, el estado, unidad predominante de esta, comienzan atravesar una serie de transformaciones que obedecerán a una serie de cambios y continuidades respecto al periodo anterior. Desde la perspectiva del Realismo Subalterno de las Relaciones Internacionales se destacan el proceso de construcción de estado e inserción al sistema como las variables que determinan el sentimiento de inseguridad experimentado por las elites estatales del Tercer Mundo; procesos que en el contexto de un nuevo y turbulento periodo en el sistema, tomara algunas características particulares que darán un sentido especifico al sentimiento de inseguridad y las acciones a través de las cuales las elites buscan disminuirlo. La dimensión externa del sentimiento de inseguridad, el nuevo papel que toma la resistencia popular como factor determinante del sentimiento de inseguridad y de la cooperación, así como del conflicto, entre los miembros de la Sociedad Internacional, la inserción como promotor de estrategias de construcción de Estado, son alguno de los temas puntuales, que desde la perspectiva subalterna, parecen salir a flote tras el análisis del sistema en lo que se ha considerado como el periodo Post-Guerra Fría. En este sentido Yemen, se muestra como un caso adecuado no solo para poner a prueba las postulados de la teoría subalterna, veinte años después de su obra más prominente (The third world security Predicament), escrita por M. Ayoob, sino como un caso pertinente que permite acercarse más a la comprensión del papel del Tercer Mundo al interior de la Sociedad Internacional de Estados.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Street racing and associated (hooning) behaviours have attracted increasing concern in recent years. While New Zealand and all Australian jurisdictions have introduced “antihooning” legislation and allocated significant police resources to managing the problem, there is limited evidence of the road safety implications of hooning. However, international and Australian data suggests that drivers charged with a hooning offence tend to be young males who are accompanied by one or more peers, and hooning-related crashes tend to occur at night. In this regard, there is considerable evidence that drivers under the age of 25 are over-represented in crash statistics, and are particularly vulnerable soon after obtaining a Provisional licence, when driving at night, and when carrying peer-aged passengers. The similarity between the nature of hooning offenders, offences and crashes, and road safety risks for young drivers in general, suggests that hooning is an issue that may be viewed as part of the broader young driver problem. Many jurisdictions have recently implemented a range of evidence-based strategies to address young driver road safety, and this paper will present Queensland crash and offence data to highlight the potential benefit of Graduated Driver Licensing initiatives, such as night driving restrictions and peer-aged passenger restrictions, to related road safety issues, including hooning. An understanding of potential flow-on effects is important for evaluations of anti-hooning legislation and Graduated Driver Licensing programs, and may have implications for future law enforcement resource allocation and policy development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Traffic law enforcement is based on deterrence principles, whereby drivers control their behaviour in order to avoid an undesirable sanction. For “hooning”-related driving behaviours in Queensland, the driver’s vehicle can be impounded for 48 hours, 3 months, or permanently depending on the number of previous hooning offences. It is assumed that the threat of losing something of value, their vehicle, will discourage drivers from hooning. While official data shows that the rate of repeat offending is low, an in-depth understanding of the deterrent effects of these laws should involve qualitative research with targeted drivers. A sample of 22 drivers who reported engaging in hooning behaviours participated in focus group discussions about the vehicle impoundment laws as applied to hooning offences in Queensland. The findings suggested that deterrence theory alone cannot fully explain hooning behaviour, as participants reported hooning frequently, and intended to continue doing so, despite reporting that it is likely that they will be caught, and perceiving the vehicle impoundment laws to be extremely severe. The punishment avoidance aspect of deterrence theory appears important, as well as factors over and above legal issues, particularly social influences. A concerning finding was drivers’ willingness to flee from police in order to avoid losing their vehicle permanently for a third offence, despite acknowledging risks to their own safety and that of others. This paper discusses the study findings in terms of the implications for future research directions, enforcement practices and policy development for hooning and other traffic offences for which vehicle impoundment is applied.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper investigates the role of social capital on the reduction of short and long run negative health effects associated with stress, as well as indicators of burnout among police officers. Despite the large volume of research on either social capital or the health effects of stress, the interaction of these factors remains an underexplored topic. In this empirical analysis we aim to reduce such a shortcoming focusing on a highly stressful and emotionally draining work environment, namely law enforcement agents who perform as an essential part of maintaining modern society. Using a multivariate regression analysis focusing on three different proxies of health and three proxies for social capital conducting also several robustness checks, we find strong evidence that increased levels of social capital is highly correlated with better health outcomes. Additionally we observe that while social capital at work is very important, social capital in the home environment and work-life balance are even more important. From a policy perspective, our findings suggest that work and stress programs should actively encourage employees to build stronger social networks as well as incorporate better working/home life arrangements.