980 resultados para Criminal activity
Resumo:
"Serial no. 146."
Resumo:
Cover title.
Resumo:
Chapter 1 RAE2008
Resumo:
The identification of criminal networks is not a routine exploratory process within the current practice of the law enforcement authorities; rather it is triggered by specific evidence of criminal activity being investigated. A network is identified when a criminal comes to notice and any associates who could also be potentially implicated would need to be identified if only to be eliminated from the enquiries as suspects or witnesses as well as to prevent and/or detect crime. However, an identified network may not be the one causing most harm in a given area.. This paper identifies a methodology to identify all of the criminal networks that are present within a Law Enforcement Area, and, prioritises those that are causing most harm to the community. Each crime is allocated a score based on its crime type and how recently the crime was committed; the network score, which can be used as decision support to help prioritise it for law enforcement purposes, is the sum of the individual crime scores.
Resumo:
In 1986 the then United States Secretary of State George Shultz asserted that: It is absurd to argue that international law prohibits us from capturing terrorists in international waters or airspace; from attacking them on the soil of other nations, even for the purpose of rescuing hostages; or from using force against states that support, train and harbor terrorists or guerrillas. At that time the United States’ claim of a right to use military force in self-defence against terrorism2 received little support from other states.3 The predominant view then was that terrorist attacks committed by private or non-state actors were a form of criminal activity to be combated through domestic and international criminal justice mechanisms. The notion that such terrorist acts should be treated as ‘armed attacks’ triggering a victim state’s right of self-defence was not accepted by the majority of states. To suggest, as Shultz had done, that a state not directly responsible for terrorist acts could have its territorial integrity violated by military action targeting terrorists located within that state, was a controversial proposition in 1986. However, some fifteen years later, when the United States and a coalition of allies launched a military campaign in Afghanistan following the 11 September 2001 (hereafter ‘9/11’) terrorist attacks, there was virtually unanimous international support for the use of force.
Resumo:
Given the serious nature of computer crime, and its global nature and implications, it is clear that there is a crucial need for a common understanding of such criminal activity internationally in order to deal with it effectively. Research into the extent to which legislation, international initiatives, and policy and procedures to combat and investigate computer crime are consistent globally is therefore of enormous importance. The challenge is to study, analyse, and compare the policies and practices of combating computer crime under different jurisdictions in order to identify the extent to which they are consistent with each other and with international guidelines; and the extent of their successes and limitations. The purpose ultimately is to identify areas where improvements are needed and what those improvements should be. This thesis examines approaches used for combating computer crime, including money laundering, in Australia, the UAE, the UK and the USA, four countries which represent a spectrum of economic development and culture. It does so in the context of the guidelines of international organizations such as the Council of Europe (CoE) and the Financial Action Task Force (FATF). In the case of the UAE, we examine also the cultural influences which differentiate it from the other three countries and which has necessarily been a factor in shaping its approaches for countering money laundering in particular. The thesis concludes that because of the transnational nature of computer crime there is a need internationally for further harmonisation of approaches for combating computer crime. The specific contributions of the thesis are as follows: „h Developing a new unified comprehensive taxonomy of computer crime based upon the dual characteristics of the role of the computer and the contextual nature of the crime „h Revealing differences in computer crime legislation in Australia, the UAE, the UK and the USA, and how they correspond to the CoE Convention on Cybercrime and identifying a new framework to develop harmonised computer crime or cybercrime legislation globally „h Identifying some important issues that continue to create problems for law enforcement agencies such as insufficient resources, coping internationally with computer crime legislation that differs between countries, having comprehensive documented procedures and guidelines for combating computer crime, and reporting and recording of computer crime offences as distinct from other forms of crime „h Completing the most comprehensive study currently available regarding the extent of money laundered in four such developed or fast developing countries „h Identifying that the UK and the USA are the most advanced with regard to anti-money laundering and combating the financing of terrorism (AML/CFT) systems among the four countries based on compliance with the FATF recommendations. In addition, the thesis has identified that local factors have affected how the UAE has implemented its financial and AML/CFT systems and reveals that such local and cultural factors should be taken into account when implementing or evaluating any country¡¦s AML/CFT system.
Resumo:
In New Zealand, 200,000 licensed shooters (5.5% of the population) own an estimated 1 million firearms, 9 times more guns per capita than in England and Wales and 20% more than in Australia. Based on a 3 year study of firearm theft in New Zealand, this paper concludes that insecure storage of lawfully held weapons by licensed owners poses a significant public health and safety risk. Furthermore, this paper concludes that the failure of the police to enforce New Zealand gun security laws, and the government's hesitancy to develop firearm education and regulation policies, exacerbates insecure firearm storage, a key factor in firearm-related theft, injury, suicide, violence and criminal activity.
Resumo:
Technological change, particularly the growth of the Internet and smart phones, has increased the visibility of male escorts, expanded their client base and diversified the range of venues in which male sex work can take place. Specifically, the Internet has relocated some forms of male sex work away from the street and thereby increased market reach, visibility and access and the scope of sex work advertising. Using the online profiles of 257 male sex workers drawn from six of the largest websites advertising male sexual services in Australia, the role of the Internet in facilitating the normalisation of male sex work is discussed. Specifically we examine how engagement with the sex industry has been reconstituted in term of better informed consumer-seller decisions for both clients and sex workers. Rather than being seen as a ‘deviant’ activity, understood in terms of pathology or criminal activity, male sex work is increasingly presented as an everyday commodity in the market place. In this context, the management of risks associated with sex work has shifted from formalised social control to more informal practices conducted among online communities of clients and sex workers. We discuss the implications for health, legal and welfare responses within an empowerment paradigm.
Resumo:
Outlaw Motorcycle Gangs are increasingly seen as a threat to communities around the world. They are a visible threat as a recognizable symbol of deviance and violence. This book discusses the social context within which Outlaw Motorcycle Gangs and groups have emerged and the implication of labelling these groups as deviant and outlaw. There is no doubt that members of these clubs have been involved in serious criminal activity and this book explores whether gang and organised crime theory can effectively explain their criminal activities. Importantly, the book also assesses policing and political responses to the clubs' activities. It argues that there is an increasing need for national and international cooperation on the part of law enforcement agencies with various levels of government as well as the private sector. Importantly, the book offers suggestions for the best responses to the crimes committed by members of Outlaw Motorcycle Gangs.
Resumo:
Barkre, M.; Mathijs, E.; Sexton, J.; Egan, K.; Hunter, R. and Selfe, M. (2007). Audiences and Receptions of Sexual Violence in Contemporary Cinema. London: British Board of Film Classification. RAE2008
Resumo:
Relying on Brown’s (2005a, b) thesis that contemporary shifts in penal policy are best understood as a reprisal of colonial rationality, so that offenders become ‘non-citizens’ or ‘agents of obligation’, this article argues that this framework finds support in developments in Irish criminal justice policy. Recent legislation aimed at offenders suspected of involvement in ‘organised crime’ is examined through this lens. These offenders have found themselves reconstituted as ‘agents of obligation’ with duties to furnish information about their property and movements, report to the police concerning their location and, importantly, refrain from criminal activity or face extraordinary sanctions. It is therefore argued that this paradigm is a useful heuristic device through which to understand recent developments in Irish criminal justice and elsewhere. In light of the trends observed in Ireland, certain refinements and extensions to Brown’s argument are put forward for consideration.
Resumo:
Fraud in the global food supply chain is becoming increasingly common due to the huge profits associated with this type of criminal activity. Food commodities and ingredients that are expensive and are part of complex supply chains are particularly vulnerable. Both herbs and spices fit these criteria perfectly and yet strategies to detect fraudulent adulteration are still far from robust. An FT-IR screening method coupled to data analysis using chemometrics and a second method using LC-HRMS were developed, with the latter detecting commonly used adulterants by biomarker identification. The two tier testing strategy was applied to 78 samples obtained from a variety of retail and on-line sources. There was 100% agreement between the two tests that over 24% of all samples tested had some form of adulterants present. The innovative strategy devised could potentially be used for testing the global supply chains for fraud in many different forms of herbs.
Resumo:
This study focuses on the engagement of children and youth in their communities and the ways they are included in and excluded from community life. Using a content analysis of a small town United States newspaper over a one-year period, examples of engagement were identified and classified into 12 categories: programs, clubs and special events; fundraising and community service; business and community support; participation in community events; school events; athletic and other performances; employment; involvement in local planning and decision making; serving as a community representative; visibility and recognition; criminal activity and accidents; and use of public space. Examples of community exclusion were identified as well. Young people were engaged primarily through activities that were adult-directed or supervised, or organized through schools, churches, and youth clubs. There was little involvement in local planning, decision making, or activism. Some evidence existed of peer teaching, leadership, and self-initiated activities, as well as intentional efforts by adults to give youth a greater voice in community activities. Implications include several ethical issues regarding the role of young people in community life, particularly young children, and the need for greater awareness on the part of communities of the contributions young people can make.
Resumo:
Le pouvoir de détenir une personne à des fins d'enquête n'est pas une technique d'investigation nouvelle et tire son origine du droit anglais. Mais cette méthode d'enquête, qui consiste à restreindre temporairement la liberté de mouvement d'une personne que l'on soupçonne pour des motifs raisonnables d'être impliquée dans une activité criminelle, ne fut reconnue officiellement au Canada qu'en juillet 2004 suite au jugement rendu par la Cour suprême dans l'affaire R. c. Mann. Au moment d'écrire ces lignes, cette stratégie d'enquête policière ne fait toujours pas l'objet d'une réglementation spécifique au Code criminel. L'approbation de cette technique d'enquête, en l'absence de toute forme de législation, ne s'est pas faite sans critiques de la part des auteurs et des commentateurs judiciaires qui y voient une intrusion dans un champ de compétences normalement réservé au Parlement. L'arrêt Mann laisse également en suspens une question cruciale qui se rapporte directement aux droits constitutionnels des citoyens faisant l'objet d'une détention semblable: il s'agit du droit d'avoir recours sans délai à l'assistance d'un avocat. Le présent travail se veut donc une étude approfondie du concept de la détention à des fins d'enquête en droit criminel canadien et de son impact sur les droits constitutionnels dont bénéficient les citoyens de notre pays. Pour accomplir cette tâche, l'auteur propose une analyse de la question en trois chapitres distincts. Dans le premier chapitre, l'auteur se penche sur le rôle et les fonctions dévolus aux agents de la paix qui exécutent leur mission à l'intérieur d'une société libre et démocratique comme celle qui prévaut au Canada. Cette étude permettra au lecteur de mieux connaître les principaux acteurs qui assurent le maintien de l'ordre sur le territoire québécois, les crimes qu'ils sont le plus souvent appelés à combattre ainsi que les méthodes d'enquête qu'ils emploient pour les réprimer. Le deuxième chapitre est entièrement dédié au concept de la détention à des fins d'enquête en droit criminel canadien. En plus de l'arrêt R. c. Mann qui fera l'objet d'une étude détaillée, plusieurs autres sujets en lien avec cette notion seront abordés. Des thèmes tels que la notion de «détention» au sens des articles 9 et 10b) de la Charte canadienne des droits et libertés, la différence entre la détention à des fins d'enquête et l'arrestation, les motifs pouvant légalement justifier une intervention policière de même que les limites et l'entendue de la détention d'une personne pour fins d'enquête, seront aussi analysés. Au troisième chapitre, l'auteur se consacre à la question du droit d'avoir recours sans délai à l'assistance d'un avocat (et d'être informé de ce droit) ainsi que du droit de garder le silence dans des circonstances permettant aux agents de la paix de détenir une personne à des fins d'enquête. Faisant l'analogie avec d'autres jugements rendus par nos tribunaux, l'auteur suggère quelques pistes de solutions susceptibles de combler les lacunes qui auront été préalablement identifiées dans les arrêts Mann et Clayton.
Resumo:
Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal