848 resultados para criminal intelligence


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Criminal intelligence is an area of expertise highly sought-after internationally and within a variety of justice-related professions; however, producing university graduates with the requisite professional knowledge, as well as analytical, organisational and technical skills presents a pedagogical and technical challenge to university educators. The situation becomes even more challenging when students are undertaking their studies by distance education. This best practice session showcases the design of an online undergraduate unit for final year justice students which uses an evolving real-time criminal scenario as the focus of authentic learning activities in order to prepare students for graduate roles within the criminal intelligence and justice professions. Within the unit, students take on the role of criminal intelligence analysts, applying relevant theories, models and strategies to solve a complex but realistic crime and complete briefings and documentation to industry standards as their major summative assessment task. The session will demonstrate how the design of the online unit corresponds to authentic learning principles, and will specifically map the elements of the unit design to Herrington & Oliver’s instructional design framework for authentic learning (2000; Herrington & Herrington 2006). The session will show how a range of technologies was used to create a rich learning experience for students that could be easily maintained over multiple unit iterations without specialist technical support. The session will also discuss the unique pedagogical affordances and challenges implicated in the location of the unit within an online learning environment, and will reflect on some of the lessons learned from the development which may be relevant to other authentic online learning contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Criminal intelligence is an area of expertise highly sought-after internationally and within a variety of justice-related professions; however, producing university graduates with the requisite professional knowledge, as well as analytical, organisational and technical skills presents a pedagogical and technical challenge to university educators. The situation becomes even more challenging when students are undertaking their studies by distance education. This best practice session showcases the design of an online undergraduate unit for final year justice students which uses an evolving real-time criminal scenario as the focus of authentic learning activities in order to prepare students for graduate roles within the criminal intelligence and justice professions. Within the unit, students take on the role of criminal intelligence analysts, applying relevant theories, models and strategies to solve a complex but realistic crime and complete briefings and documentation to industry standards as their major summative assessment task. The session will demonstrate how the design of the online unit corresponds to authentic learning principles, and will specifically map the elements of the unit design to Herrington & Oliver’s instructional design framework for authentic learning (2000; Herrington & Herrington 2006). The session will show how a range of technologies was used to create a rich learning experience for students that could be easily maintained over multiple unit iterations without specialist technical support. The session will also discuss the unique pedagogical affordances and challenges implicated in the location of the unit within an online learning environment, and will reflect on some of the lessons learned from the development which may be relevant to other authentic online learning contexts.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This thesis is an explorative study of four national level law enforcement agencies' applications of strategic intelligence against transnational organised crime. The thesis develops a hybrid conceptual model for strategic intelligence in law enforcement, which explains how strategic intelligence influences police management. Dr Coyne explored case studies of strategic intelligence in the Criminal Intelligence Service Canada, Serious and Organised Crime Agency United Kingdom, Australian Crime Commission and the Australian Federal Police. The research provides an understanding of the impact of strategic intelligence across strategic responses to transnational organised crime and the implications this has for police management and intelligence theory.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

El artículo pretende ofrecer una introducción explicativa sobre la tipología de relaciones posibles en el ámbito criminal organizado, los modelos de organización y su movilidad geográfica, a través de la conjunción de las disciplinas de la criminología, la geopolítica y la inteligencia criminal. El estudio persigue un doble objetivo: por un lado, aportar una reflexión que favorezca la apertura de líneas de investigación sobre la diversidad morfológica de las organizaciones criminales, las alianzas forjadas entre ellas, así como su expansión territorial, por otro, maximizar el conocimiento obtenido para apoyar la adopción de decisiones estratégicas, de políticas públicas y la detección de vulnerabilidades explotables para el desarrollo de estrategias de intervención.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Ao longo dos anos a Guarda Nacional Republicana tem vindo a desenvolver o seu modelo de investigação criminal. Alicerçado em três vertentes funcionais: operativa, criminalística e análise de informação criminal, este modelo visa garantir uma eficácia operacional da Guarda, no âmbito das competências que lhe são atribuídas enquanto Órgão de Polícia Criminal. Perspetivando uma evolução da investigação criminal exercida pelos Comandos Territoriais, assente numa avaliação da vertente de análise de informação criminal, surge a presente investigação, subordinada ao tema “A Importância da Análise de Informação Criminal para a Investigação: o Contributo dos NAIIC”. Com o objetivo de compreender qual o contributo que os Núcleos de Análise de Informações e Informação Criminal dos Comandos Territoriais conferem às investigações, apoiamo-nos num processo indutivo, que intenta generalizar os problemas observados nos vários Núcleos, para caracterizar a vertente de análise de informação criminal no dispositivo territorial. Visando uma análise quantitativa e qualitativa dos resultados, os métodos de recolha de dados explorados foram: dois inquéritos por questionário, um direcionado aos Chefes dos Núcleos de Análise de Informações e Informação Criminal e outro aos Chefes dos Núcleos de Investigação Criminal dos Comandos e Destacamentos Territoriais, assim como um inquérito por entrevista, realizado a cinco Oficiais da Guarda, com reconhecidos conhecimentos e experiência profissional nesta área. Conclui-se que os Núcleos de Análise de Informações e Informação Criminal têm contribuído para as investigações, enfatizando os aspetos relevantes de grandes volumes de informação, com vista a apoiar a ação dos investigadores. Todavia, foram observadas algumas limitações que importa suprimir, de forma a potenciar este contributo. Foram identificadas nestes Núcleos, insuficiências nos acessos à informação, lacunas nas ferramentas de análise, reduzido efetivo em determinados Comandos e algumas falhas de cooperação e coordenação, entre estes e os Núcleos de Investigação Criminal.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The text analyses Poland's internal security illustrated with the example of the tasks and activities of one of the Polish special services, the Internal Security Agency (pol. Agencja Bezpieczeństwa Wewnętrznego – ABW). Although the Internal Security Agency was established as a counter-intelligence service, the scope of its tasks and activities places it among the criminal intelligence services, which is poorly effective in terms of the eradication of crime targeted at the state's internal security. The analysis of the issues of state security in the context of the ISA's activity has been elaborated in the present text with the following research questions: (1) To what extent does the statutory scope of the ISA's tasks lower the effectiveness of the actions aimed at combating crime threatening state security? (2) To what extent does the structural pathology inside the ISA lower the effectiveness of the actions aimed at combating crime threatening state security? The text features an extensive analysis of three major issues: (1) the ISA's statutory tasks (with particular consideration of de lege lata and de lege ferenda regulations), (2) the dysfunctional character of the ISA's activity in relation to the scope of its statutory tasks, and (3) the structural pathology resulting from the 'politicisation' of the Internal Security Agency.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Abstract not available

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transnational Organised Crime (TOC) has become a focal point for a range of private and public stakeholders. While not a new phenomenon, the rapid expansion of TOC activities and interests, its increasingly complex structures and ability to maximise opportunity by employing new technologies at a rate impossible for law enforcement to match complicates law enforcement’s ability to develop strategies to detect, disrupt, prevent and investigate them. In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focuses on research that has implications for strategic intelligence and strategy setting in a TOC context. The review findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As such the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes, particularly in the fight against TOC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In an age where the role of police has morphed from simplistic response and enforcement activities to one of managing human security risk, it is argued that intelligence can be used to reduce the impact of strategic surprise from evolving criminal threats and environmental change. This review specifically focusses on research that has implications for strategic intelligence in law enforcement. The review findings highlight the absence of detailed research of law enforcement strategic intelligence. Findings suggest that current law enforcement intelligence literature focuses narrowly on the management concept of intelligence-led policing in a tactical, operational setting. As a result there is little theory on how to improve strategic intelligence outcomes. This is despite the fact that intelligence –led policing is envisaged as a management tool to guide strategic decision making. the review identifies central issues surrounding strategic intelligence and highlights key questions that future research agendas must address to improve strategic intelligence outcomes

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The relationship between intellectual functioning and criminal offending has received considerable focus within the literature. While there remains debate regarding the existence (and strength) of this relationship, there is a wider consensus that individuals with below average functioning (in particular cognitive impairments) are disproportionately represented within the prison population. This paper focuses on research that has implications for the effective management of lower functioning individuals within correctional environments as well as the successful rehabilitation and release of such individuals back into the community. This includes a review of the literature regarding the link between lower intelligence and offending and the identification of possible factors that either facilitate (or confound) this relationship. The main themes to emerge from this review are that individuals with lower intellectual functioning continue to be disproportionately represented in custodial settings and that there is a need to increase the provision of specialised programs to cater for their needs. Further research is also needed into a range of areas including: (1) the reason for this over-representation in custodial settings, (2) the existence and effectiveness of rehabilitation and release programs that cater for lower IQ offenders, (3) the effectiveness of custodial alternatives for this group (e.g. intensive corrections orders) and (4) what post-custodial release services are needed to reduce the risk of recidivism.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The identification of criminal networks is not a routine exploratory process within the current practice of the law enforcement authorities; rather it is triggered by specific evidence of criminal activity being investigated. A network is identified when a criminal comes to notice and any associates who could also be potentially implicated would need to be identified if only to be eliminated from the enquiries as suspects or witnesses as well as to prevent and/or detect crime. However, an identified network may not be the one causing most harm in a given area.. This paper identifies a methodology to identify all of the criminal networks that are present within a Law Enforcement Area, and, prioritises those that are causing most harm to the community. Each crime is allocated a score based on its crime type and how recently the crime was committed; the network score, which can be used as decision support to help prioritise it for law enforcement purposes, is the sum of the individual crime scores.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.