WorldWideScience

Sample records for prevent terrorist criminal

  1. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  2. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  3. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  4. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer L

    2005-01-01

    ... before. Globalization, technological advances, and anarchy resulting from the end of the Cold War has made transnational crime much easier to perpetrate and has given criminals flexibility to change tactics...

  5. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer

    2004-01-01

    ... before. Globalization, technological advances and anarchy resulting from the end of the Cold War has made transnational crime much easier to perpetrate and given criminals flexibility to change tactics...

  6. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  7. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends (Walker Paper, Number 1)

    Science.gov (United States)

    2005-05-01

    20,000 of those human beings are delivered annually by criminals to the United States and forced into prostitution, pornography , and sweatshop labor, it...economy. The Abu Sayyaf Group (ASG), an Islamic extremist organization in the Philippines, kid - napped two Americans and killed one of them in 2002. An ASG...eradication efforts told the author that cultivators, traf- fickers, and profit takers are now users and addicts —an alarming trend that will negatively impact

  8. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  9. Preventing Terrorist Bombings on United States Subway Systems

    Science.gov (United States)

    2006-09-01

    cleanup, and structural assessment.5 The economic impact of the attack would cost millions in repairs and lost revenue, and public trust would be...houses over a dozen restaurants and other businesses and serves as the “ basement level” for the major high-rise buildings in Philadelphia. An... Arabian Peninsula and Northern Africa, the “profiling appearance” is not a viable solution. As a result, prevention efforts must emphasize the

  10. Neurocriminology: implications for the punishment, prediction and prevention of criminal behaviour.

    Science.gov (United States)

    Glenn, Andrea L; Raine, Adrian

    2014-01-01

    Criminal behaviour and violence are increasingly viewed as worldwide public health problems. A growing body of knowledge shows that criminal behaviour has a neurobiological basis, and this has intensified judicial interest in the potential application of neuroscience to criminal law. It also gives rise to important questions. What are the implications of such application for predicting future criminal behaviour and protecting society? Can it be used to prevent violence? And what are the implications for the way offenders are punished?

  11. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  12. Opportunities for AIDS prevention in a rural state in criminal justice and drug treatment settings.

    Science.gov (United States)

    Farabee, D; Leukefeld, C G

    1999-01-01

    This study examined the likelihood that drug users would receive HIV/ AIDS prevention information and supplies (e.g., condoms and bleach) in the rural state of Kentucky. Despite evidence of high HIV risk among criminal justice and substance-using populations, incarceration and substance-user treatment were only minimally associated with prior HIV prevention exposure or HIV testing. These data strongly support the use of criminal justice and treatment settings to provide AIDS prevention interventions for the high-risk drug-using populations they serve, and to target HIV prevention services in rural as well as urban areas.

  13. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  14. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  15. Developing a Culturally Appropriate HIV and Hepatitis C Prevention Intervention for Latino Criminal Justice Clients.

    Science.gov (United States)

    Ibañez, Gladys E; Whitt, Elaine; Rosa, Mario de la; Martin, Steve; O'Connell, Daniel; Castro, Jose

    2016-07-01

    The population within the criminal justice system suffers from various health disparities including HIV and hepatitis C virus (HCV). African American and Latino offenders represent the majority of the offender population. Evidence-based interventions to prevent HIV and HCV among criminal justice clients are scant and usually do not take cultural differences into account. Toward this end, this study describes the process of culturally adapting an HIV/HCV prevention intervention for Latino criminal justice clients in Miami, Florida, by using the ecological validity model. Recommendations for culturally adapting an intervention for Latinos include an emphasis on language and integrating cultural themes such as familism and machismo. © The Author(s) 2016.

  16. GST – the idea and recommendations for the prevention of criminal behaviour

    Directory of Open Access Journals (Sweden)

    Robert Agnew

    2011-12-01

    Full Text Available The article is a presentation of the main assumptions of the General Strain Theory (GST and the possibility to put theory into practice in the field of prevention of criminal behaviour. The GST was created in the ‘90s by Robert Agnew as a continuation of previous structural theories (Merton, Cloward – Ohlin, Cohen. Up to this day it has been widely verified empirically and along with other criminology theories (the theory of social learning/theory of different relations, theory of social control, theories of interaction is both a fundamental but also alternative ground for interpreting social behaviour. Due to its universal assumptions, GST is now being developed also by Polish researchers. In the article are presented the fundamental strategies of prevention of criminal behaviour based on GST and examples of particular programs being carried out in the US and Poland. Pilot studies on building in Poland a pioneer local system of prevention, based on GST, are presented. In the conclusions the authors stress the importance of GST in the genesis of criminal behaviour. The content of this article is therefore a result of an American-Polish cooperation in the field of prevention of criminal behaviour. It seems that international and based on mutual partnership approach is the hallmark of the current stage of the Polish resocialization system development.

  17. [Practical problems in criminal laws of prevention of cruelty to animals].

    Science.gov (United States)

    Iburg, U

    2000-03-01

    1. To ascertain serious pains and sufferings in the meaning of section 17 no. 2 b law of prevention of cruelty to animals you cannot do without the help of an expert witness for taking possession of evidence--apart from simple cases. Except the clarifying of fundamental questions concerning prevention of cruelty to animals a professional statement of the administrative veterinary surgeon will be as a rule sufficient. 2. For the actual seizure of animals for the purpose of confiscation and compulsory disposal the criminal justice is extremely dependent on the support of the authorities of administration. Therefore a trouble-free cooperation of criminal justice, veterinary authorities, animal homes and--concerning the protection of species--authorities for protection of endangered nature is imperative. 3. The main problems with the application of the regulation concerning the interdiction of keeping animals according to sections 20 and 20 a law of prevention of cruelty to animals are justified in the legal prerequisites. It is unsatisfactory that an interdiction of keeping animals cannot be imposed by summary punishment order and that a confiscation of animals is not possible by criminal proceedings in case of offence against sections 20 subsection 3, 20 a subsection 3 law of prevention of cruelty to animals. Therefore an admission of the sections as mentioned above to section 19 law of prevention of cruelty to animals seems to be convenient.

  18. Background of the system analysis of crime prevention of properties of criminality

    Directory of Open Access Journals (Sweden)

    Валерій Федорович Оболенцев

    2016-01-01

    Full Text Available Raising of problem. Socio-economic processes in Ukraine in the last years require scientific researches which would become the proper theoretical subsoil of reformation of the law-enforcement system. Actuality of theme. Consider perspective a system method in researches of criminology. The analysis of the systems of law-enforcement sphere to this time remains actually not developed. An analysis of the last publications is in this sphere. Researches, where on principles of system method prevention of criminality would be examined, in domestic criminology relatively a bit. O. E. Manokha in dissertation in criminology did an author expound the analysis of «Systems results it system criminology to the analysis in number high-quality indexes of criminality in Ukraine for period 1972 - 1995 y., showed the system of its connections with practice of prevention of crimes. O. Frolova. on principles of the systems exposed practice of criminal punishments in Ukraine. Author  specified that efficiency them separate kinds are not identical and system depends on many social factors. Purpose of the article. The аim of article is to presents the results of a systematic analysis of the formal procedures prevent crime in Ukraine. Exposition of basic material. The purpose of crime prevention as an artificial system is defined as the absence of crime - penal violations of existing social relations, preservation of the latter. Purpose of the system of crime prevention - keeping people from violating the legitimate social relations, blockades or start a potential criminal activity. For a system of crime prevention functions can be considered a means of keeping the population from criminal acts and termination initiated criminal attacks. The problem of crime prevention system - inconsistency functions, parameters and structure of the system to its destination. Context of the system of crime prevention - a modern Ukrainian society. Virtual border crime prevention

  19. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  20. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  1. Case management helps prevent criminal justice recidivism for people with serious mental illness.

    Science.gov (United States)

    Leutwyler, Heather; Hubbard, Erin; Zahnd, Elaine

    2017-09-11

    Purpose The purpose of this paper is to discuss how case management can decrease recidivism for people with serious mental illness (SMI) because people with SMI are at high risk for incarceration and recidivism. Design/methodology/approach Examples of successful case management models for formerly incarcerated individuals with SMI found through a secondary analysis of qualitative data and an analysis of the literature are presented. Findings Currently, no international, national, or statewide guidelines exist to ensure that formerly incarcerated individuals with SMI receive case management upon community reentry despite evidence that such services can prevent further criminal justice involvement. Recommendations include establishment of and evaluation of best practices for case management. In addition, the authors recommend additional funding for case management with the goal of greatly increasing the number of individuals with SMI leaving the criminal justice system in their ability to access adequate case management. Originality/value Providing effective case management tailored to the needs of formerly incarcerated people with SMI improves their quality of life and reduces their involvement in the criminal justice system with clear positive outcomes for public safety and public health.

  2. Tourist criminality

    OpenAIRE

    Jakovlev, Zlatko; Koteski, Cane; Dimitrov, Nikola

    2015-01-01

    In this book expert processed chapters on the development of tourism, the conditions for the development of tourism, the definition of tourism, positive and negative effects of tourism, the necessity of defining tourism criminality and its component elements, narrower and wider tourist criminality , theories of crime, the structure of tourism crime, property crime in tourism, forest fires, sexual offenses, other tourist crimes stakeholders of tourism offenses, victims of tourist crime prevent...

  3. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  4. THE REFLECTION OF PROCEDURAL GUILT IN THE CRIMINAL PROCEDURE PROVISIONS. LIABILITY FOR UNJUST CONDEMNATION OR FOR TAKING PREVENTIVE MEASURES UNLAWFULLY

    Directory of Open Access Journals (Sweden)

    ELIZA EMANUELA OPREA

    2013-05-01

    Full Text Available In the criminal proceedings of some law states the wrongful sentencing of individuals is very rare, having a comprehensive system of procedural safeguards which prevent such a situation. The purpose of the criminal proceedings is to punish only the culprits, the Criminal Procedure code frontispiece being stated the idea that no innocent person should be held criminally liable. By achieving this aspect of purpose is ensured observance of legality and the rule of law. All the basic rules and the whole organization of the criminal trial are polarized around this major goal of justice. Also the professional qualification level of those summoned to administer criminal justice in the modern state to minimizes the risk of judiciar miscarriages. The deep humanism of our law requires though the regulation of those procedural arrangements, through which in the event of an act of injustice, the wrongly convicted is able to obtain prompt repairs that society owes them. A very important aspect related to the evolution over time of the regulation of this institution, is that in its doctrine of integration in the European Union, Romania has adopted a series of laws and regulations designed to ensure our legislation’s alignment with the relevant legislation of the countries from the European community and to ensure the compliance with the European Convention on Human Rights. This process is still ongoing, therefore the establishment and the subsequent modification of the special procedure concerning the remedies for the material or moral damage in the event of unjust sentence or unlawful deprivation of liberty was based on the desire to avoid the conviction situation of the Romanian state by the international courts for failure to comply with the Art. 5 paragraph 5 of the Convention for the Protection of Human Rights and Fundamental Freedoms that 'any individual who is the victim of arrest or detention in conditions contrary to the provisions of this article

  5. Profiling, Screening and Criminal Recruitment

    OpenAIRE

    Christopher Cotton; Cheng Li

    2012-01-01

    We model major criminal activity as a game in which a law enforcement officer chooses the rate at which to screen different population groups and a criminal organization (e.g., drug cartel, terrorist cell) chooses the observable characteristics of its recruits. Our model best describes smuggling or terrorism activities at borders, airports and other security checkpoints. When the social costs of crime are high, law enforcement is most-effective when it is unconstrained in its ability to profi...

  6. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  7. Terrorist Criminal Pipelines and Criminalized States: Emerging Alliances

    Science.gov (United States)

    2011-06-01

    now estimated as the world’s largest producer of cocaine, and the Sinaloa Cartel in Mexico, with the world’s largest distribution network. Both...trafficking and financial operations of the Sinaloa Cartel are important, FARC alliances and actions offer an important look at the use of nonstate...disciple of Manuel Fraga, and held several senior party posts with the Alianza Popular. By his own admission, he then migrated to the Socialist Party, but

  8. Framing in criminal investigation

    Science.gov (United States)

    2016-01-01

    Failures in criminal investigation may lead to wrongful convictions. Insight in the criminal investigation process is needed to understand how these investigative failures may rise and how measures can contribute to the prevention of this kind of failures. Some of the main findings of an empirical study of the criminal investigation process in four cases of major investigations are presented here. This criminal investigation process is analyzed as a process of framing, using Goffman's framing (Goffman, 1975) and interaction theories (Goffman, 1990). It shows that in addition to framing, other substantive and social factors affect the criminal investigation. PMID:29046594

  9. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  10. Prevention of Crime and the Optimal Standard of Proof in Criminal Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    2003-01-01

    The standard of proof in criminal law a®ects retributive justice throughthe number of wrong convictions and wrong acquittals. It also a®ects thelevel of crime, since a higher standard of proof implies less deterrence andless incapacitation. This article derives an expression for the optimal...

  11. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  12. Criminal Law

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    <> book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....... book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....

  13. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals

    Directory of Open Access Journals (Sweden)

    Chao Zhang

    2016-06-01

    Full Text Available Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. In this paper, we aim to design an optimal police patrolling strategy against opportunistic criminals in urban areas. Our approach is comprised by two major parts: learning a model of the opportunistic criminal (and how he or she responds to patrols and then planning optimal patrols against this learned model. The planning part, by using information about how criminals responds to patrols, takes into account the strategic game interaction between the police and criminals. In more detail, first, we propose two categories of models for modeling opportunistic crimes. The first category of models learns the relationship between defender strategy and crime distribution as a Markov chain. The second category of models represents the interaction of criminals and patrol officers as a Dynamic Bayesian Network (DBN with the number of criminals as the unobserved hidden states. To this end, we: (i apply standard algorithms, such as Expectation Maximization (EM, to learn the parameters of the DBN; (ii modify the DBN representation that allows for a compact representation of the model, resulting in better learning accuracy and the increased speed of learning of the EM algorithm when used for the modified DBN. These modifications exploit the structure of the problem and use independence assumptions to factorize the large joint probability distributions. Next, we propose an iterative learning and planning mechanism that periodically updates the adversary model. We

  14. Radical Islam as a Means of Self-Realization for the North Caucasian Youth: From the Terrorist-Criminal Groups to the Beginnings of the Creation of a New, Less Controlled Subculture

    Directory of Open Access Journals (Sweden)

    Nikoloz Janelidze

    2015-11-01

    Full Text Available Radical Islam with its various types of manifestations is one of the significant challenges facing the modern world. This problem has also affected the societies of autonomous republics bordering Georgia to the north. In today’s North Caucasus, the activity of radical Islam followers has reached beyond the political (in many cases terrorist niche and has acquired quasi-social characteristics. Furthermore, the facts and tendencies indicate that this part of the society (in this case youth purposefully or unintentionally creates the so-called uncontrolled and/or less controlled subculture with different opinions, views, ideology, behaviors, in many cases clothes, hairstyle, etc. Radical Islam (in this case as a doctrine regulates human conduct – provides advice, dictates how to act, and in fact it sets a dogma how to dress, how to behave in public, how to live, etc. Wahhabis/Salafis are forbidden to smoke tobacco, hashish, to use beads, sing loudly, dance, etc. It is worth to separately note the so-called aggressive wing of Wahhabism/Salafism or the terrorists, field commanders, etc.One of the motives for writing the article is to show readers the fact that radical Islam in North Caucasus is not solely a terrorist activity. It encompasses a much broader spectrum of the society, and at the same time it is much more than a religion. It sets the norms of social behavior and thinking, which in itself limits the formation of subjective attitudes. Exactly the lack of the latter generates the negative trend of their activities, which quite often are used for political actions by the respective forces.

  15. Criminal groups and criminal subculture

    OpenAIRE

    Romanova N.M.

    2013-01-01

    The paper provides a classification of criminal groups, structured by the following parameters: a) operation mode (secret/open), b) law-enforcement and administrative support (presence/absence). We describe four types of criminal groups: a) legitimized criminal organization, b) secret criminal organization engaged in illegal business, c) secret general crime group, and d) general crime group operating openly. The four types differ in the content of criminal subculture. Modern criminal subcult...

  16. The criminal law responsibility of officials under environmental criminal law

    International Nuclear Information System (INIS)

    Winkelbauer, W.

    1986-01-01

    The legal application of environmental criminal law has attributed to office-bearers of the environmental administration a determining function in the field of criminal protection of legal objects. Criminal law shall prevent the misuse of official authority. In this connection law has to observe the limits of admissible procedure of the administration. (CW) [de

  17. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  18. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  19. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  20. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  1. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  2. International Criminalization of International Terrorizm

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2014-01-01

    Full Text Available Analysis and studying of the terrorism in all its facets is a complex entangled problem with less clear legal regulation that it might seem at first glance, especially after its transformation from local phenomenon into a world threat. Hitherto terrorism and actions connected to it have been criminalized by the majority of states. There are in modern criminal law whole systems of rules on criminal liability for terrorism which differs considerably from country to country. Terrorism has been criminalized in numerous international regional and universal antiterrorist legal instruments. The author notes that differences in definitions that are enshrined in them hinders international cooperation in criminal matters with respect to terrorist cases. Difficulties reside in the necessity to meet the dual criminality requirement and in the political offense exception. These difficulties can only be overcome through elaboration of a universally recognized definition of the notion of international terrorism and making it legally binding via its inclusion into a universal convention. The issue of definition of international terrorism is an important part of an efficient mutual assistance among states in fight against this crime. In this article the author accounts of actual ways of tackling by the international community of the issue of criminalization of international terrorism and of factors influencing them.

  3. Assessing informed consent in an opioid relapse prevention study with adults under current or recent criminal justice supervision.

    Science.gov (United States)

    Allen, Ashleigh A; Chen, Donna T; Bonnie, Richard J; Ko, Tomohiro M; Suratt, Colleen E; Lee, Joshua D; Friedmann, Peter D; Gordon, Michael; McDonald, Ryan; Murphy, Sean M; Boney, Tamara Y; Nunes, Edward V; O'Brien, Charles P

    2017-10-01

    Concerns persist that individuals with substance use disorders who are under community criminal justice supervision experience circumstances that might compromise their provision of valid, informed consent for research participation. These concerns include the possibilities that desire to obtain access to treatment might lead individuals to ignore important information about research participation, including information about risks, or that cognitive impairment associated with substance use might interfere with attending to important information. We report results from a consent quiz (CQ) administered in a multisite randomized clinical trial of long-acting naltrexone to prevent relapse to opioid use disorder among adults under community criminal justice supervision-a treatment option difficult to access by this population of individuals. Participants were required to answer all 11 items correctly before randomization. On average, participants answered 9.8 items correctly (89%) at baseline first attempt (n=306). At week 21 (n=212), participants scored 87% (9.5 items correct) without review. Performance was equivalent to, or better than, published results from other populations on a basic consent quiz instrument across multiple content domains. The consent quiz is an efficient method to screen for adequate knowledge of consent information as part of the informed consent process. Clinical researchers who are concerned about these issues should consider using a consent quiz with corrected feedback to enhance the informed consent process. Overall, while primarily useful as an educational tool, employing a CQ as part of the gateway to participation in research may be particularly important as the field continues to advance and tests novel experimental treatments with significant risks and uncertain potential for benefit. Copyright © 2017. Published by Elsevier Inc.

  4. Keeping pace with criminals: An extended study of designing patrol allocation against adaptive opportunistic criminals

    OpenAIRE

    Zhang, Chao; Gholami, Shahrzad; Kar, Debarun; Sinha, Arunesh; Jain, Manish; Goyal, Ripple; Tambe, Milind

    2016-01-01

    Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists) who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. I...

  5. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  6. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  7. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  8. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  9. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  10. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  11. Prevention by All Means?
    A Legal Comparison of the Criminalization of Online Grooming and its Enforcement

    Directory of Open Access Journals (Sweden)

    Renée Kool

    2011-10-01

    Full Text Available The obligation to criminalise online grooming, recently prescribed by the Council of Europe in the Treaty of Lanzarote, illustrates modern citizens' fears of external dangers, especially towards the sexual abuse of minors. The authorities' image of online grooming being unclear, the penalisatiom tends to be of a symbolic nature, implying false prophecies of legal protection. Moreover, the penalisation of online grooming indicates a precautionary use of the criminal law, so its justification lies within the perpertrators' objectionable motive, the latter violating basic assumptions of criminal law. Next to theoretical objections, practical issues are to be foreseen, as the criminal investigation of online grooming indicates the use of undercover tactics, which has a bearing on the procedural risk, e.g. the entrapment defence. Nevertheless, the British authorities have been able to penalise online grooming rather successfully. The Netherlands having recently (in July 2010 introduced a similar provision, this calls for a comparative analysis. Does the penalisation of online grooming have any added value, especially in light of the tendency towards a precautionary use of the criminal law, and what features are apparent in the British success?

  12. Criminal Compliance

    Directory of Open Access Journals (Sweden)

    Cristina Antonella Andretta

    2015-10-01

    The article discusses the concepts of both compliance and criminal compliance, its main components and structure as well as the main rules relating to its global application, and finally his emergence in the Ecuadorian legal system.

  13. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  14. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting

    OpenAIRE

    Anderson, S.; Shannon, K.; Li, J.; Lee, Y.; Chettiar, J.; Goldenberg, S.; Kr?si, A.

    2016-01-01

    Background Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Methods Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vanco...

  15. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  16. [The role of religion in the promotion of health, in the prevention of violence and in the rehabilitation of individuals involved in criminal activity: literature review].

    Science.gov (United States)

    Ribeiro, Fernanda Mendes Lages; Minayo, Maria Cecília de Souza

    2014-06-01

    This is a review of the literature on the role of religion in the promotion of health, the prevention of violence and the rehabilitation of individuals involved in criminal activities. Research was conducted in the Medline through PubMed, Lilacs, Scopus, Social Index with full text, Sociological abstracts and Social services abstracts databases. Twenty-nine essays in Portuguese, English and Spanish were selected and analyzed between 1990 and 2011. The results indicate the function of the religious group and the role of religion in the rehabilitation of individuals, the prevention of criminal involvement, corrective orientations and in social iniquity environments. A debate is presented on the main themes revealed, highlighting the multiplicity of religious roles, their influence over prisoners, as a social control and support base and its influence on mental health promotion and quality of life. The relation between religion and the public sphere is discussed, emphasizing the role of religious groups and the fragility of the State in providing basic public policies. Despite revealing the successful role of religion in violence prevention and in rehabilitation, some studies question this relation and highlight the conflicts between the concepts employed and the final results.

  17. The Relationship between Criminal and Terrorist Organizations and Human Smuggling

    Science.gov (United States)

    2009-12-01

    franchise . There can be smaller cells that are quasi independent from the larger cartel but pay tribute to that cartel for the ability or the right...to move product into and out of the U.S. Thus if you go outside the rules of the franchise you either pay some penalty or you lose the right to...date of arrival at his restaurant of his smuggling clients. In another notebook, he had the names and numbers of his restaurant customers and their

  18. Chemical Accident Prevention: Site Security

    Science.gov (United States)

    This chemical safety alert assists facilities that routinely handle extremely hazardous substances, along with SERCs, LEPCs, and emergency responders, in their efforts to reduce criminally caused releases and vulnerability to terrorist activity.

  19. The nuclear specific danger prevention in the Bundesamt fuer Strahlenschutz; Die nuklearspezifische Gefahrenabwehr im Bundesamt fuer Strahlenschutz

    Energy Technology Data Exchange (ETDEWEB)

    Lange, Britta [Bundesamt fuer Strahlenschutz, Berlin (Germany). Arbeitsgruppe Nuklearspezifische Gefahrenabwehr (AG-NGA)

    2016-07-01

    The nuclear-related danger prevention (NGA: nuklearspezifische Gefahrenabwehr) in the BfS is usually seen as part of emergency planning. NGA is dealing with incidents resulting from possible or verified radioactive material abuse. It is always assumed or expected that there is a criminal or in the worst case terroristic intention. Therefore the NGA operation is usually of a radiological situation a combination with police actions inducing enhanced challenges to planning, communication and cooperation.

  20. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  1. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  2. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  3. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  4. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  5. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting.

    Science.gov (United States)

    Anderson, S; Shannon, K; Li, J; Lee, Y; Chettiar, J; Goldenberg, S; Krüsi, A

    2016-11-17

    Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vancouver, Canada. The criminalization of in-call venues and third parties explicitly limits sex workers' access to HIV/STI prevention, including manager restrictions on condoms and limited onsite access to sexual health information and HIV/STI testing. With limited labour protections and socio-cultural barriers, criminalization and policing undermine the health and human rights of migrant sex workers working in -call venues. This research supports growing evidence-based calls for decriminalization of sex work, including the removal of criminal sanctions targeting third parties and in-call venues, alongside programs and policies that better protect the working conditions of migrant sex workers as critical to HIV/STI prevention and human rights.

  6. Anticipative Criminal Investigation : Theory and Counterterrorism Practice in the Netherlands and the United States

    NARCIS (Netherlands)

    Hirsch Ballin, M.F.H.

    2012-01-01

    The book assesses the adoption of counterterrorism measures in the Netherlands and the United States, which facilitate criminal investigations with a preventive focus (anticipative criminal investigations), from the perspective of rule of law principles. Anticipative criminal investigation has

  7. Criminal law

    International Nuclear Information System (INIS)

    Silva, J.M. da.

    1979-01-01

    Facts concerning the application of atomic energy are presented and those aspects which should be under tutelage, the nature and guilt of the nuclear offenses and the agent's peril are presented. The need of a specific chapter in criminal law with adequate legislation concerning the principles of atomic energy is inferred. The basis for the future elaboration this legislation are fixed. (A.L.S.L.) [pt

  8. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  9. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  10. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver BUÇAJ

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber-attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber-attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  11. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver Buçaj

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism phenomena in line with the principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in the context of cyber attacks events in attempt to establish a legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  12. The Rise of the Autonomous Cyber Criminal

    OpenAIRE

    Rogers, Marcus

    2015-01-01

    Are we on the threshold of a new evolution of cyber crime? There has been numerous discussions and SciFi themes that have centered around truly autonomous online criminal behavior. This talk will look at the myths and realities surrounding the potential for automated systems to turn to the "dark side" and become uber cyber criminals, and what if anything we can do to prevent or at least detect this type of criminal behavior.

  13. Pathways Explaining the Reduction of Adult Criminal Behaviour by a Randomized Preventive Intervention for Disruptive Kindergarten Children

    Science.gov (United States)

    Vitaro, Frank; Barker, Edward D.; Brendgen, Mara; Tremblay, Richard E.

    2012-01-01

    Objective: This study aimed to identify the pathways through which a preventive intervention targeting young low-SES disruptive boys could result in lower crime involvement during adulthood. Method: The preventive intervention was implemented when the children were between 7 and 9 years and included three components (i.e. social skills, parental…

  14. Congress, NRC mull utility access to FBI criminal files

    International Nuclear Information System (INIS)

    Ultroska, D.

    1984-01-01

    Experiences at Alabama Power Company and other nuclear utilities have promped a request for institutionalizing security checks of personnel in order to eliminated convicted criminals and drug users. The Nuclear Regulatory Commission (NRC), which could provide FBI criminal history information by submitting fingerprints, does not do so, and would require new legislation to take on that duty. Believing that current malevolent employees can be managed with existing procedures, NRC allows criminal background checks only on prospective employees in order to avoid a negative social impact on personnel. Legislation to transfer criminal histories to nuclear facilities is now pending, and NRC is leaning toward a request for full disclosure, partly because of terrorist threats and partly to save manpower time and costs in reviewing case histories

  15. CLASSIFICATION OF CRIMINAL GROUPS

    OpenAIRE

    Natalia Romanova

    2013-01-01

    New types of criminal groups are emerging in modern society.  These types have their special criminal subculture. The research objective is to develop new parameters of classification of modern criminal groups, create a new typology of criminal groups and identify some features of their subculture. Research methodology is based on the system approach that includes using the method of analysis of documentary sources (materials of a criminal case), method of conversations with themembers of the...

  16. Cost-effectiveness of extended release naltrexone to prevent relapse among criminal justice-involved individuals with a history of opioid use disorder.

    Science.gov (United States)

    Murphy, Sean M; Polsky, Daniel; Lee, Joshua D; Friedmann, Peter D; Kinlock, Timothy W; Nunes, Edward V; Bonnie, Richard J; Gordon, Michael; Chen, Donna T; Boney, Tamara Y; O'Brien, Charles P

    2017-08-01

    Criminal justice-involved individuals are highly susceptible to opioid relapse and overdose-related deaths. In a recent randomized trial, we demonstrated the effectiveness of extended-release naltrexone (XR-NTX; Vivitrol ® ) in preventing opioid relapse among criminal justice-involved US adults with a history of opioid use disorder. The cost of XR-NTX may be a significant barrier to adoption. Thus, it is important to account for improved quality of life and downstream cost-offsets. Our aims were to (1) estimate the incremental cost per quality-adjusted life-year (QALY) gained for XR-NTX versus treatment as usual (TAU) and evaluate it relative to generally accepted value thresholds; and (2) estimate the incremental cost per additional year of opioid abstinence. Economic evaluation of the aforementioned trial from the taxpayer perspective. Participants were randomized to 25 weeks of XR-NTX injections or TAU; follow-up occurred at 52 and 78 weeks. Five study sites in the US Northeast corridor. A total of 308 participants were randomized to XR-NTX (n = 153) or TAU (n = 155). Incremental costs relative to incremental economic and clinical effectiveness measures, QALYs and abstinent years, respectively. The 25-week cost per QALY and abstinent-year figures were $162 150 and $46 329, respectively. The 78-week figures were $76 400/QALY and $16 371/abstinent year. At 25 weeks, we can be 10% certain that XR-NTX is cost-effective at a value threshold of $100 000/QALY and 62% certain at $200 000/QALY. At 78 weeks, the cost-effectiveness probabilities are 59% at $100 000/QALY and 76% at $200 000/QALY. We can be 95% confident that the intervention would be considered 'good value' at $90 000/abstinent year at 25 weeks and $500/abstinent year at 78 weeks. While extended-release naltrexone appears to be effective in increasing both quality-adjusted life-years (QALYs) and abstinence, it does not appear to be cost-effective using generally accepted value

  17. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  18. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  19. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  20. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  1. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  2. Criminal Justice in America.

    Science.gov (United States)

    Croddy, Marshall; And Others

    An introduction to criminal law, processes, and justice is provided in this high school level text. Content is divided into six chapters, each treating a particular aspect of criminal procedure and the social and political issues surrounding it. Chapter 1 considers the criminal, the effects of crime on its victims, and legislation to aid victims.…

  3. Denmark: criminal law as an anchorage point for pro-active anti-terrorism legislation

    DEFF Research Database (Denmark)

    Vestergaard, Jørn

    2012-01-01

    The article focuses on the compatibility of criminal law anti-terrorism legislation in Danish law with basic principles regarding the rule of law and due process. The so-called anti-terror-packages of 2002 and 2006 involve a set of rather uncertain and wide-reaching provisions fundamentally...... challenging the principle of legality and substantially widening of the scope of criminal law. These provisions criminalize various activities more or less remote from actual or attempted terrorist acts and participation in such activities, too. The legislature has even over-implemented vari-ous legal...

  4. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  5. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  6. Mentally disordered criminal offenders in the Swedish criminal system.

    Science.gov (United States)

    Svennerlind, Christer; Nilsson, Thomas; Kerekes, Nóra; Andiné, Peter; Lagerkvist, Margareta; Forsman, Anders; Anckarsäter, Henrik; Malmgren, Helge

    2010-01-01

    Historically, the Swedish criminal justice system conformed to other Western penal law systems, exempting severely mentally disordered offenders considered to be unaccountable. However, in 1965 Sweden enforced a radical penal law abolishing exceptions based on unaccountability. Mentally disordered offenders have since then been subjected to various forms of sanctions motivated by the offender's need for care and aimed at general prevention. Until 2008, a prison sentence was not allowed for offenders found to have committed a crime under the influence of a severe mental disorder, leaving forensic psychiatric care the most common sanction in this group. Such offenders are nevertheless held criminally responsible, liable for damages, and encumbered with a criminal record. In most cases, such offenders must not be discharged without the approval of an administrative court. Two essentially modern principles may be discerned behind the "Swedish model": first, an attempted abolishment of moral responsibility, omitting concepts such as guilt, accountability, atonement, and retribution, and, second, the integration of psychiatric care into the societal reaction and control systems. The model has been much criticized, and several governmental committees have suggested a re-introduction of a system involving the concept of accountability. This review describes the Swedish special criminal justice provisions on mentally disordered offenders including the legislative changes in 1965 along with current proposals to return to a pre-1965 system, presents current Swedish forensic psychiatric practice and research, and discusses some of the ethical, political, and metaphysical presumptions that underlie the current system. Copyright 2010 Elsevier Ltd. All rights reserved.

  7. Criminal characteristics of a group of primary criminals diagnosed with aspd: approach to criminal recidivis

    Directory of Open Access Journals (Sweden)

    R. Larrotta-Castillo

    Full Text Available Abstract Introduction: Antisocial personality disorder (ASPD is commonly associated with the risk of criminal recidivism. Knowing more about the factors associated with this pattern of behaviour can help with the design of effective prevention strategies. The purpose of this article is to establish if there are differences in socio-criminogenic variables of a group of criminals sentenced for the first time and with APSD compared to another group of first-time offenders who do not present this disorder. Materials and methods: Analytical observation study of 70 men classified into 2 groups according to the presence of ASPD TPA (n=47; age: 29.98±7.8 years or absence of ASPD (n=23; age: 32.35±8.7 years. Results: The inmates with ASPD showed higher frequencies of current consumption of psychoactive substances (31.9%, criminal associations and simultaneous use of psychoactive substances (70.2%, having committed the crime under the effects of a psychoactive substance (55.3%, not having the possibility of distancing themselves from criminal associations (83% and a lack of legal resources for proceedings for defence and release (76.6%. Discussion: This sample contains a group of variables called dynamic that are more commonly present amongst first time offenders with ASPD; said variables have been associated as major predictors of recidivism. Given that they are regarded as dynamic, they may well be modifiable.

  8. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  9. Criminal Justice Transitions

    OpenAIRE

    McAra, Lesley; McVie, Susan

    2007-01-01

    This report explores transitions into the adult criminal justice system amongst a large cohort of young people who were involved in the Edinburgh Study of Youth Transitions and Crime. It includes: a description of patterns of criminal convictions and disposals for young people up to age 19 (on average); an examination of the characteristics and institutional histories of cohort members with a criminal record as compared with youngsters with no such record; and an exploration of the profile of...

  10. Criminal aspects domestic violence

    OpenAIRE

    Smetanová, Kristina

    2013-01-01

    Smetanová, Kristina. Criminal aspects of domestic violence The topic of this thesis is the criminal aspects of domestic violence. The aim of the thesis is to describe this dangerous and complicated social problem and focus on outlining the possibilities of protection under Czech criminal law. The thesis consists of eight chapters. The first chapter explains what the domestic violence is and which sources, types and characters does it have.The second chapter shows who can be the violent person...

  11. Psychology and criminal justice

    OpenAIRE

    Adler, Joanna R.

    2013-01-01

    This chapter is designed to give the reader a flavour of a few areas in which psychology has been applied to criminal justice. It begins by providing some historical context and showing the development of some applications of psychology to criminal justice. The chapter is broadly split into 3 sections: Pre Trial; Trial; and Post Trial. In most of this chapter, the areas considered assess how psychology has had an influence on the law and how psychologists work within criminal justice settings...

  12. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  13. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  14. How to identify the person holding the highest position in the criminal hierarchy?

    Directory of Open Access Journals (Sweden)

    Grigoryev D.A.

    2014-12-01

    Full Text Available The current version of the resolution of the RF Supreme Court Plenum of June 10, 2010 N 12, clarifying the provisions of the law on liability for crimes committed by a person holding the highest position in the criminal hierarchy (Part 4 of Article 210 of the RF Criminal Code, is criticized. Evaluative character of the considered aggravating circumstance doesn’t allow to develop clear criteria for identifying the leaders of the criminal environment. Basing on the theory provisions and court practice, the authors suggest three criteria. The first criterion is specific actions including: establishment and leadership of the criminal association (criminal organization; coordinating criminal acts; creating sustainable links between different organized groups acting independently; dividing spheres of criminal influence, sharing criminal income and other criminal activities, indicating person’s authority and leadership in a particular area or in a particular sphere of activity. The second is having money, valuables and other property obtained by criminal means, without the person’s direct participation in their acquisition; transferring money, valuables and other property to that person systematically, without legal grounds (unjust enrichment; spending that money, valuables and other property to carry out criminal activities (crimes themselves and conditions of their commission. The third is international criminal ties manifested in committing one of the crimes under Part 1 of Article 210 of the RF Criminal Code, if this crime is transnational in nature; ties with extremist and (or terrorist organizations, as well as corruption ties. The court may use one or several of these criteria.

  15. The International Criminal Court

    DEFF Research Database (Denmark)

    Damgaard, Ciara Therése

    This article considers whether acts of international terrorism can and should be prosecuted before the International Criminal Court as crimes against humanity.......This article considers whether acts of international terrorism can and should be prosecuted before the International Criminal Court as crimes against humanity....

  16. Intelligence as evidence in criminal proceedings

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2011-01-01

    Full Text Available The fight against modern forms of crime such as organized crime, terrorism and other very serious crimes caused not only modification of procedural principles and procedural rules, but also the necessity of re-examination of evidence in terms of introducing new evidence in criminal proceedings. Given that the prevention, detection and proving in cases of mentioned offenses represent the systemic issue and that the efficiency is caused by cohesion of preventive and repressive mechanisms in each strategy of preventing and combating serious crimes, the more often raised question, aroused from the practice, is the issue of the use of information gathered by the police or security services as evidence in criminal proceedings. In addition, there is the issue of use of illegal evidence, the ways in which these evidence are defined in some jurisdictions and which are the legal consequences of their use in judicial decision, whether it is based only on them, or on some other evidence beside them. The author addresses the issues of necessity and justification for use of information of security services as evidence in criminal proceedings, their definition and difference with respect to data, experiences and practices in other countries and of course their use as evidence in criminal proceedings of Serbia. Also, the paper addresses the Criminal Intelligence Analytics, exchange of information between the competent authorities at national and international level.

  17. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  18. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  19. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  20. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  1. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  2. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  3. Becoming Criminal: The Cultural Politics of Risk

    Science.gov (United States)

    Armstrong, Derrick

    2006-01-01

    At the same time as youth crime in the UK is falling, there has been an increase in the numbers of young people in custody together with an explosion of social policy initiatives aimed at young people deemed to be "at risk" of becoming criminal and focused upon the prevention of future offending and inclusion in mainstream society. This…

  4. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  5. Dentistry and criminal law.

    Science.gov (United States)

    Khoury, B S; Khoury, J N

    2017-09-01

    Criminal law in dentistry, as shaped and moulded by the prevailing views of society, defines what is or is not socially acceptable. It applies in both personal and professional contexts with the intended consequence of protecting the public from unacceptable conduct and potential imbalances of power. At its centre, a patient's consent plays a pivotal role in transforming unlawful conduct into lawful conduct. This literature review considers the current law and the trend of utilizing criminal law in addition to non-criminal law alternatives of reprimanding clinicians for failure to achieve consent in the course of dental practice. Dentists must appreciate this change and the prosecuting authority's increasing willingness to resort to criminal law. © 2017 Australian Dental Association.

  6. Criminal Law in Denmark

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    Derived from the renowned multi-volume International Encyclopaedia of Laws, this book provides a practical analysis of criminal law in Denmark. An introduction presents the necessary background information about the framework and sources of the criminal justice system, and then proceeds......-trial proceedings, trial stage, and legal remedies. A final part describes the execution of sentences and orders, the prison system, and the extinction of custodial sanctions or sentences. Its succinct yet scholarly nature, as well as the practical quality of the information it provides, make this book a valuable...... resource for criminal lawyers, prosecutors, law enforcement officers, and criminal court judges handling cases connected with Denmark. Academics and researchers, as well as the various international organizations in the field, will welcome this very useful guide, and will appreciate its value in the study...

  7. Euthanasia and criminal law

    OpenAIRE

    Ullrichová, Petra

    2008-01-01

    71 8. Summary- Euthanasia and criminal law Euthanasia is often regarded as a controversial topic that is being discussed all around the world. The legislative rules differ among the countries to various extent. The scope of this work is to offer a summary of legal regulations in euthanasia, particulary in the area of criminal law and a several examples of these regulations in Europe, USA and Australia. In the first chapter, the term of euthanasia is defined which is necessary for the purpose ...

  8. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  9. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  10. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  11. Criminal tendencies and psychological testing

    Directory of Open Access Journals (Sweden)

    Sobchik L. N.

    2017-04-01

    Full Text Available Methods of psychological diagnostics closer to the psychology main research areas, which involve measuring the accuracy and statistical reliability. A set of methods that includes questionnaires should be complemented with projective tests in which the stimulus material is verbal in nature. The article presents the results of surveys of different groups of persons in conflict with the law, as well as screening tests contingent of youth groups and adolescents. High performance, spontaneously manifested aggressiveness, traits, emotional immaturity, low self-control and primitive-the requirement of the hierarchy of values at statistically significant level are identified in the data psychodiagnostic study, thus allowing to allocate the risk of wrongful conduct and to develop preventive measures of psycho-pedagogical and social nature. Psychological testing is an effective tool in the study of criminal predisposici and gives the key to a science-based approach in the development of preventive measures aimed at reducing crime.

  12. Several criminal, phenomenological and etiological features of criminal offences of counterfeiting money in Kosovo

    Directory of Open Access Journals (Sweden)

    MSc. Milot Krasniqi

    2012-12-01

    Full Text Available The Republic of Kosovo is making efforts as a young state to strengthen rule of law and efficiently combat criminality in general, and specifically organized crime, as a condition for its journey towards European integration perspectives.  For a normal functioning of the economic system, the safety and protection of controlled circulation of money are of vital importance. In this direction, the state takes actions and measures to ensure that manufacturing and emissions of banknotes and bonds are undertaken by competent authorities, such as the Central Bank, and render impossible the counterfeiting of money. In Kosovo, money counterfeiting is not widely studied. Consequently, there are no recent research papers over the time when these offences have marked rather high records. This circumstance, and especially the fact that these offences are rather frequent in Kosovo, made me enter the research of this type of criminality.    Apart from principles and rules stipulated by special laws of the field of economy, protection of the economic system is also helped by the Criminal Code, which incriminates the act of counterfeit money as a criminal offence against the economic system, thereby ensuring general prevention of potential offenders, and repressive measures against confirmed offenders. Protection of economic and monetary systems is also provided upon by numerous international acts.  The paper is permeated by conclusions, analysis and independent recommendations, which I believe will contribute de lege ferrenda to criminal policies in preventing and combating this type of crime. In researching the criminal offences of counterfeiting money, I have used the method of historical materialism, dogmatic law method, statistical methods, surveys and interviews, and studies of individual cases.    From the research of this type of crime, I have concluded that these criminal offences are a serious type of crime, which may result in major individual

  13. Motive Criminal Procedure Evidence

    Directory of Open Access Journals (Sweden)

    В. В. Вапнярчук

    2015-03-01

    Full Text Available In the article the need for such a level of mental regulation of behavior of proving motivation. The latter refers to internal motivation conscious entity Criminal Procedure proof, due to specific needs, interests and goals that cause a person to act rishymist. Detailed attention is given to the first two determinants, namely the nature of needs and interests. In particular, analyzes highlighted in the literature variety of needs (physiological, ekzistentsionalni, social, prestige, cognitive, aesthetic and spiritual and the manifestation of some of them in the criminal procedural proof.

  14. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  15. Criminal aspects of domestic violence

    OpenAIRE

    Váňová, Radka

    2013-01-01

    Criminal aspects of domestic violence SUMMARY Domestic violence is a serious social concern with high level of latency. The domestic violence victims protection is ensured by legal standarts of Civil, Administrative and Criminal Law and other legal standarts. Criminal Law is one of the important instruments for tackling of serious forms of domestic violence. However Criminal Law is an instrument "ultima ratio" which needs claiming of subsidiarity principal of the crime repression. The purpose...

  16. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  17. Framing in criminal investigation: How police officers (re)construct a crime.

    Science.gov (United States)

    Salet, Renze

    2017-06-01

    Failures in criminal investigation may lead to wrongful convictions. Insight in the criminal investigation process is needed to understand how these investigative failures may rise and how measures can contribute to the prevention of this kind of failures. Some of the main findings of an empirical study of the criminal investigation process in four cases of major investigations are presented here. This criminal investigation process is analyzed as a process of framing, using Goffman's framing (Goffman, 1975) and interaction theories (Goffman, 1990). It shows that in addition to framing, other substantive and social factors affect the criminal investigation.

  18. PROBLEM OF CRIMINAL REPRESSION, APPLIED OUTSIDE OF CRIMINAL LIABILITY

    Directory of Open Access Journals (Sweden)

    Vitaly Stepashin

    2017-01-01

    Full Text Available УДК 343.2A new institute of repressive measures applied outside the criminal liability in criminal law (including as a condition for exemption from criminal liability is forming now in Russian legislation. The author concludes that the provisions of the criminal law on monetary compensation and a court fine should be deleted because of the following reasons. 1 By their nature, and monetary compensation and a court fine, not being a formal punishment (and, therefore, a form of realization of criminal responsibility is a monetary penalty, i.e., penalty-punishment. Moreover, the rules of court fine destination identical rules of criminal sentencing. 2 Quantitatively court fine may exceed the minimum limits of criminal punish-ment in the form of fines. The dimensions of monetary compensation in the order of hours. Pt. 2, Art. 76.1 of the Criminal Code and at all close to the maximum values of fine-punishment. 3 Exemption from criminal liability requires states to refrain from prosecuting the person alleged to have committed a crime, which means that the nonuse of criminal repression. Regulatory standards analyzed, on the other hand, require mandatory use of repression, ie, virtually no exemption from criminal liability does not occur at all. 4 The use of a quasi-penalty in the form of monetary compensation and court fines are not an exemption from criminal responsibility, but on the contrary, the use of criminal repression (of responsibility, and in a simplified manner. 5 Contrary to the requirements of the Constitution and the Criminal Code of criminal repression is applied to persons whose guilt has not been established in the commission of a crime. Thus, in criminal law introduced a presumption of guilt. 6 Customization repression (in fact – of criminal responsibility in the application of the judicial penalty is substantially limited, and the application of monetary compensation is excluded at all, contrary to the requirement that the rough

  19. Criminal Justice Web Sites.

    Science.gov (United States)

    Dodge, Timothy

    1998-01-01

    Evaluates 15 criminal justice Web sites that have been selected according to the following criteria: authority, currency, purpose, objectivity, and potential usefulness to researchers. The sites provide narrative and statistical information concerning crime, law enforcement, the judicial system, and corrections. Searching techniques are also…

  20. Managing Criminal Investigations.

    Science.gov (United States)

    Bloch, Peter B.; Weidman, Donald R.

    The report discusses many ways for police managers to improve the success of their departments' criminal investigation efforts. Management issues addressed include budgeting and allocating resources; improving relationships with the prosecutor; interacting with the public, especially victims and witnesses; improving relationships between…

  1. The Influence of Beccaria in Modern Criminal Law

    Directory of Open Access Journals (Sweden)

    Manuel Alberto Leyva Estupiñán

    2015-12-01

    Full Text Available “On Crimes and Punishments” by Cesar Beccaria is a fundamental work for modern Criminal Law. The ideas of liberal Criminal Law are presented throughout the book and the basis of philosophy used as a criteria, clearly reappears in Western thought by the middle of the 18th Century. Beccaria is one of the first authors that actually criticize the inquisitive system and canonical law from a philosophical and Criminal Law point of view. The author criticizes capital punishment, tortures to the accused and concludes that prevention should be the final objective of punishment.

  2. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  3. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  4. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  5. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  6. Criminal Homicide Because of Blood Feud

    OpenAIRE

    Leyla Cak›c› Gercek; Jale Bafra

    2005-01-01

    Although so much progress going on in every field, the crimes of killing man impelled by blood feud carry on their existance. All jurisprudences and the decisions of the Court of Appeal about the criminal homicides connected with this type of crimes ha- ve been carefully examined. The required measures to prevent that, the criticisms againist the decisions of the Court of Appeal and the factors explained in the decisions of that Co- urt have been determined.

  7. Criminal Justice History

    Directory of Open Access Journals (Sweden)

    Thomas Krause

    2005-01-01

    Full Text Available This review article discusses studies on the history of crime and the criminal law in England and Ireland published during the last few years. These reflect the ›history of crime and punishment‹ as a more or less established sub-discipline of social history, at least in England, whereas it only really began to flourish in the german-speaking world from the 1990s onwards. By contrast, the legal history of the criminal law and its procedure has a strong, recently revived academic tradition in Germany that does not really have a parallel in the British Isles, whose legal scholars still evidence their traditional reluctance to confront penal subjects.

  8. Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment

    Science.gov (United States)

    2007-11-01

    for the legal or gray market acquisition of weapons—sometimes in huge quantities—and including far more than the side arms sometimes specified in...passing interest only—but reflecting the reputation for “gray market ,” legally questionable, or downright illegal private security initiatives in...these groups, some Licorne soldiers [deployed French “ Unicorn Force” peacekeep- ers], once their four-month commission is up, come knock- ing at their

  9. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer

    2004-01-01

    ... to continually evade law enforcement. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  10. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer L

    2005-01-01

    ... to evade law enforcement continually. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  11. Terrorist speech and the criminal law – a comparative analysis / Johannes Keiler

    Index Scriptorium Estoniae

    Keiler, Johannes

    2017-01-01

    Inglismaa ja Madalmaade kriminaalõigussüsteemide võitlusest terroristliku kõne vastu, terroristliku kõne abil otsesest ja kaudsest õhutamisest terrorismile. Terroristliku kõne kriminaliseerimisest

  12. Pathological gambling and criminality.

    Science.gov (United States)

    Folino, Jorge Oscar; Abait, Patricia Estela

    2009-09-01

    To review research results on the relationship between pathological gambling and criminality, published in 2007 and 2008, in English and in Spanish. An important association between pathological gambling and criminality was confirmed in populations of anonymous gamblers, helpline callers and substance abusers. Helplines provide a timely service to gamblers who have not reached the maximum stages in the development of a pathological gambling pattern. Pathological gambling is associated with violence in couples and dysfunctional families. Inversely, violence is also an antecedent promoting vulnerability toward pathological gambling. Impulsiveness shows diverse relationships with pathological gambling and violence as well. A pathological gambler's involvement in crime is exceptionally considered without responsibility by justice, but it may be an indicator of the disorder severity and the need for special therapeutic tactics. While reviewing the present study, research work was published that contributed to a better understanding of the association between pathological gambling and criminality and went further into their complex relationship and the formulation of explanatory models related to impulsiveness.

  13. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  14. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  15. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  16. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  17. International Criminal Law & Its Paradoxes

    DEFF Research Database (Denmark)

    Carlson, Kerstin Bree

    2017-01-01

    criminal law are unrealizable under current ICT practice. This is due to international criminal law's foundational, legitimizing basis in natural law, rather than political liberalism. The article calls for a revision of ICT institutional accountability structures.......This article challenges international criminal tribunals' (ICTs) capacity to perform the socially constitutive work of transitional justice. Highlighting paradigmatic ICT jurisprudence, it shows both the "progress" and "justice" constructs central to the work and legitimacy of international...

  18. Racial Profiling and Criminal Justice

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2011-01-01

    According to the main argument in favour of the practice of racial profiling as a low enforcement tactic, the use of race as a targeting factor helps the police to apprehend more criminals. In the following, this argument is challenged. It is argued that, given the assumption that criminals...... are currently being punished too severely in Western countries, the apprehension of more criminals may not constitute a reason in favour of racial profiling at all....

  19. Drones in (Slovene) criminal investigation

    OpenAIRE

    Boštjan, Slak

    2016-01-01

    Unmanned aircrafts, also known as drones, are increasingly used in modern society. Their versatility allows them to be used in a range of different industries, sectors, spheres and activities, including in the area of policing and criminal investigation. In policing, drones are primarily used for the control of state borders, public events and traffic, while their use in criminal investigation is related all from assisting crime scene investigation to tracking suspects or criminal gangs. The ...

  20. Addiction between therapy and criminalization.

    Science.gov (United States)

    Birklbauer, Alois; Schmidthuber, Kathrin

    2014-12-01

    The present paper delves into the question of whether and to what extent it is appropriate to leave addiction problems between the conflicting priorities of therapy and criminalization. After outlining the issue the criminal addictive behaviour including crimes associated with drug misuse and with obtaining drugs is described. Subsequently it is discussed if and how you could make allowances for addiction-related legal insanity in the criminal law sector. Following a few remarks on the principle of "voluntary therapy instead of penal sanction" as a way to alleviate the strict law on narcotic drugs misuse a summary and an outlook with criminal-political demands complete the issue.

  1. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  2. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  3. Behavioral Genetics in Criminal and Civil Courts.

    Science.gov (United States)

    Sabatello, Maya; Appelbaum, Paul S

    Although emerging findings in psychiatric and behavioral genetics create hope for improved prevention, diagnosis, and treatment of disorders, the introduction of such data as evidence in criminal and civil proceedings raises a host of ethical, legal, and social issues. Should behavioral and psychiatric genetic data be admissible in judicial proceedings? If so, what are the various means for obtaining such evidence, and for what purposes should its admission be sought and permitted? How could-and should-such evidence affect judicial outcomes in criminal and civil proceedings? And what are the potential implications of using behavioral and psychiatric genetic evidence for individuals and communities, and for societal values of equality and justice? This article provides an overview of the historical and current developments in behavioral genetics. We then explore the extent to which behavioral genetic evidence has-and should-affect determinations of criminal responsibility and sentencing, as well as the possible ramifications of introducing such evidence in civil courts, with a focus on tort litigation and child custody disputes. We also consider two ways in which behavioral genetic evidence may come to court in the future-through genetic theft or the subpoena of a litigant's biospecimen data that was previously obtained for clinical or research purposes-and the concerns that these possibilities raise. Finally, we highlight the need for caution and for approaches to prevent the misuse of behavioral genetic evidence in courts.

  4. Safeguarding the Dignity of Women under the Criminal Law Amendment Act 2013-A Critical Analysis

    OpenAIRE

    R C Borpatragohain

    2013-01-01

    This viewpoint aims to analyse the Criminal Law Amendment Act 2013 from a legal perspective. In doing so, it discusses the statutory safeguards of rights to a dignified life of a woman by analysing the various existing laws, which have been significantly amended to build the Criminal Act, 2013. These laws are: Indian Penal Code (IPC) 1860; Indian Evidence Act 1872, Code of Criminal Procedure as amended in 1973, Immoral Trafficking Prevention Act 1956, Information Technology Act 2000, The Juve...

  5. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  6. Criminal recidivism in sexual homicide perpetrators.

    Science.gov (United States)

    Hill, Andreas; Habermann, Niels; Klusmann, Dietrich; Berner, Wolfgang; Briken, Peer

    2008-02-01

    Forensic psychiatric reports on 166 sexual homicide perpetrators in Germany were retrospectively analyzed for criminal risk factors. Follow-up information about release and reconvictions from federal criminal records was available for 139 offenders; 90 (64.7%) had been released. The estimated recidivism rate (Kaplan-Meier analyses) for 20 years at risk was 23.1% for sexual and 18.3% for nonsexual violent reoffences. Three men (3.3%) were reconvicted for attempted or completed homicide. Only young age at the time of sexual homicide resulted in higher sexual recidivism, whereas increased nonsexual violent recidivism was related to previous sexual and nonsexual delinquency, psychopathic symptoms, and higher scores in risk assessment instruments. Increased recidivism with any violent reoffence was associated with age-related factors: young age at first sexual offence, at homicide, and at release and duration of detention. The impacts of the results for risk assessment, relapse prevention, and supervision are discussed.

  7. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  8. [The pedophilic criminal].

    Science.gov (United States)

    Heim, M; Morgner, J

    1985-02-01

    After a review of the literature dealing with pedophilia, the results of an analysis of 100 forensic psychiatric reports dealing with pedophile criminals are described. They show that, except for a few homosexual pedophiles, pedophilia is a pseudoperversion originating from different developmental conditions and, in individual cases, verifiable personality traits. The authors discuss problems involved in the forensic-psychiatric assessment of these delinquents. Attention is drawn to the necessity of purposeful, coordinated further education in this respect to enable the existing considerable discrepancies between forensic-psychiatric evaluation of these and other sexual deviants to be overcome.

  9. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  10. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  11. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  12. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  13. Defendants' Rights in Criminal Trials.

    Science.gov (United States)

    Martin, Ralph C., II; Keeley, Elizabeth

    1997-01-01

    Reviews the protections afforded by the Constitution for defendants in criminal trials. These include the right to a jury trial (in cases of possible incarceration), an impartial jury, and the requirement of a unanimous verdict. Defends the use of plea bargaining as essential to an efficient criminal justice system. (MJP)

  14. Drug Use and Criminal Behavior

    Science.gov (United States)

    Fink, Ludwig; Hyatt, Murray P.

    1978-01-01

    An overview of addiction and crime is presented. Crimes of violence and sex crimes are contrasted with non-violent criminal behavior when drug-connected. It is suggested that alternative methods of dealing with drug abuse and criminal behavior be explored, and that several previously discarded methods be re-examined. (Author)

  15. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  16. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  17. Rethinking Conceptual Definitions of the Criminal Career and Serial Criminality.

    Science.gov (United States)

    Edelstein, Arnon

    2016-01-01

    Since Cesare Lombroso's days, criminology seeks to define, explain, and categorize the various types of criminals, their behaviors, and motives. This aim has theoretical as well as policy-related implications. One of the important areas in criminological thinking focuses chiefly on recidivist offenders who perform large numbers of crimes and/or commit the most dangerous crimes in society (rape, murder, arson, and armed robbery). These criminals have been defined as "habitual offenders," "professional criminals," "career criminals," and "serial offenders." The interest in these criminals is a rational one, given the perception that they present a severe threat to society. The main challenge in this area of research is a conceptual problem that has significant effects across the field. To this day, scholars have reused and misused titles to define and explain different concepts. The aim of this article is 3-fold. First, to review the concepts of criminal career, professional crime, habitual offenses, and seriality with a critical attitude on confusing terms. Second, to propose the redefinition of concepts mentioned previously, mainly on the criminal career. Third, to propose a theoretical model to enable a better understanding of, and serve as a basis for, further research in this important area of criminology. © The Author(s) 2015.

  18. An inappropriate tool: criminal law and HIV in Asia.

    Science.gov (United States)

    Csete, Joanne; Dube, Siddharth

    2010-09-01

    Asian countries have applied criminal sanctions widely in areas directly relevant to national HIV programmes and policies, including criminalization of HIV transmission, sex work, homosexuality and drug injection. This criminalization may impede universal access to HIV prevention and treatment services in Asia and undermine vulnerable people's ability to be part of the HIV response. To review the status of application of criminal law in key HIV-related areas in Asia and analyze its impact. Review of literature and application of human rights norms to analysis of criminal law measures. Criminal laws in the areas considered here and their enforcement, while intended to reduce HIV transmission, are inappropriate and counterproductive with respect to health and human rights. Governments should remove punitive laws that impede the HIV response and should ensure meaningful participation of people living with HIV, people who use illicit drugs, sex workers and men who have sex with men in combating stigma and discrimination and developing rights-centered approaches to HIV.

  19. Predicting criminality from child maltreatment typologies and posttraumatic stress symptoms

    Science.gov (United States)

    Elklit, Ask; Karstoft, Karen-Inge; Armour, Cherie; Feddern, Dagmar; Christoffersen, Mogens

    2013-01-01

    Background The associations between childhood abuse and subsequent criminality and posttraumatic stress disorder (PTSD) are well known. However, a major limitation of research related to childhood abuse and its effects is the focus on one particular type of abuse at the expense of others. Recent work has established that childhood abuse rarely occurs as a unidimensional phenomenon. Therefore, a number of studies have investigated the existence of abuse typologies. Methods The study is based on a Danish stratified random probability survey including 2980 interviews of 24-year-old people. The sample was constructed to include an oversampling of child protection cases. Building on a previous latent class analysis of four types of childhood maltreatment, three maltreatment typologies were used in the current analyses. A criminality scale was constructed based on seven types of criminal behavior. PTSD symptoms were assessed by the PC-PTSD Screen. Results Significant differences were found between the two genders with males reporting heightened rates of criminality. Furthermore, all three maltreatment typologies were associated with criminal behavior with odds ratios (ORs) from 2.90 to 5.32. Female gender had an OR of 0.53 and possible PTSD an OR of 1.84. Conclusion The independent association of participants at risk for PTSD and three types of maltreatment with criminality should be studied to determine if it can be replicated, and considered in social policy and prevention and rehabilitation interventions. PMID:23626869

  20. Predicting criminality from child maltreatment typologies and posttraumatic stress symptoms

    Directory of Open Access Journals (Sweden)

    Ask Elklit

    2013-04-01

    Full Text Available Background: The associations between childhood abuse and subsequent criminality and posttraumatic stress disorder (PTSD are well known. However, a major limitation of research related to childhood abuse and its effects is the focus on one particular type of abuse at the expense of others. Recent work has established that childhood abuse rarely occurs as a unidimensional phenomenon. Therefore, a number of studies have investigated the existence of abuse typologies. Methods: The study is based on a Danish stratified random probability survey including 2980 interviews of 24-year-old people. The sample was constructed to include an oversampling of child protection cases. Building on a previous latent class analysis of four types of childhood maltreatment, three maltreatment typologies were used in the current analyses. A criminality scale was constructed based on seven types of criminal behavior. PTSD symptoms were assessed by the PC-PTSD Screen. Results: Significant differences were found between the two genders with males reporting heightened rates of criminality. Furthermore, all three maltreatment typologies were associated with criminal behavior with odds ratios (ORs from 2.90 to 5.32. Female gender had an OR of 0.53 and possible PTSD an OR of 1.84. Conclusion: The independent association of participants at risk for PTSD and three types of maltreatment with criminality should be studied to determine if it can be replicated, and considered in social policy and prevention and rehabilitation interventions.

  1. CONCEPTUAL AGGREGATION OF CRIMINAL OFFENCES SEPARATION FROM COLLISION OF THE CRIMINAL LAW NORMS

    OpenAIRE

    Persidskis, Ainārs

    2017-01-01

    The topic of the paper is the conceptual aggregation of criminal offences separation from collision of the Criminal Law norms. The conceptual aggregation of criminal offences is the most difficult type of all multiplicity types of criminal offences. This research paper provides an overview of the conceptual aggregation of criminal offences separation from collision of the Criminal Law norms. In the paper is given analyses of conceptual aggregation of criminal offences separation from collisio...

  2. The reaction to femicide in criminal law

    Directory of Open Access Journals (Sweden)

    Batrićević Ana

    2016-01-01

    Full Text Available Misogynous and sexist violence against women, which often results in death, represents a global problem. Numerous international and national legal instruments are dedicated to the prevention and sanctioning of violence against women. However, the reality implies that existing mechanisms of penal reaction to femicide, as its most extreme and brutal form, should be re-examined. Having in mind the frequency and severe consequences of this criminal offence and the discriminatory character of the message that the state sends by tolerating it or inadequately punishing its perpetrators, the author attempts to define femicide, to present basic forms of state reaction to femicide in comparative law as well as to analyze the features of femicide as an independent criminal offence. Arguing for the incrimination of femicide as an independent criminal offence, or as a special form of aggravated murder, the author points out that such solution could contribute to more precise observation of this form of crime, to a better estimation of the quality of the state‘ s reaction to it and to its more efficient suppression.

  3. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  4. Constitutional collisions of criminal law

    Directory of Open Access Journals (Sweden)

    Sergey M. Inshakov

    2016-12-01

    Full Text Available Objective to identify and resolve conflicts between the norms of constitutional and criminal law which regulate the issue of legal liability of senior officials of the state. Methods formallogical systematic comparativelegal. Results the article analyzes the embodiment of the principle of citizensrsquo equality under the law regarding the criminal responsibility of the President of the Russian Federation as one of the segments of the elite right other criminal and legal conflicts are considered associated with the creation of conditions for derogation from the principle of equality. Basing on this analysis the means of overcoming collisions between the norms of constitutional and criminal law are formulated. Scientific novelty in the article for the first time it has been shown that in the Russian criminal law there are exceptions to the principle of citizensrsquo equality under the law relating to the President of the Russian Federation the conflicts are identified between the norms of constitutional and criminal law regulating the issue of legal liability of senior officials of the state ways of overcoming conflicts are suggested. Practical significance the main provisions and conclusions of the article can be used in research and teaching in the consideration of issues of senior state officialsrsquo criminal liability.

  5. CRIMINAL PROTECTION OF PRIVATE LIFE

    Directory of Open Access Journals (Sweden)

    RADU SLAVOIU

    2012-05-01

    Full Text Available This study is meant, first of all, to analyze the incriminations that the new Romanian Criminal Code sets for the protection of a person’s private life as a social value of maximum significance both for the human being and for any democratic society as a whole.There are two criminal offences treated in this study that are not to be found in the current criminal legislation: violation of private life and criminal trespassing of a legal person’s property. Likewise, the study will bring forth the novelties and the differences regarding the offences of criminal trespassing of a natural person’s property, disclosure of professional secret, violation of secret correspondence, illegal access to computerized system and illegal interception of electronic data transfer – acts that when, directly or indirectly, committed can cause harm to the intimacy of a person’s life.As an expression of the interdisciplinary nature of this subject, the study also sets out, as a subsidiary aspect, an evaluation of the circumstances under which the new criminal proceeding legislation allows public authorities to interfere with an individual’s private life. Thus, the emphasis is on the analysis of the circumstances under which special surveillance and investigation techniques can be used as evidence proceedings regulated by the new Romanian Criminal Procedure Code.

  6. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  7. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  9. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  10. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  11. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  12. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  13. Objective Truth Institution in Criminal Procedure

    Directory of Open Access Journals (Sweden)

    Voltornist O. A.

    2012-11-01

    Full Text Available The article deals with the category of objective truth in criminal procedure, its importance for correct determination of criminal court procedure aims. The author analyzes also the bill draft offered by the RF Committee of Inquiry “On amending in the RF Criminal Procedure Code due to the implementation ofobjective truth institution in criminal procedure”

  14. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  15. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  16. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  17. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  18. Criminal Law Study Guide (Revision)

    National Research Council Canada - National Science Library

    1998-01-01

    .... Correct application of principles of military criminal law. This study guide is the is the primary text for students in the course and may be also useful to practicing judge advocates as a starting point for research...

  19. Handedness, criminality, and sexual offending.

    Science.gov (United States)

    Bogaert, A F

    2001-01-01

    A very large database was used to investigate whether men with a history of criminality and/or sexual offending have a higher incidence of nonright-handedness (NRH) relative to a control sample of nonoffender men. The sample (N>8000) comprised interviews by investigators at the Kinsey Institute for Sex and Reproduction in Indiana. The general offender group and a subsample of sex offenders (e.g. pedophiles) had a significantly higher rate of NRH relative to the control (nonoffender) men. In addition, evidence was found that the general criminality/NRH relationship might result from increased educational difficulties that some nonright-handers experience. In contrast, education was unrelated to the handedness/pedophilia relationship, suggesting that there may be a different mechanism underlying the handedness/pedophile relationship than the handedness/(general) criminality relationship. Finally, as a cautionary note, it is stressed that the effects are small and that NRH should not be used as a marker of criminality.

  20. Criminal Aspects of Artificial Abortion

    OpenAIRE

    Hartmanová, Leona

    2016-01-01

    Criminal Aspects of Artificial Abortion This diploma thesis deals with the issue of artificial abortion, especially its criminal aspects. Legal aspects are not the most important aspects of artificial abortion. Social, ethical or ideological aspects are of the same importance but this diploma thesis cannot analyse all of them. The main issue with artificial abortion is whether it is possible to force a pregnant woman to carry a child and give birth to a child when she cannot or does not want ...

  1. The public appeal as the through criminal term: statement of a question

    Directory of Open Access Journals (Sweden)

    Микола Анатолійович Рубащенко

    2017-09-01

    Full Text Available The author of the article supports the introduction of  «the through criminal legal concepts» into the science of criminal law. It is more expedient to use the phrase «the through terms», wherein the through terms have such signs: they are used in the law two or more times; they denote the same concept. The research is based on the fact that the Criminal Code of Ukraine provides for criminal liability for public appeals for various criminal acts: encroachment of the territorial integrity of the state (Art. 110 of the CC, seizure of state power or overthrow of constitutional order (Art. 109 of the CC, terrorist act (art. 258-2 CC, mass riots (Art. 295 of the CC, cruelty to animals (Art. 299 of the CC, act of aggression (Art. 436 of the CC, genocide (Art. 442 of the CC. In legal practice, all these articles are interpreted and applied in different. The necessity of researching public appeals and related acts as through terms is grounded. The through nature of public appeals, the spreading of materials with appeals, the making and storage of materials with appeals are argued. It is proposed to investigate through terms taking into account the context and taking into account systemic links with other criminal legal terms. The recognition that the investigated concept are through, opens a promising direction for the synthesis and application of inductive reasoning. This means the moving from knowledge about public appeals, as separate types of crimes, to knowledge of public appeals, as a generic act common to all of their species.

  2. Gambling and Impulsivity Traits: A Recipe for Criminal Behavior?

    Science.gov (United States)

    Mestre-Bach, Gemma; Steward, Trevor; Granero, Roser; Fernández-Aranda, Fernando; Talón-Navarro, María Teresa; Cuquerella, Àngel; Baño, Marta; Moragas, Laura; Del Pino-Gutiérrez, Amparo; Aymamí, Neus; Gómez-Peña, Mónica; Mallorquí-Bagué, Núria; Vintró-Alcaraz, Cristina; Magaña, Pablo; Menchón, José Manuel; Jiménez-Murcia, Susana

    2018-01-01

    Gambling disorder (GD) is a psychiatric condition that was recently recategorized as a non-substance-related addiction in the Diagnostic and Statistical Manual of Mental Health Disorders. Criminal activity is commonly associated with gambling; however, few empirical studies to date have examined sociodemographic and psychological variables in this population. In this study, we explored criminal behavior history in a sample of consecutively recruited treatment-seeking gamblers ( n  = 382) and compared subjects with a history of illegal acts ( n  = 103, 26.9%) to those with no criminal record ( n  = 279, 73.1%). Impulsivity and personality traits were specifically explored, along with other gambling-related severity factors. We found that gamblers who engaged in illegal activity were more likely to endorse high levels of urgency (i.e., the tendency to act out when experiencing heightened emotional states) and increased lack of premeditation. Gamblers with a history of criminal behavior also had greater GD severity levels and gambling-related debts. Additionally, these gamblers reported lower levels of self-directedness, which is characterized by difficulty in establishing and redirecting behavior toward one's goals. Likewise, gamblers who had conducted criminal acts showed a tendency to engage in greater risk-taking behavior. These results shed new light on this understudied population and provide insights for developing targeted harm-prevention interventions and treatment protocols.

  3. Gambling and Impulsivity Traits: A Recipe for Criminal Behavior?

    Directory of Open Access Journals (Sweden)

    Gemma Mestre-Bach

    2018-01-01

    Full Text Available Gambling disorder (GD is a psychiatric condition that was recently recategorized as a non-substance-related addiction in the Diagnostic and Statistical Manual of Mental Health Disorders. Criminal activity is commonly associated with gambling; however, few empirical studies to date have examined sociodemographic and psychological variables in this population. In this study, we explored criminal behavior history in a sample of consecutively recruited treatment-seeking gamblers (n = 382 and compared subjects with a history of illegal acts (n = 103, 26.9% to those with no criminal record (n = 279, 73.1%. Impulsivity and personality traits were specifically explored, along with other gambling-related severity factors. We found that gamblers who engaged in illegal activity were more likely to endorse high levels of urgency (i.e., the tendency to act out when experiencing heightened emotional states and increased lack of premeditation. Gamblers with a history of criminal behavior also had greater GD severity levels and gambling-related debts. Additionally, these gamblers reported lower levels of self-directedness, which is characterized by difficulty in establishing and redirecting behavior toward one’s goals. Likewise, gamblers who had conducted criminal acts showed a tendency to engage in greater risk-taking behavior. These results shed new light on this understudied population and provide insights for developing targeted harm-prevention interventions and treatment protocols.

  4. Gambling and Impulsivity Traits: A Recipe for Criminal Behavior?

    Science.gov (United States)

    Mestre-Bach, Gemma; Steward, Trevor; Granero, Roser; Fernández-Aranda, Fernando; Talón-Navarro, María Teresa; Cuquerella, Àngel; Baño, Marta; Moragas, Laura; del Pino-Gutiérrez, Amparo; Aymamí, Neus; Gómez-Peña, Mónica; Mallorquí-Bagué, Núria; Vintró-Alcaraz, Cristina; Magaña, Pablo; Menchón, José Manuel; Jiménez-Murcia, Susana

    2018-01-01

    Gambling disorder (GD) is a psychiatric condition that was recently recategorized as a non-substance-related addiction in the Diagnostic and Statistical Manual of Mental Health Disorders. Criminal activity is commonly associated with gambling; however, few empirical studies to date have examined sociodemographic and psychological variables in this population. In this study, we explored criminal behavior history in a sample of consecutively recruited treatment-seeking gamblers (n = 382) and compared subjects with a history of illegal acts (n = 103, 26.9%) to those with no criminal record (n = 279, 73.1%). Impulsivity and personality traits were specifically explored, along with other gambling-related severity factors. We found that gamblers who engaged in illegal activity were more likely to endorse high levels of urgency (i.e., the tendency to act out when experiencing heightened emotional states) and increased lack of premeditation. Gamblers with a history of criminal behavior also had greater GD severity levels and gambling-related debts. Additionally, these gamblers reported lower levels of self-directedness, which is characterized by difficulty in establishing and redirecting behavior toward one’s goals. Likewise, gamblers who had conducted criminal acts showed a tendency to engage in greater risk-taking behavior. These results shed new light on this understudied population and provide insights for developing targeted harm-prevention interventions and treatment protocols. PMID:29434553

  5. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  6. Murder in French criminal law

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2015-01-01

    Full Text Available The most dangerous forms and aspects of violent crime are criminal offences against life and bodily integrity of others, which are generally designated as acts of homicide. The most prominent among these criminal offences is the crime of murder. Due to the significance, legal nature, characteristics and consequences of this criminal act, all contemporary legislations prescribe the most severe measures and types of punishment for the commission of this crime. There are three types of murder: 1 ordinary (common murder, 2 murder committed under mitigating circumstances, and 3 murder committed under aggravating circumstances, which is as a rule punishable by the most severe punishment. All contemporary criminal legislations, including French legislation, recognize various types and forms of murder, depending on the classification criteria. The most prominent forms of murder are those involving various motives that induce the perpetrators to cause death to another person. In this paper, the author examines the concept, contents, characteristics, forms and elements of the crime of murder in French criminal law, discussing the theoretical and practical aspects of this issue.

  7. REFLECTION ON THE REVISION OF THE BOOK OF THE LAW OF CRIMINAL LAW AND LAW OF CRIMINAL PROCEDURE OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Marwan Mas

    2015-05-01

    Full Text Available The Principle of the plan revision or amendment Of the Criminal Law Act and LAW No. 8 of 1981 on the law of criminal procedure (Criminal Code is something that necessarily, because a number of judgments were not in accordance with the conditions of the present. Criminal Code which came into effect in 1915 during colonial times, many judgments which are not in line with people's lives today. For example, the ban showed, offering, or broadcast a preventive tool is pregnant, regulated in article 534 Criminal Code, although that provision had never been repealed as opposed to family planning programs. It's just that, those changes also should look at the reality of the needs of the community, particularly on corruption eradication efforts which should not be weakened. One of the crucial second revision of draft laws that are a number of provisions which could potentially undermine the spirit of the eradication of corruption, including the weakening of the authority of the corruption eradication Commission (KPK in dealing with corruption cases.

  8. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  9. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  10. Criminal Policy Challenges under Conditions of Hybrid War: Some Issues and Solutions from Ukraine

    Directory of Open Access Journals (Sweden)

    Pysmenskyy Yevhen

    2016-12-01

    Full Text Available This article studies the specifics of national criminal policy implementation under the influence of extraordinary geopolitical factors on it. Such policy will be reviewed with Ukraine serving as an appropriate example. This country has been recently forced to adjust its own ways of implementation of the state policy against crime based on atypical modern challenges and threats. This refers to the special nature of a hybrid war, which has been actively fought on the territory of Ukraine since 2014. The author examines two key areas of criminal policy (definition of the limits of criminal behavior and establishing criminal law consequences of the committed offenses, implemented under the extraordinary circumstances of hybrid war. Symptomatic features of the hybrid form of foreign aggression are defined in the piece. At the same time, options of criminal law in combating and preventing such aggression are researched.

  11. Methamphetamine use and criminal behavior.

    Science.gov (United States)

    Gizzi, Michael C; Gerkin, Patrick

    2010-12-01

    This research seeks to broaden our understanding of methamphetamine's (meth's) place within the study of drugs and crime. Through extensive court records research and interviews with 200 offenders in local jails in western Colorado, this research contributes to the creation of a meth user profile and begins to identify the place of meth in the drug-crime nexus. The study compares the criminal behavior of meth users with other drug users, finding that meth users are more likely than other drug users to be drunk or high at the time of arrest and claim their crimes were related to drug use in other ways. A content analysis of criminal records demonstrates that meth users have more extensive criminal records and are more likely than other drug users to commit property crimes.

  12. Criminal Liability for Human Abduction​

    Directory of Open Access Journals (Sweden)

    Vyacheslav N. Voronin

    2017-08-01

    Full Text Available The Author considers the quality of the construction of the criminal law provision which is stipulated in article 126 of the Criminal Code of Russian Federation (Kidnapping. The Author signifies some application problems of the concerned article, researches judicial interpretations of the elements of crime characteristics and opinions of contemporary scientists who propose to redraft the article. The Author also analyses the law of Armenia, Belarus, Kyrgyzstan, Turkmenistan, Tajikistan and Latvia. On the basis of the research the Author concludes that a primitive disposition which doesn’t include elements of a criminal conduct doesn’t meet the requirements of legality and legal certainty, and, because of the above-mentioned reason, the Author proposes his own definition of the disposition of kidnapping.

  13. Neurologic disorder and criminal responsibility.

    Science.gov (United States)

    Yaffe, Gideon

    2013-01-01

    Sufferers from neurologic and psychiatric disorders are not uncommonly defendants in criminal trials. This chapter surveys a variety of different ways in which neurologic disorder bears on criminal responsibility. It discusses the way in which a neurologic disorder might bear on the questions of whether or not the defendant acted voluntarily; whether or not he or she was in the mental state that is required for guilt for the crime; and whether or not he or she is deserving of an insanity defense. The discussion demonstrates that a just determination of whether a sufferer from a neurologic disorder is diminished in his or her criminal responsibility for harmful conduct requires equal appreciation of the nature of the relevant disorder and its impact on behavior, on the one hand, and of the legal import of facts about the psychologic mechanisms through which behavior is generated, on the other. © 2013 Elsevier B.V. All rights reserved.

  14. Complicity in International Criminal Law

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2014-01-01

    Complicity is a criminal law doctrine that attributes responsibility to those who do not physically perpetrate the crime. It is an essential mode of liability for core international crimes because it reaches out to senior political and military leadership. These persons do not usually engage...... in direct offending, yet in the context of mass atrocities they are often more culpable than foot soldiers. The Statutes of the ad hoc tribunals, hybrid courts and the International Criminal Court expressly provide for different forms of complicity, and domestic legal systems recognize it in one form...... or another. This is in contrast with alternative modes of liability implied from the Statutes to address the situations with multiple accused removed from the scene of the crime / (in)direct co-perpetration, extended perpetration and the joint criminal enterprise....

  15. The European Union and National Criminal Law

    DEFF Research Database (Denmark)

    Greve, Vagn

    1995-01-01

    Beware of Punishment. Annika Snare (ed.) Beware of Punishment. On the Utility and Futility of Criminal Law......Beware of Punishment. Annika Snare (ed.) Beware of Punishment. On the Utility and Futility of Criminal Law...

  16. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  17. Holy Terror, Batman! Frank Miller’s Dark Knight and the Superhero as Hardboiled Terrorist

    Directory of Open Access Journals (Sweden)

    Daniele Croci

    2016-05-01

    Full Text Available Conceived in the late thirties as “bold humanist response to Depression-era fears of runaway scientific advance and soulless industrialism” (Morrison 2012, 6, the superhero has flourished as one of the most resilient archetypes of American popular culture. This essay analyses the literary and cultural contaminations that have engendered an unprecedented revision of the paradigm since the 1980s. In particular, it will take into account three graphic novels by American cartoonist Frank Miller (1957 - , one of leading figures of the mainstream comics renaissance, whose ideas have indelibly influenced the artistic development of both medium and genre. The Dark Knight Returns (1986, The Dark Knight Strikes Again (2002 and Holy Terror (2011 constitute an ideal Batman trilogy that charts the character’s evolution as political counterpoint to the perceived crisis of American identity. In this regard, Reaganism and 9/11 are polarized as historical discontinuities triggering the need for a new kind of a criminal (superhero. It will be in fact demonstrated how the novels hybridise the latent generic links to hardboiled pulp novels (R. Chandler, D. Hammet with narrative and aesthetics elements appropriated from the culturally-received concepts of terrorism and terrorists. This fruitful contamination on the one hand “play[s] with reader assumptions about genre” (Baetens and Frey 2015, 46, while on the other hand deconstructs the ideological underpinnings of the archetype, as the moral dichotomy and the alienation of justice from the law.

  18. Relation of criminal offence of tax evasion and criminal offence of non-payment of withholding tax in Serbian criminal law

    OpenAIRE

    Kulić, Mirko; Milošević, Goran

    2011-01-01

    Countries often resort to tightening of criminal sanctions against those who do not fulfill their tax obligations on time. Instead of more organized undertaking of measures to eliminate the causes of tax crime, Serbia seeks to solve the problem by upgrading the criminal legislation. There are six criminal offences which provide for criminal law protection of public revenues. Among these criminal offences, the central place belongs to the criminal offence of tax evasion and criminal offence of...

  19. Defence counsel in international criminal law

    NARCIS (Netherlands)

    Temminck Tuinstra, J.P.W.

    2009-01-01

    The field of international criminal law is relatively new and rapidly developing. This dissertation examines whether international criminal courts enable defence counsel to conduct an effective defence. When the International Criminal Tribunals for the former Yugoslavia and Rwanda (the ad hoc

  20. Interpreter in Criminal Cases: Allrounders First!

    Science.gov (United States)

    Frid, Arthur

    1974-01-01

    The interpreter in criminal cases generally has had a purely linguistic training with no difference from the education received by his colleague interpreters. The position of interpreters in criminal cases is vague and their role depends to a large extent on individual interpretation of officials involved in the criminal procedure. Improvements on…

  1. Effectiveness of the "Transcendental Medication" Program in Criminal Rehabilitation and Substance Abuse Recovery: A Review of the Research.

    Science.gov (United States)

    Hawkins, Mark A.

    2003-01-01

    Reviews research on the Transcendental Meditation (TM) program relevant to the treatment and prevention of criminal behavior and substance abuse. Incarcerated offenders show rapid positive changes in risk factors associated with criminal behavior, including anxiety, aggression, hostility, moral judgment, in-prison rule infractions, and substance…

  2. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  3. The problem of "significant risk": exploring the public health impact of criminalizing HIV non-disclosure.

    Science.gov (United States)

    Mykhalovskiy, Eric

    2011-09-01

    Using criminal law powers to respond to people living with HIV (PHAs) who expose sexual partners to HIV or transmit the virus to them is a prominent global HIV public policy issue. While there are widespread concerns about the public health impact of HIV-related criminalization, the social science literature on the topic is limited. This article responds to that gap in knowledge by reporting on the results of qualitative research conducted with service providers and PHAs in Canada. The article draws on a studies in the social organization of knowledge perspective and insights from critical criminology and work on the "medico-legal borderland." It investigates the role played by the legal concept of "significant risk" in coordinating criminal law governance and its interface with public health and HIV prevention. In doing so, the article emphasizes that exploring the public health impact of criminalization must move past the criminal law--PHA dyad to address broader social and institutional processes relevant to HIV prevention. Drawing on individual and focus group interviews, this article explores how criminal law governance shapes the activities of providers engaged in HIV prevention counseling, conceptualized as a complex of activities linking clinicians, public health officials, front-line counselors, PHAs, and others. It emphasizes three key findings: (1) the concept of significant risk poses serious problems to risk communication in HIV counseling and contributes to contradictory advice about disclosure obligations; (2) criminalization discourages PHAs' openness about HIV non-disclosure in counseling relationships; and (3) the recontextualization of public health interpretations of significant risk in criminal proceedings can intensify criminalization. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Tax penalties : minor criminal charges?

    NARCIS (Netherlands)

    Baron, J.; Poelmann, Eric

    2017-01-01

    In European Court of Human Rights (ECtHR) 15 November 2016, No. 24130/11 and 29758/11, (A. and B. v. Norway) the Jussila-doctrine was repeated once again. The ECtHR seems to have taken the next step in the discussion whether the criminal-head guarantees of Article 6 ECHR and other fundamental rights

  5. Cultural Cleavage and Criminal Justice.

    Science.gov (United States)

    Scheingold, Stuart A.

    1978-01-01

    Reviews major theories of criminal justice, proposes an alternative analytic framework which focuses on cultural factors, applies this framework to several cases, and discusses implications of a cultural perspective for rule of law values. Journal available from Office of Publication, Department of Political Science, University of Florida,…

  6. PROCEDURAL ASPECTS REGARDING CORRUPTION CRIMES AS STIPULATED IN THE CRIMINAL CODE OF LAW AND LAW NO. 78/2000

    Directory of Open Access Journals (Sweden)

    Anca Lelia Lorincz

    2012-11-01

    Full Text Available The intensification of the European political and economic integration also requires that our country contributes to continuing the tradition of incriminating criminal deeds perpetrated in the business field. Romanian authorities display their constant interest in expanding their knowledge of the crime phenomenon in this field, while looking to identify effective means to control it. Within this context, corruption crimes approached in the Criminal Code of Law and in Law no. 78/2000 take a distinct place within the group of crimes for which prevention and combating is regulated under the Business Criminal Code of Law. In order to ensure celerity in solving criminal cases involving corruption crimes, certain derogations from the usual procedure were required, as well as enforcement of a special procedure; also, specific procedural aspects regarding corruption crimes need to be retained as we look at the coming into force of the new criminal and criminal procedure legislation.

  7. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  8. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  9. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  10. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  11. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  12. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  13. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  14. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  15. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  16. The Execution of Criminal Fine Penalty

    Directory of Open Access Journals (Sweden)

    Cosmin Peneoașu

    2014-05-01

    Full Text Available This paper aims at dissecting the criminal provisions on criminal enforcement of fines in current Romanian criminal law with the goal of highlighting the new penal policy stated in the larger field of criminal penalties. In the new Criminal Code the fine penalty experience a new regulation, but also a wider scope compared to the Criminal Code from 1968, with an exponential growth of the number of offenses or variations of them, for which a fine may be imposed as a unique punishment, but, especially, as an alternative punishment to imprisonment. Consequently, to ensure the efficiency of this punishment, the effective enforcement manner of the fine takes a new dimension. The study aims both students and academics or practitioners in the making. Furthermore, throughout the approach of this scientific research, new matters that new criminal legislation brings, are emphasized regarding this institution, both in a positive, and especially under a critical manner.

  17. Money Laundering. Aspects of Legal and Criminal Issues

    Directory of Open Access Journals (Sweden)

    Alina DUMITRACHE

    2011-11-01

    Full Text Available This study aims at analyzing objectively various techniques and methods of money laundering, both in classical and modern ways, by presenting case studies from the legal practice in Romania, in an attempt to clarify a number of issues related to the complexity of this crime, current and future tendencies of financial criminals for laundering proceeds of crime. Also, according to the analysis of comparative law performed in the last chapter, we highlighted a number of similarities and differences between the Romanian legislation and the legislative laws of other states, surprising the forms and effects of money laundering on the studied national systems as well as highlighting the measures for preventing and fighting against these crimes adopted by the analyzed legal systems. The comparative approach of the criminal and legal framework of preventing and combating money laundering is essential for the Romanian legal system efficiency in this matter.

  18. Understanding criminal behavior: Empathic impairment in criminal offenders.

    Science.gov (United States)

    Mariano, Melania; Pino, Maria Chiara; Peretti, Sara; Valenti, Marco; Mazza, Monica

    2017-08-01

    Criminal offenders (CO) are characterized by antisocial and impulsive lifestyles and reduced empathy competence. According to Zaki and Ochsner, empathy is a process that can be divided into three components: mentalizing, emotional sharing and prosocial concern. The aim of our study was to evaluate these competences in 74 criminal subjects compared to 65 controls. The CO group demonstrated a lower ability in measures of mentalizing and sharing, especially in recognizing the mental and emotional states of other people by observing their eyes and sharing other people's emotions. Conversely, CO subjects showed better abilities in prosocial concern measures, such as judging and predicting the emotions and behavior of other people, but they were not able to evaluate the gravity of violations of social rules as well as the control group. In addition, logistic regression results show that the higher the deficits in the mentalizing component are, the higher the probability of committing a crime against another person. Taken together, our results suggest that criminal subjects are able to judge and recognize other people's behavior as right or wrong in a social context, but they are not able to recognize and share the suffering of other people.

  19. Criminalizing rape within marriage: perspectives of Ghanaian university students.

    Science.gov (United States)

    Adinkrah, Mensah

    2011-09-01

    Forcing sexual intercourse on an unwilling marital partner, or marital rape, is not a crime in many societies around the world, because of a marital exemption rule that prohibits the prosecution of husbands who rape their wives. Concurrently, marital rape is one of the least studied phenomena in sexual violence research. This is particularly true for societies in the non-Western world. The current study examined the general attitudes of a sample of university students in Ghana, a West African country, toward marital rape. Respondents were also asked whether an ongoing legislative effort to criminalize marital rape in the country was warranted. The results indicated strong opposition toward criminalization. The results also indicated no marked differences between male and female respondents in attitudes toward marital rape and the need for a legislative response to the phenomenon. Patriarchal ideologies such as wifely submission to the husband and an implicit duty to provide sex in marriage provided some of the justifications furnished for why marital rape should remain noncriminalized. Advocates of criminalization mentioned the social, physical, and psychological effects of rape and how the enactment of marital rape legislation and the imposition of severe criminal sanctions would help prevent the incidence of marital rape and other forms of violence against women in the society.

  20. Criminal social identity and suicide ideation among Pakistani young prisoners.

    Science.gov (United States)

    Shagufta, Sonia; Boduszek, Daniel; Dhingra, Katie; Kola-Palmer, Derrol

    2015-01-01

    Suicidal behaviour is a common in prisoners, yet little is known about the factors that may protect against thoughts of ending one's life. The purpose of this paper is to specify and test a structural model to examine the relationship between three criminal social identity (CSI) dimensions (in-group affect, in-group ties, and cognitive centrality) and suicide ideation while controlling for period of confinement, age, criminal friends, and offense type (violent vs non-violent). Participants were 415 male juvenile offenders incarcerated in prisons in Khyber Pakhtunkhwa Pakistan. A structural model was specified and tested using Mplus to examine the relationships between the three factors of CSI and suicidal thoughts, while controlling for age, offender type, period of confinement, and substance dependence. The model provided an adequate fit for the data, explaining 22 per cent of variance in suicidal thoughts. In-group affect (the level of personal bonding with other criminals) was found to exert a strong protective effect against suicide ideation. The research contributes important information on suicide ideation in Pakistan, an Islamic country in which suicide is considered a sin and subsequently a criminal offence. Results indicate that Juvenile offenders' sense of shared identity may help to prevent the development of thoughts of death by suicide. Consequently, separating and isolating young prisoners may be ill advised.

  1. Roots and Causes That Created the PKK Terrorist Organization

    Science.gov (United States)

    2013-09-01

    Kurdish Workers Party (PKK) as Criminal Syndicate : Funding Terrorism through Organized Crime, A Case Study,” Studies in Conflict & Terrorism 30, no. 10...and outside of the group. Rival organizations and individuals were put on the spot. Even columnists , criticizing Apocu movement, were targeted. A...Oslo’da Neler Oldu?” Aksam Gazetesi, April 24, 2013. Roth, Mitchel P. and Murat Sever. 2007. “The Kurdish Workers Party (PKK) as Criminal Syndicate

  2. Forensic geoscience: applications of geology, geomorphology and geophysics to criminal investigations

    Science.gov (United States)

    Ruffell, Alastair; McKinley, Jennifer

    2005-03-01

    One hundred years ago Georg Popp became the first scientist to present in court a case where the geological makeup of soils was used to secure a criminal conviction. Subsequently there have been significant advances in the theory and practice of forensic geoscience: many of them subsequent to the seminal publication of "Forensic Geology" by Murray and Tedrow [Murray, R., Tedrow, J.C.F. 1975 (republished 1986). Forensic Geology: Earth Sciences and Criminal Investigation. Rutgers University Press, New York, 240 pp.]. Our review places historical development in the modern context of how the allied disciplines of geology (mineralogy, sedimentology, microscopy), geophysics, soil science, microbiology, anthropology and geomorphology have been used as tool to aid forensic (domestic, serious, terrorist and international) crime investigations. The latter half of this paper uses the concept of scales of investigation, from large-scale landforms through to microscopic particles as a method of categorising the large number of geoscience applications to criminal investigation. Forensic geoscience has traditionally used established non-forensic techniques: 100 years after Popp's seminal work, research into forensic geoscience is beginning to lead, as opposed to follow other scientific disciplines.

  3. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  4. Emotional intelligence and criminal behavior.

    Science.gov (United States)

    Megreya, Ahmed M

    2015-01-01

    A large body of research links criminality to cognitive intelligence and personality traits. This study examined the link between emotional intelligence (EI) and criminal behavior. One hundred Egyptian adult male offenders who have been sentenced for theft, drug dealing or murder and 100 nonoffenders were administered the Bar-On Emotional Quotient Inventory (EQ-i). The offenders had lower levels of EI than the nonoffenders. In addition, EI varied as a function of the types of offenses. Namely, it decreased in magnitude with crime severity (lowest for murder, higher for drug dealing, and highest for theft). These results converged with the direct/ indirect aggression theory suggesting that indirect aggression requires more social intelligence than physical aggression. Forensic intervention programs should therefore include EI training, especially when violence is involved. © 2014 American Academy of Forensic Sciences.

  5. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  6. Childhood antecedents of incarceration and criminal justice involvement among homeless veterans.

    Science.gov (United States)

    Tsai, Jack; Rosenheck, Robert A

    2013-10-01

    Although criminal justice involvement and incarceration are common problems for homeless veterans, few studies have examined childhood risk factors for criminal justice involvement among veterans. This study examined the association between three types of childhood problems, family instability, conduct disorder behaviors, and childhood abuse, and criminal justice involvement and incarceration in adulthood. Data from 1,161 homeless veterans across 19 sites participating in the Housing and Urban Development-Veterans Affairs Supportive Housing program were examined. After controlling for sociodemographics and mental health diagnoses, veterans who reported more conduct disorder behaviors during childhood tended to report more criminal charges of all types, more convictions, and longer periods of incarceration during adulthood. However, the variance explained in criminal behavior by childhood was not large, suggesting that there are other factors that affect the trajectory by which homeless veterans become involved in the criminal justice system. Further research is needed to intervene in the pathway to the criminal justice system and guide efforts to prevent incarceration among veterans. Published 2013. This article is a U.S. Government work and is in the public domain in the USA.

  7. Warranties of Albanian criminal law for children protection from “pornography”

    Directory of Open Access Journals (Sweden)

    Marilda Menkshi

    2016-11-01

    Full Text Available This paper will focus on the Analysis of current Albanian Criminal Law regarding criminal acts of pornography. This paper will analyze Albanian Criminal Law, under the perspective of the Convention on the Rights of the Child, to reflect the alignment of criminal law with Convention, as a minimum guarantee to be provided by the States. Another element of this paper is the approach of criminal law in the context of the defence of children from pornography with judicial practice. In this way the effectiveness of Criminal Law, on prevention and protection of society, family and especially children, from pornography will be identified. This paper considers the judicial practice in other European countries, but also from the United States and other countries on other continents, as a source of the definition of pornography and its application. This analysis is conducted through the prism of Criminological and criminal policy, to identify the current state of the Albanian legislation to protect minors from pornography, challenges and its prospects, both in legislative and practical terms.

  8. Born criminal? Differences in structural, functional and behavioural lateralization between criminals and noncriminals.

    Science.gov (United States)

    Savopoulos, Priscilla; Lindell, Annukka K

    2018-02-15

    Over 100 years ago Lombroso [(1876/2006). Criminal man. Durham: Duke University Press] proposed a biological basis for criminality. Based on inspection of criminals' skulls he theorized that an imbalance of the cerebral hemispheres was amongst 18 distinguishing features of the criminal brain. Specifically, criminals were less lateralized than noncriminals. As the advent of neuroscientific techniques makes more fine-grained inspection of differences in brain structure and function possible, we review criminals' and noncriminals' structural, functional, and behavioural lateralization to evaluate the merits of Lombroso's thesis and investigate the evidence for the biological underpinning of criminal behaviour. Although the body of research is presently small, it appears consistent with Lombroso's proposal: criminal psychopaths' brains show atypical structural asymmetries, with reduced right hemisphere grey and white matter volumes, and abnormal interhemispheric connectivity. Functional asymmetries are also atypical, with criminal psychopaths showing a less lateralized cortical response than noncriminals across verbal, visuo-spatial, and emotional tasks. Finally, the incidence of non-right-handedness is higher in criminal than non-criminal populations, consistent with reduced cortical lateralization. Thus despite Lombroso's comparatively primitive and inferential research methods, his conclusion that criminals' lateralization differs from that of noncriminals is borne out by the neuroscientific research. How atypical cortical asymmetries predispose criminal behaviour remains to be determined.

  9. The debate on expanding criminal law towards upper class criminality and minimal criminal law

    Directory of Open Access Journals (Sweden)

    Julio César Montáñez-Ruiz

    2010-06-01

    Full Text Available Hoy en día el debate sobre la pregunta de cuáles conflictos sociales deben ser castigados desde la óptica de la política criminal aún continúa. La batalla para imponer un particular discurso de criminalidad está relacionada con el hecho de que el marco de la criminalización depende del legislador que refleja la expansión punitiva. El propósito de este artículo es discutir sobre la lucha entre modelos de criminalización, los cuales, de una parte, tienden a la aplicación del sistema criminal persiguiendo a la criminalidad de las clases poderosas y, de otra, buscan el criterio de intervención mínima para prevenir la excesiva intervención del derecho penal.

  10. Forms of the criminal environment counteraction to performing the function of state protection of participants in criminal proceedings and measures of its neutralization

    Directory of Open Access Journals (Sweden)

    Dubonosov E.S.

    2014-12-01

    Full Text Available Criminal environment’s counteraction is considered as purposeful, active and intentional influence of its representatives on participants in criminal proceedings. It is directed at persons who, due to their professional duties, are involved in detection and investigation of crimes as well as court proceedings, or who possess evidentiary information (witnesses, victims, etc.. Counteraction may be expressed in different ways: discrediting operatives, investigators and judges; pressure on persons involved in the investigation and the trial through bribery, blackmail, threats to life and health of themselves and their family, etc. The administration of justice becomes inefficient due to the variety of forms and purposes of counteraction. The importance of operational units’ awareness of the activities of criminal environment representatives is shown. The importance of revealing the facts of unlawful influence on witnesses and victims of crime, who subsequently acquire procedural status of witnesses and victims, in order to prevent such facts is also stressed. It is proposed to suppress the counteraction of criminal environment by following ways: 1 identifying (with the help of informants and by crime detection actions the persons attempting to influence the preliminary investigation; 2 documenting the suspects actions aimed at illegal influence on participants in criminal proceedings for the purpose of conducting the procedural actions and decision making; 3 “in cell” (using an agent crime detection actions against detainees and arrestees throughout the whole process of covert operation; 4 creating investigative team to develop a common mechanism to neutralize criminal environment’s counteraction to crime investigation.

  11. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  12. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  13. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  14. Sex offender risk assessment: the need to place recidivism research in the context of attrition in the criminal justice system.

    Science.gov (United States)

    Larcombe, Wendy

    2012-04-01

    Jurisdictions in the United States, United Kingdom, and Australia now have laws that enable preventive detention of post-sentence sex offenders based on an assessment of the offender's likely recidivism. Measures of recidivism, or risk assessments, rely on the criminal justice process to produce the "pool" of sex offenders studied. This article argues that recidivism research needs to be placed in the context of attrition studies that document the disproportionate and patterned attrition of sexual offenses and sexual offenders from the criminal justice process. Understanding the common biases that affect criminal prosecution of sex offenses would improve sexual violence prevention policies.

  15. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  16. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  17. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  18. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  19. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  20. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  1. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  2. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  3. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  4. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  5. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  6. Guarantee of Criminal Policy as Limited to Criminal Decisionism

    Directory of Open Access Journals (Sweden)

    María Belén Bonilla Albán

    2016-06-01

    Full Text Available The essay explains how the inclusion of the security of public policy in the 2008 Constitution of Ecuador as part of the constitutional state of law and justice or “guarantor state” can become a substantial limit for criminal decisionism, which is usually behind the penal policy in Latin America. Thus, the function of this collateral is to eliminate the huge space of discretion in the management of the most sensitive policy of modern state penal policy. However, the guarantee of public policy is not clear in determining the limits of punitive power; therefore, this paper seeks to explore some of the international human rights.

  7. HIV is a virus, not a crime: ten reasons against criminal statutes and criminal prosecutions

    OpenAIRE

    Cameron, Edwin; Burris, Scott; Clayton, Michaela

    2008-01-01

    Abstract The widespread phenomenon of enacting HIV-specific laws to criminally punish transmission of, exposure to, or non-disclosure of HIV, is counter-active to good public health conceptions and repugnant to elementary human rights principles. The authors provide ten reasons why criminal laws and criminal prosecutions are bad strategy in the epidemic.

  8. THE CHILD OFFENDER UNDER THE AGE OF CRIMINAL LIABILITY

    Directory of Open Access Journals (Sweden)

    Niculina KARACSONY

    2015-04-01

    Full Text Available At European level crime among children represents a contemporary issue and in Romania, the philosophy of the new penal code approved by Law No 286/2009 is shaped around punishment. Prevention policy in Romania and juvenile justice objectives relative to age criteria outlines two different legal manners to address children's liability under the law. One is targeting the category of children between 0 and 14 years of age, which consideres the absolute inability of criminal responsibility and one that provides criminal liability starting from the age of 14. The sensitivity of the issue of children involved in unlawfull acts and the inventory of responses to it brought me to the necessity of research the types of approach and diversity of social services built around this target group.

  9. Risk communication of terrorist acts, natural disasters, and criminal violence: comparing the processes of understanding and responding.

    Science.gov (United States)

    Heilbrun, Kirk; Wolbransky, Melinda; Shah, Sanjay; Kelly, Rebecca

    2010-01-01

    Risk communication is an important vehicle for the scientific understanding of the perception of and response to various kinds of threats. The present study provides apparently the first empirical attempt to compare perceptions, decision-making, and anticipated action in response to threats of three kinds: natural disaster, violent crime, and terrorism. A total of 258 college undergraduates were surveyed using a vignette-based, 2 × 2 × 3 between-subjects design that systematically manipulated threat imminence (high vs. low), risk level (high vs. low), and nature of the threat (natural disaster vs. crime vs. terrorism). There were substantial differences in participants' perceptions and reported actions in response to natural disaster, relative to the other domains of risk, under conditions of high risk. The risk of natural disaster was more likely to lead participants to report that they would change their daily activities and to relocate. It was also more likely than terrorism to lead to action securing the home. It appears that the mechanisms for perception, decision-making, and action in response to threats cannot be generalized in a straightforward way across these domains of threat. Copyright © 2010 John Wiley & Sons, Ltd.

  10. A Theory of Inference Derivation for Qualitative Data: Development and Test with Application to Criminal and Terrorist Detection

    Science.gov (United States)

    1991-07-01

    me ’Don’t struggle or scream or cIzc you’]’ ’e a d-ad girl .’ He made me kneel with my back to him. He kept saying ’How old are you ?’ and he also kept...your boyfriend or the police. If I hear from anybody that you have told anybody you will be a dead girl ’. He then said ’don’t move until I’ve gone’. He...down. He pulled my tights and panties off completely. He undid his trousers and got back on top of me and had sex with me. He stood up and pulled me up

  11. A triangle model of criminality

    OpenAIRE

    Nuno, J.C.; Herrero, M.A.; Primicerio, M.

    2008-01-01

    This paper is concerned with a quantitative model describing the interaction of three sociological species, termed as owners, criminals and security guards, and denoted by X, Y and Z respectively. In our model, Y is a predator of the species X, and so is Z with respect to Y . Moreover, Z can also be thought of as a predator of X, since this last population is required to bear the costs of maintaining Z. We propose a system of three ordinary differential equations to account for the time evolu...

  12. ‘The Very Foundations of Any System of Criminal Justice’: Criminal Responsibility in the Australian Model Criminal Code

    Directory of Open Access Journals (Sweden)

    Arlie Loughnan

    2017-08-01

    Full Text Available The Model Criminal Code (MCC was intended to be a Code for all Australian jurisdictions. It represents a high point of faith in the value and possibility of systematising, rationalising and modernising criminal law. The core of the MCC is Chapter 2, the ‘general principles of criminal responsibility’, which outlines the ‘physical’ and ‘fault’ elements of criminal offences, and defines concepts such as recklessness. This paper assesses the MCC as a criminal law reform project and explores questions of how the MCC came into being, and why it took shape in certain ways at a particular point in time. The paper tackles these questions from two different perspectives—‘external’ and ‘internal’ (looking at the MCC from the ‘outside’ and the ‘inside’. I make two main arguments. First, I argue that, driven by a ‘top down’ law reform process, the MCC came into being at a time when changes in crime and criminal justice were occurring, and that it may be understood as an attempt to achieve stability in a time of change. Second, I argue that the significance of the principles of criminal responsibility, which formed the central pivot of the MCC, lies on the conceptual level—in relation to the language through which the criminal law is thought about, organised and reformed.

  13. Editorial International Criminal Justice, Peace and Reconciliation in ...

    African Journals Online (AJOL)

    conference in July 2014 on the theme 'International Criminal Justice,. Reconciliation ... International Criminal Court (ICC) had come to occupy in discussions .... Pella, V. P., 1950, 'Towards an international criminal court', The American Journal.

  14. Psycho-Sociological Review of Criminal Thinking Style

    OpenAIRE

    Boduszek, Daniel; Hyland, Philip

    2012-01-01

    Criminal thinking has been long established as a very important predictor of criminal behaviour, however far less research effort has been undertaken to understand what variables can predict the emergence of criminal thinking. Considering the importance of criminal thinking, we feel it necessary to conduct a systematic review of the literature on criminal thinking in order to bring together what is currently known regarding the factors that relate to, and predict, habitual criminal thinking s...

  15. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  16. Criminal Misdemeanor: Novels of the Russian Criminal Legislation and Questions of Its Improvement​

    Directory of Open Access Journals (Sweden)

    Yurchenko Irina A.

    2018-03-01

    Full Text Available The article is devoted to the problem of legally securing in the Criminal Code of the Russian Federation the concept of a criminal misdemeanor. On the basis of doctrinal provisions, Russian and foreign criminal legislation, the concept of a criminal misdemeanor is investigated, its relation to an insignificant act is analyzed, and the category of administrative prejudice is analyzed. The Author justifies the position according to which criminal misdemeanor cannot be a kind of crime of little gravity. It is concluded that a group of crimes with administrative prejudice, regardless of their category, should be classified as a criminal misdemeanor. With regard to this type of socially dangerous acts, the criminal law proposes to use the term “criminal misdemeanor”. An approach is presented to the establishment in the Criminal Code of the Russian Federation of a preferential criminal law regime for criminal misdemeanor: the unpunishable assassination and complicity in such a crime, the absence of aggregate and relapse, if one of the crimes is small, the reduction of the statute of limitations, the recognition of the person who committed such an act is unacceptable.

  17. Mapping Criminal Governance in African Cities | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Mapping Criminal Governance in African Cities. This grant will allow the Institute for Security Studies (ISS), through its Organized Crime and Money Laundering Programme (OCML), to explore the causal links between weak state authority and the emergence of criminal governance ... Profile of crime markets in Dakar.

  18. Criminal Trajectories of White-collar Offenders

    NARCIS (Netherlands)

    van Onna, J.; van der Geest, V.R.; Huisman, W.; Denkers, A.J.M.

    2014-01-01

    Objectives:This article analyzes the criminal development and sociodemographic and criminal profile of a sample of prosecuted white-collar offenders. It identifies trajectory groups and describes their profiles based on crime, sociodemographic, and selection offence characteristics.Methods:The

  19. The Relative Ineffectiveness of Criminal Network Disruption

    Science.gov (United States)

    Duijn, Paul A. C.; Kashirin, Victor; Sloot, Peter M. A.

    2014-01-01

    Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become ‘stronger’, after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort. PMID:24577374

  20. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  1. Child maltreatment and adult criminal behavior: does criminal thinking explain the association?

    Science.gov (United States)

    Cuadra, Lorraine E; Jaffe, Anna E; Thomas, Renu; DiLillo, David

    2014-08-01

    Criminal thinking styles were examined as mediational links between different forms of child maltreatment (i.e., sexual abuse, physical abuse, and physical neglect) and adult criminal behaviors in 338 recently adjudicated men. Analyses revealed positive associations between child sexual abuse and sexual offenses as an adult, and between child physical abuse/neglect and endorsing proactive and reactive criminal thinking styles. Mediation analyses showed that associations between overall maltreatment history and adult criminal behaviors were accounted for by general criminal thinking styles and both proactive and reactive criminal thinking. These findings suggest a potential psychological pathway to criminal behavior associated with child maltreatment. Limitations of the study as well as research and clinical implications of the results are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Judicial Functions in the Criminal Trial

    Directory of Open Access Journals (Sweden)

    Constantin Tănase

    2014-05-01

    Full Text Available The separation of judicial functions falls, indisputably, in the news gallery of the Romanian criminal trial current rules. The previous Criminal Procedure Code, namely that of 1968, as well as the older ones, hadn‟t enrolled in their content such a principle. However, the doctrine identified, under mentioned legal regulations, the existence of distinct procedural functions and their need to separate, in the idea of genuine criminal justice accomplishment. These procedural functions were: the indictment function (or charges, the defense function the trial function. In the new code, this principle proclaims the existence of four judicial functions that aim the efficiency and speed of the criminal trial, but also guarantee the presumption of innocence, equal opportunity of parties, protection of rights and fundamental freedoms. This research try to explain this principle and its connections with other institutions of the criminal trial.

  3. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  4. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  5. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  6. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  7. Panel: challenging criminal charges for HIV transmission and exposure.

    Science.gov (United States)

    Edwardh, Marlys; Adam, Barry; Joncas, Lucie; Clayton, Michaela

    2009-12-01

    Justice Edwin Cameron, of the Constitutional Court of South Africa, served as moderator. He said that this topic was particularly relevant for "an African/Canadian setting" because African countries may use Canadian developments as justification for their efforts to address HIV transmission and exposure through criminal law. Justice Cameron said that Canada is internationally perceived as a human rights-respecting state and, thus, sets an example, particularly for African nations, on how to comply with human rights issues. He added that in this particular case, however, Canada was sending the wrong message. This article contains summaries of the four presentations made during this panel. Marlys Edwardh reviews how the Supreme Court of Canada in Cuerrier interpreted the concepts of "endangering life" and "fraud". Barry Adam discusses the notion of a "duty to disclose" and how this affects HIV prevention. Lucie Joncas examines how the Supreme Court defined "fraud" in Cuerrier and describes a case before the Quebec Court of Appeal which may turn on whether the use of a condom or having a low viral load is considered not to constitute a significant risk of transmission. Finally, Michaela Clayton describes the trend in Southern African countries to adopt laws criminalizing HIV transmission or exposure, and explains that criminalization endangers women's health and lives.

  8. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  9. Rehabilitation and Re-socialization of Criminals in Iranian Criminal Law.

    Science.gov (United States)

    Mollaei, Mohammad; Ghayoomzadeh, Mahmood; Mirkhalili, Seyed Mahmoud

    2018-02-08

    One of the concerns that always remain for the repentant criminal is the condition for his return to society. This concern may be so strong and effective that the criminal may seclude from the society due to the fear of its consequences and may return to crime. Therefore, paying attention to eliminating the social effect of the criminal conviction of criminals can return security to society and return the repentant criminals to normal life. So, all military and social institutions are effective in the re-socialization, in such a way that the re-socialization of criminals requires the provision of social platforms that starts with their own family and expands to society. The main concern of this research is how we can provide the favorable conditions for the re-socialization of repentant criminals that effectively realize the socialization goals. The Islamic Penal Code initiatives in 2013, despite the gaps in this regard, partly help to achieve such goals, but they are not enough. Therefore, the present article focused on the criminals' re-socialization and tried to raise the criminals' re-socialization both socially and criminally. The method was descriptive analytical. The result showed that the Islamic Penal Code, adopted in 2013 on the period of the subsequent effects, needs to be reformed, and the effective social institutions should be raised orderly in such a case.

  10. Personality correlates of criminals: A comparative study between normal controls and criminals

    Science.gov (United States)

    Sinha, Sudhinta

    2016-01-01

    Background: Personality is a major factor in many kinds of behavior, one of which is criminal behavior. To determine what makes a criminal “a criminal,” we must understand his/her personality. This study tries to identify different personality traits which link criminals to their personality. Materials and Methods: In the present study, 37 male criminals of district jail of Dhanbad (Jharkhand) and 36 normal controls were included on a purposive sampling basis. Each criminal was given a personal datasheet and Cattel's 16 personality factors (PFs) scale for assessing their sociodemographic variables and different personality traits. Objective: The objective of this study was to examine the relation between personality traits and criminal behavior, and to determine whether such factors are predictive of future recidivism. Results: Results indicated high scores on intelligence, impulsiveness, suspicion, self-sufficient, spontaneity, self-concept control factors, and very low scores on emotionally less stable on Cattel's 16 PFs scale in criminals as compared with normal. Conclusion: Criminals differ from general population or non criminals in terms of personality traits. PMID:28163407

  11. Criminal Courts of Justice, Dublin

    Directory of Open Access Journals (Sweden)

    Jonathan Tooth

    2012-04-01

    Full Text Available The newly completed Criminal Courts of Justice (CCJ at Parkgate Street in Dublin 8 is the largest courts project undertaken in the history of the Irish State. The design of the heating, ventilation and air conditioning (HVAC systems was based on computer simulated modelling of the build ing to determine the optimum plant selection and operation based on the contract conditions and energy targets. The report will analyse the computer simulated energy targets versus the actual energy consumption and assess the benefit of engineering solutions such as twin-skin facades and heat recovery based on real data. The report will draw conclusions on the real benefit of such systems with in the built environment. In addition to the energy targets, the report will discuss the commission ing processes involved in delivering the energy targets required and the importance of designing metering strategies to enable the data to be collected and analysed.

  12. Child and adolescent psychiatric patients and later criminality

    Directory of Open Access Journals (Sweden)

    Rydelius Per-Anders

    2007-08-01

    Full Text Available Abstract Background Sweden has an extensive child and adolescent psychiatric (CAP research tradition in which longitudinal methods are used to study juvenile delinquency. Up to the 1980s, results from descriptions and follow-ups of cohorts of CAP patients showed that children's behavioural disturbances or disorders and school problems, together with dysfunctional family situations, were the main reasons for families, children, and youth to seek help from CAP units. Such factors were also related to registered criminality and registered alcohol and drug abuse in former CAP patients as adults. This study investigated the risk for patients treated 1975–1990 to be registered as criminals until the end of 2003. Methods A regional sample of 1,400 former CAP patients, whose treatment occurred between 1975 and 1990, was followed to 2003, using database-record links to the Register of Persons Convicted of Offences at the National Council for Crime Prevention (NCCP. Results Every third CAP patient treated between 1975 and 1990 (every second man and every fifth woman had entered the Register of Persons Convicted of Offences during the observation period, which is a significantly higher rate than the general population. Conclusion Results were compared to published results for CAP patients who were treated between 1953 and 1955 and followed over 20 years. Compared to the group of CAP patients from the 1950s, the results indicate that the risk for boys to enter the register for criminality has doubled and for girls, the risk seems to have increased sevenfold. The reasons for this change are discussed. Although hypothetical and perhaps speculative this higher risk of later criminality may be the result of lack of social control due to (1 rising consumption of alcohol, (2 changes in organisation of child social welfare work, (3 the school system, and (4 CAP methods that were implemented since 1970.

  13. Protecting Children Rights under International Criminal Justice

    Directory of Open Access Journals (Sweden)

    Erinda Duraj (Male

    2015-03-01

    Full Text Available Children are a central concern of international criminal justice. International crimes and other forms of violence and the abuse of children are disturbing daily realities in today’s world. Children and young persons are increasingly being targeted for the purposes of murder, rape, abduction, mutilation, recruitment as child soldiers, trafficking, sexual exploitation and other abuses. Sierra Leone, the Democratic Republic of Congo, Rwanda, Colombia, and many others illustrate this. The participation of children in international criminal justice and other accountability mechanisms is now one of the major issues facing criminal justice today. In this sense, this paper presents a short overview on the issue of children and their participation in international criminal justice. The paper thus focuses on giving a definition of “child/children” according to international norms, which are the key principles of children’s rights, their participation in the criminal justice system, the different international crimes committed by them or against them etc. Also, this paper briefly addresses the main contours of the normative framework regarding the criminal responsibility of children for their alleged participation in international crimes. It reviews international norms regarding children who may be accused of having participated in the commission of such crimes themselves (as child soldiers and identifies their criminal responsibility for such acts. Finally, this paper acknowledges the obligations of states under international law to prosecute persons accused of genocide, war crimes, crimes against humanity, torture and enforced disappearances, specifically focusing on crimes against children.

  14. Criminal investigation in the light of Law 9,034 / 95: the role of undercover agents and their criminal consequences

    Directory of Open Access Journals (Sweden)

    Jayme José de Souza FIlho

    2012-04-01

    Full Text Available Law 9034 of May 3, 1995 provides for the use of means operacionaispara prevention and prosecution of actions taken by organizations criminosas.Sofreu amendment by Law 10,217 of April 11, 2001, which entered the Brazilian legal noordenamento agents infiltration technique comoinstrumento to combat such organizations. It provides that police officers or deinteligência in any criminal prosecution phase, since autorizadosjudicialmente, can enter into criminal groups acting dissimuladamentecomo part thereof, to obtain information and evidence to reach oseu dismantling. the owners acting as agenteinfiltrado is unacceptable. It is silent on legislation about the limits and succinct with aosrequisitos relationship that should be imposed for the exercise of this method investigativo.Silenciou is still about the criminal liability of the undercover agent noexercício of its activities, thus any responsibility should serresolvidas in the field of Theory of Crime, contained in the general section of the Code Penal.Difere the undercover agent provocateur, where the first ageconstantemente passively collecting data, while the second agede actively, prompting the target (suspect to commit crimes. The evidence obtained by the undercover agent and testimony are legitimate to instruct inquiry policiale competent prosecution.

  15. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  16. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  17. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  18. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  19. The Criminal justice system in Northern Ireland

    OpenAIRE

    Carr, Nicola

    2017-01-01

    As with any country, crime and justice and the contours of criminal justice have to be situated within the particular historical, social, and political context. Nowhere is this truer than in Northern Ireland, where the criminal justice system that has emerged has been shaped by a violent political conflict which spanned over three decades (from the late 1960s to the late 1990s). In the transition to peace, the reform of criminal justice agencies has been central—to a wider project of state le...

  20. The suspended sentence in French Criminal Law

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2016-01-01

    Full Text Available From the ancient times until today, criminal law has provided different criminal sanctions as measures of social control. These coercive measures are imposed on the criminal offender by the competent court and aimed at limitting the offender's rights and freedoms or depriving the offender of certain rights and freedoms. These sanctions are applied to the natural or legal persons who violate the norms of the legal order and injure or endanger other legal goods that enjoy legal protection. In order to effectively protect social values, criminal legislations in all countries predict a number of criminal sanctions. These are: 1 imprisonment, 2 precautions, 3 safety measures, 4 penalties for juveniles, and 5 sanctions for legal persons. Apart and instead of punishment, warning measures have a significant role in the jurisprudence. Since they emerged in the early 20th century in the system of criminal sanctions, there has been an increase in their application to criminal offenders, especially when it comes to first-time offenders who committed a negligent or accidental criminal act. Warnings are applied in case of crimes that do not have serious consequences, and whose perpetrators are not hardened and incorrigible criminals. All contemporary criminal legislations (including the French legilation provide a warning measure of suspended sentence. Suspended sentence is a conditional stay of execution of sentence of imprisonment for a specified time, provided that the convicted person does not commit another criminal offense and fulfills other obligations. This sanction applies if the following two conditions are fulfilled: a forma! -which is attached to the sentence of imprisonment; and b material -which is the court assessment that the application of this sanction is justified and necessary in a particular case. In many modern criminal legislations, there are two different types of suspended (conditional sentence: 1 ordinary (classical suspended

  1. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  2. CRIMINAL LIABILITY FOR CERTAIN ECONOMIC ACTIVITIES-TAX EVASIOAN

    Directory of Open Access Journals (Sweden)

    Alexandrina Fodor

    2010-12-01

    Full Text Available Evasion is equivalent to the offense or crime, and what is civil or criminal depending on the seriousness and rufnesse. Reasons for this phenomenon in Romania is difficult to quantify and are prevented complex and numerous, among them may be mentioned: many imperfections and speculiarities in the tax laws, the business tax accounting method, not using the national macroeconomic record, massive tax evasion carried out by various interest groups and economic agents only appear to take advantage of loopholes laws lack of a tax code, the principle of confidentiality.

  3. THE URGENCY OF THE CRIMINAL POLICY IN CRIME MITIGATION POLICE PROFESSION

    Directory of Open Access Journals (Sweden)

    Ridwan Tahir

    2016-12-01

    Full Text Available This article aims to reveal the characteristics of the crimes committed by the police in general, and then continued by asserting the main orientation of the criminal policy in crime prevention. Next, will be discussed more specifically about the urgency of the criminal policy in the prevention of the crimes committed by the police. This paper, presented using data and information from literature sources, then analyzed qualitatively with decomposition descriptive and prescriptive analytics. The focus of the discussion of this article will be directed to the issue of urgency criminal policy in relation to the role of agency compensation and rehabilitation for the abuses of power that are criminogen in the investigation process established through pretrial agencies that the results are only set compensation and rehabilitation as a result of misuse of the police profession. To that end, the weakness of the criminal law policy, need to be updated, ie, by adding the authority to institute pretrial may also recommend its findings to be prosecuted and criminal sanctions

  4. Justifying genetics as a possible legal defence to criminal ...

    African Journals Online (AJOL)

    However, jurisprudence of many criminal cases tends to question whether a person's inherited genes predispose him to violence and further determine his criminal responsibility in law. Under the Nigerian criminal law, the legal test of criminal responsibility is mainly whether the accused person intends the consequence of ...

  5. Methods and manners of interpretation of criminal norms | Assefa ...

    African Journals Online (AJOL)

    The criminal justice system is constituted of criminal norms, institutions and methods, among others. Interpretation of the criminal law is a process that transforms the text of the law into reality. The process is influenced by various factors, such as, the courts' conception of the criminal law, the concept and practice of ...

  6. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  7. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  8. Debt as a Criminal Risk Factor in Denmark

    DEFF Research Database (Denmark)

    Olesen, Annette

    2016-01-01

    due to the ex-prisoners’ debt. Those convicted in Denmark are personally liable for their own legal costs. Thus, we must regard most ex-prisoners as being highly indebted to the state. The debt of ex-prisoners was generally understood as being the cause of financial problems, but legal regulation......Existing studies of crime preventive factors have illustrated that ex-prisoners who began a course of education, obtained employment and/or had permanent housing were less likely to relapse into crime. However, this study shows that the aforementioned crime preventing factors became less effective...... and informal punishment, as unintended consequences of indebtedness, were still poorly explored. This research indicates that legal regulation and informal punishment based on indebtedness may serve as an argument for considering debt as a criminal risk factor which has made the preventive factors less...

  9. Debt as a Criminal Risk Factor in Denmark

    DEFF Research Database (Denmark)

    Olesen, Annette

    2016-01-01

    and informal punishment, as unintended consequences of indebtedness, were still poorly explored. This research indicates that legal regulation and informal punishment based on indebtedness may serve as an argument for considering debt as a criminal risk factor which has made the preventive factors less......Existing studies of crime preventive factors have illustrated that ex-prisoners who began a course of education, obtained employment and/or had permanent housing were less likely to relapse into crime. However, this study shows that the aforementioned crime preventing factors became less effective...... due to the ex-prisoners’ debt. Those convicted in Denmark are personally liable for their own legal costs. Thus, we must regard most ex-prisoners as being highly indebted to the state. The debt of ex-prisoners was generally understood as being the cause of financial problems, but legal regulation...

  10. Mapping the criminal mind: idiographic assessment of criminal belief systems.

    Science.gov (United States)

    Walters, Glenn D

    2005-02-01

    An idiographic procedure designed to assess the belief systems of criminal offenders is described, investigated, and clarified. This measure, the Cognitive Map of Major Belief Systems (CMMBS), assesses the five belief systems (self-view, world-view, past-view, present-view, future-view) held to occupy the higher echelons of human cognition. Modest to moderate test-retest reliability was achieved when 19 inmates, enrolled in one of three drug-counseling groups, completed the CMMBS on two separate occasions, 2 weeks apart. It was also ascertained that the drug treatment specialist who served as therapist for all three groups "blindly" matched the 19 CMMBS records to the inmates who produced them. A case study of one of the 19 participants was used to illustrate how the CMMBS is employed with individual offenders and how belief systems interact with major schematic subnetworks such as attributions, outcome expectancies, efficacy expectancies, goals, values, and thinking styles to create crime-supporting lifestyles.

  11. Illicit networks targeting the nexus between terrorists, proliferators, and narcotraffickers

    OpenAIRE

    Dietz, Rebekah K.

    2010-01-01

    Approved for public release; distribution is unlimited Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing ...

  12. Dynamical analysis of a model of social behavior: Criminal vs non-criminal population

    International Nuclear Information System (INIS)

    Abbas, Syed; Tripathi, Jai Prakash; Neha, A.A.

    2017-01-01

    Highlights: • A new social model of interaction between criminal and non-criminal population is proposed • The effect of law enforcement is studied • Many real life situations are analyzed • List of open problems is given for future work. - Abstract: In this paper, we construct a model motivated by the well known predator-prey model to study the interaction between criminal population and non-criminal population. Our aim is to study various possibilities of interactions between them. First we model it using simple predator-prey model, then we modify it by considering the logistic growth of non-criminal population. We clearly deduce that the model with logistic growth is better than classical one. More precisely, the role of carrying capacity on the dynamics of criminal minded population is discussed. Further, we incorporate law enforcement term in the model and study its effect. The result obtained suggest that by incorporating enforcement law, the criminal population reduces from the very beginning, which resembles with real life situation. Our result indicates that the criminal minded population exist as long as coefficient of enforcement l_c does not cross a threshold value and after this value the criminal minded population extinct. In addition, we also discuss the occurrence of saddle-node bifurcation in case of model system with law enforcement. Numerical examples and simulations are presented to illustrate the obtained results.

  13. Original article Latent classes of criminal intent associated with criminal behaviour

    Directory of Open Access Journals (Sweden)

    Daniel Boduszek

    2014-07-01

    Full Text Available Background This study aimed to examine the number of latent classes of criminal intent that exist among prisoners and to look at the associations with recidivism, number of police arrests, type of offending (robbery, violent offences, murder, and multiple offences, and age. Participants and procedure Latent class analysis was used to identify homogeneous subgroups of prisoners based on their responses to the 10 questions reflecting criminal intent. Participants were 309 male recidivistic prisoners incarcerated in a maximum security prison. Multinomial logistic regression was used to interpret the nature of the latent classes, or groups, by estimating the association between recidivism and latent classes of criminal intent while controlling for offence type (robbery, violent offences, murder, and multiple offences, number of arrests, and age. Results The best fitting latent class model was a three-class solution: ‘High criminal intent’ (49.3%, ‘Intermediate criminal intent’ (41.3%, and ‘Low criminal intent’ (9.4%. The latent classes were differentially related to the external variables (recidivism, violent offences, and age. Conclusions Criminal intent is best explained by three homogeneous classes that appear to represent an underlying continuum. Future work is needed to identify whether these distinct classes of criminal intent may predict engagement in various types of criminal behaviour.

  14. Antisocial personality disorder as a predictor of criminal behaviour in drug abusers

    DEFF Research Database (Denmark)

    Fridell, Mats; Hesse, Morten; Jæger, Mads Meier

    2008-01-01

    Mixed findings have been made with regard to the long-term predictive validity of antisocial personality disorder (ASPD) on criminal behaviour in samples of substance abusers. A longitudinal record-linkage study of a cohort of 1052 drug abusers admitted 1977–1995 was undertaken. Subjects were...... seriously in drug abusers, and be targeted in treatment to prevent crime in society....

  15. A Framework for visualization of criminal networks

    DEFF Research Database (Denmark)

    Rasheed, Amer

    networks, network analysis, composites, temporal data visualization, clustering and hierarchical clustering of data but there are a number of areas which are overlooked by the researchers. Moreover there are some issues, for instance, lack of effective filtering techniques, computational overhead......This Ph.D. thesis describes research concerning the application of criminal network visualization in the field of investigative analysis. There are number of way with which the investigative analysis can locate the hidden motive behind any criminal activity. Firstly, the investigative analyst must...... have the ability to understand the criminal plot since a comprehensive plot is a pre-requisite to conduct an organized crime. Secondly, the investigator should understand the organization and structure of criminal network. The knowledge about these two aspects is vital in conducting an investigative...

  16. Criminal sanctions: does imprisonment strategy reduce crimes ...

    African Journals Online (AJOL)

    What works, in our views, is the delivery of appropriate correctional treatment, and ... adult criminal treatment among both Lagos and Enugu prisoners that summarized ... Keywords: Imprisonment, Sanctions, Crimes, Rehabilitation, Recidivism.

  17. What Defines an International Criminal Court?

    DEFF Research Database (Denmark)

    Kjeldgaard-Pedersen, Astrid

    2015-01-01

    that only criminal tribunals deriving their authority from international law should be labelled ‘international’, while the term ‘national criminal court’ should apply to tribunals set up under national law. This terminology would underline that issues concerning jurisdiction and applicable law must......Since the post-World War II tribunals, only few scholars have attempted to draw a definitional distinction between international and national criminal courts. Remarkable exceptions include Robert Woetzel, who in 1962 categorized criminal courts according to ‘the involvement of the international...... that ‘the involvement of the international community’ is at best an unhelpful criterion when it comes to resolving questions, e.g. regarding the immunity of state officials and the relevance of domestic law, that require a determination of the legal system in which the court operates. Instead, it is argued...

  18. Page | 14 STATES' CRIMINAL JURISDICTION UNDER ...

    African Journals Online (AJOL)

    Fr. Ikenga

    The criminal jurisdiction of a State's courts under international law is primarily territorial.25 Only under ..... Attorney General of the Government .... also P. Sands, ''After Pinochet : the role of national courts'' in P. Sands (ed) From Nuremberg to ...

  19. Expert Evidence and International Criminal Justice

    DEFF Research Database (Denmark)

    Appazov, Artur

    The book is a comprehensive narration of the use of expertise in international criminal trials offering reflection on standards concerning the quality and presentation of expert evidence. It analyzes and critiques the rules governing expert evidence in international criminal trials...... and the strategies employed by counsel and courts relying upon expert evidence and challenges that courts face determining its reliability. In particular, the author considers how the procedural and evidentiary architecture of international criminal courts and tribunals influences the courts' ability to meaningfully...... incorporate expert evidence into the rational fact-finding process. The book provides analysis of the unique properties of expert evidence as compared with other forms of evidence and the challenges that these properties present for fact-finding in international criminal trials. It draws conclusions about...

  20. Violent and criminal manifestations in dementia patients.

    Science.gov (United States)

    Cipriani, Gabriele; Lucetti, Claudio; Danti, Sabrina; Carlesi, Cecilia; Nuti, Angelo

    2016-05-01

    Although the older adults have been studied as victims of violence, geriatric patients can display violent behavior. The purpose of the present review was to explore the phenomenon of criminal violations and violent acts in people with dementia. The authors used PubMed to search the MEDLINE database and other sources for original research and review articles on criminal and violent manifestation in demented patients combining the terms "criminal manifestation," "violence, aggressive behavior," "homicide," "suicide" and "homicide-suicide" together with "dementia". Possible biomarkers of violence are considered. The present review highlights the risk factors for violence in patients suffering from dementia, and reviews the literature about criminal violations and homicidal/suicidal behavior in this patient group. Geriatr Gerontol Int 2016; 16: 541-549. © 2015 Japan Geriatrics Society.

  1. Are Celebrities Criminally Responsible For Deceptive Advertising?

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The State Administration for Industry and Commerce recently said it has suggested the addition of an article in the Advertising Law to make celebrities who represent fake products in deceptive advertising criminally responsible for their actions if it is confirmed

  2. Employers liability to the international criminal court

    Directory of Open Access Journals (Sweden)

    Yenifer Yiseth Suárez Díaz

    2014-01-01

    Full Text Available The constant changes in the social dynamics due to economic and technological development has brought along the need to dispose of a High Court, with competence over International Crimes. The above was the reason to establish the International Criminal Court, destined to prosecute and punish the maximum responsible for crimes of its jurisdiction. Nonetheless, despite the existence of individual criminal responsibility as an accomplice in the case of entrepreneurs who contribute to the crime, there is not an actual investigation or conviction as such in the Court fase for those individuals. Through a criminological study, the actions in the frame of the criminal policy in international law, in order to hold individual criminal responsibility towards entrepreneurs for international crimes, will be evaluated, from the dogmatic categories established in the international guidelines as well as from international doctrine.

  3. Criminal Network Investigation: Processes, Tools, and Techniques

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    important challenge for criminal network investigation, despite the massive attention it receives from research and media. Challenges such as the investigation process, the context of the investigation, human factors such as thinking and creativity, and political decisions and legal laws are all challenges...... that could mean the success or failure of criminal network investigations. % include commission reports as indications of process related problems .. to "play a little politics" !! Information, process, and human factors, are challenges we find to be addressable by software system support. Based on those......Criminal network investigations such as police investigations, intelligence analysis, and investigative journalism involve a range of complex knowledge management processes and tasks. Criminal network investigators collect, process, and analyze information related to a specific target to create...

  4. International Criminal Law: Over-studied and Underachieving?

    OpenAIRE

    Van Sliedregt, E

    2016-01-01

    In his recent review of Neil Boister's book, An Introduction to Transnational Criminal Law, Robert Currie praises the author for shedding light on a field of law that has suffered from inattention. Transnational criminal law (TCL), the 'other' branch of what was traditionally called international criminal law, has been overshadowed by international criminal law 'proper' (ICL). The establishment of international criminal tribunals after the end of the Cold War, culminating in the establishment...

  5. Discovering Cartels: Dynamic Interrelationships between Civil and Criminal Antitrust Investigations

    OpenAIRE

    Ghosal, Vivek

    2006-01-01

    This paper focuses on the genesis, taxonomy and timeline of U.S. criminal antitrust investigations, and uses time-series data on enforcement to examine the interrelationships between the various criminal enforcement variables as well as the linkages between criminal and civil enforcement. The key findings are: (1) there appears to be considerable dynamic interplay between the criminal variables. For example, an increase in grand jury investigations or criminal cases initiated or the number of...

  6. Terrorist threat, chemical, biological, radiological, nuclear medical approach; Menace terroriste, approche medicale nucleaire, radiologique, biologique, chimique

    Energy Technology Data Exchange (ETDEWEB)

    Revel, Th. de [Hopital d' Instruction des Armees Percy, 92 - Clamart (France); Gourmelon, P. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Clamart (France); Vidal, D. [Centre de Recherche du Service de Sante des Armees, 38 - La Tronche (France); Renaudeau, C. [Ecole du Val de Grace, 92 - Clamart (France)

    2005-07-01

    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  7. Criminal law and psychology: Connection points

    OpenAIRE

    Drakić Dragiša

    2014-01-01

    In the paper the author discovers and analyzes areas which represent points of connection between criminal law and psychology, the areas in which cooperation between these two fields of science is possible and desirable. This article is divided into several sections. Firstly, the author talks about the emergence of psychology as a science and its definition. In the sections that follow the author offers analysis of initial contact between ways of thinking in primeval criminal law and psycholo...

  8. Colour revolutions: criminal-legal aspect

    Directory of Open Access Journals (Sweden)

    Sergey Alekseyevich Gordeychik

    2015-03-01

    Full Text Available Objective basing on the analysis of colour revolution technologies in different countries to formulate propositions for improving criminal legislation aimed at counteraction against this phenomenon. Methods general scientific induction deduction analysis synthesis and specific scientific formaljuridical and comparativelegal. Results using the results of colour revolutionsrsquo research carried out by political scientists the author evaluates the character and level of public danger of colour revolutions. The author states that the colour revolutions threaten the normal existence of the country or several countries. The conclusion is made that the colour revolutions must be counteracted by criminallegal means. The article states the absence of norms in the existing criminal legislation which would impose criminal liability on organizers incendiaries and participants of colour revolutions. It is proposed to supplement the existing criminal law with the norm stipulating the liability for such deeds and to insert this norm into Art. 34 ldquoCrimes against peace and security of humanityrdquo thus equating organization preparation and implementing colour revolutions with planning preparation launching and conducting an aggressive war Art. 353 of the Russian Criminal Code. Scientific novelty basing on the existing legal norms modern politological and juridical scientific literature a conclusion is made that the colour revolutions are based on the abuse of law. This allows the organizers of colour revolutions to legally prepare and implement the subversion of undesirable political regimes. The author formulates proposals for supplementing the criminal legislation. Practical value the materials and conclusions of the article can be used in lawmaking activity when elaborating the drafts of legal acts for changing and supplementing the Russian Criminal Code for research activity when preparing monographs and dissertations tutorials and articles when

  9. Comparison of criminal procedure and inspection

    International Nuclear Information System (INIS)

    Hyung, Sang Cheol

    2009-01-01

    While a criminal investigation and international inspection are similar in the purpose of identifying any possible violator, there are also differences between them. Especially in the case of a criminal procedure, the defendants are presumed to be innocent until he or she is convicted, but states must make efforts to prove their nuclear transparency. Let's compare both of them to find out the reason why these different points have happened

  10. Neurotechnological Behavioural Treatment of Criminal Offenders

    DEFF Research Database (Denmark)

    Ryberg, Jesper; Petersen, Thomas Søbirk

    2013-01-01

    at the behaviour for which the criminal is convicted. In this article it is argued that Bomann-Larsen's analysis of the morality of offers does not provide a solid base for this conclusion and that, even if the analysis is assumed to be correct, it still does not follow that voluntary rehabilitation schemes...... targeting behaviour beyond the act for which a criminal is convicted are inappropriate....

  11. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  12. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  13. Cognitive fallacies and criminal investigations.

    Science.gov (United States)

    Ditrich, Hans

    2015-03-01

    The human mind is susceptible to inherent fallacies that often hamper fully rational action. Many such misconceptions have an evolutionary background and are thus difficult to avert. Deficits in the reliability of eye-witnesses are well known to legal professionals; however, less attention has been paid to such effects in crime investigators. In order to obtain an "inside view" on the role of cognitive misconceptions in criminalistic work, a list of fallacies from the literature was adapted to criminalistic settings. The statements on this list were rated by highly experienced crime scene investigators according to the assumed likelihood of these errors to appear and their severity of effect. Among others, selective perception, expectation and confirmation bias, anchoring/"pars per toto" errors and "onus probandi"--shifting the burden of proof from the investigator to the suspect--were frequently considered to negatively affect criminal investigations. As a consequence, the following measures are proposed: alerting investigating officers in their training to cognitive fallacies and promoting the exchange of experiences in peer circles of investigators on a regular basis. Furthermore, the improvement of the organizational error culture and the establishment of a failure analysis system in order to identify and alleviate error prone processes are suggested. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  14. Criminal sanctions for legal enties: An instrument of crime control

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2016-01-01

    Full Text Available Although contemporary criminal law accepts the system of subjective criminal liability for a committed crime, numerous European legal documents as well as criminal laws, especially those that have been adopted lately, envisage exceptions from this system. Thus, a new form of criminal liability is being introduced: objective liability based on the causation. One of the forms of objective liability is the criminal liability of legal entities, which has been considered disputable for a long time. Obviously, legal entities cannot be held accountable for all types of criminal offences. They cannot be held liable on the grounds of legal provisions regarding mental competence and culpability (as the elements of subjective criminal liability, nor can they be imposed all types of criminal sanctions recognized in criminal legislation in general. In their new or revised criminal legislation, many countries have recognized and inagurated the objective criminal liability of legal persons for committed criminal offences alongside with the predominant system of subjective liability (based on the perpetrator's mental competence and culpability. It is indisputable that some legal entities (such as state authorities cannot be prosecuted and held liable in criminal proceedings; consequently, there are some exemptions from criminal liability (particularly when it comes to the state and state bodies, but it does not exclude criminal liability of responsible officials (natural persons for causing the consequences of a criminal offence. Due to the specific character of legal and contractual capacity of legal entities, law in general and criminal legislations in particular prescribe special legal grounds for establishing criminal liability of legal entities, which differ from the subjective liability of a natural person (perceived as a conscious and reasonable human being acting on his/her own free will where the consequence of a criminal offence is a result of one

  15. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  16. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  17. The suspended sentence in German criminal law

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2017-01-01

    Full Text Available From the ancient times until today, criminal law in all countries has provided different criminal sanctions as social control measures. These are court-imposed coercive measures that take away or limit certain rights and freedoms of criminal offenders. Sanctions are applied to natural or legal persons who violate the norms of the legal order and cause damage or endanger other legal goods that enjoy legal protection. In order to effectively protect social values jeopardized by the commission of crime, state legislations prescribe several kinds of criminal sanctions: 1 penalties, 2 precautions, 3 safety measures, 4 penalties for juvenile offenders, and 5 sanctions for legal persons. Penalties are the basic, the oldest and the most important type of criminal sanctions. They are prescribed for the largest number of criminal offences. Imposed instead of or alongside with penalties, warning measures have particularly important role in jurisprudence. Since they were introduced in the system of criminal sanctions in the early 20th century, there has been a notable increase in the application of these measures, particularly in cases involving negligent and accidental offences, and minor offences that do not cause serious consequences, whose perpetrators are not persons with criminal characteristics. Warning measures (suspended sentence are envisaged in all contemporary criminal legislations, including the German legislation. Suspended sentence is a conditional stay of execution of the sentence of imprisonment for a specified time, provided that the convicted person fulfills the imposed obligations and does not commit another criminal offense. Two conditions must be fulfilled for the application of these sanctions: a the formal requirement, which is attached to the sentence of imprisonment; and b the substantive requirement, which implies the court assessment that the application of these sanctions is justified and necessary in a particular case. Many

  18. Administrative prejudgment in the Russian criminal law

    Directory of Open Access Journals (Sweden)

    Akhat Akhnafovich Yunusov

    2015-03-01

    Full Text Available Objective basing on the research of formation and development of the administrative prejudgment in the Russian criminal law and comparativelegal analysis of this institution as well as the longterm experience in crime investigation to trace the problems and trends of administrative prejudgment and prove the necessity to introduce or to be more precise legalize the administrative prejudgment in the Russian criminal law. Methods the research is based on the general dialectic method of cognition comparative historical formaljuridical methods as well as special and privatelegal methods of research. Results analysis of the main problems and collisions of administrative prejudgment in the Russian criminal law the doctrine and the practice of implementation of this institution can become the basis for legalization of the administrative prejudgment in the Russian criminal law and implementing it for the crimes stipulated in the Special part of the Russian Criminal Code if they are of low or middle gravity and committed intentionally those most often occurred. The article studies the institution of the administrative prejudgment in the Russian criminal law since 1922 until present. Various researchersrsquo opinions are given for and against returning of this institution. Taking into account the criminological indicators the authors express their own opinion on legalization of the administrative prejudgment. Scientific novelty having abandoned the formal approach to the institution of the administrative prejudgment both in the Russian criminal law and in the foreign laws the authors believe that the criminal personality should be the central factor of the administrative prejudgment legalization. In this context the authors state the direct connection between the personal features of a criminal including their inclination to immoral and illegal behavior and the crime committed by them. Practical value the theoretical conclusions formulated in the research

  19. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  1. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  2. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  3. Criminal law repercussions on the Civil Protection System

    Science.gov (United States)

    Altamura, M.; Musso, L.

    2009-09-01

    The legal systems of our Countries provide the citizenship with a high level of protection. Personal safety and the protection of property are guaranteed by the State through organized structures among which we can include the Civil Protection. The progress of science and technology has greatly improved monitoring tools, currently used by the Civil Protection, which allow, to a certain extent, to predict and prevent risk and natural hazards. The assertion of an individual right, which in some cases has reached a constitutional rank, to benefit from Civil Protection services and the widespread perception throughout the citizenship of the competence of the system to prevent disasters, often causes people to take legal action against Civil Protection authorities should they fail in their duties to protect. However, the attempt of having both recognized an economic compensation for the suffered loss and the punishment of those whom misled, frequently undergoes criminal law. This process could have results that may jeopardize the effectiveness of Civil Protection service without meeting citizens’ demands. A dual effort is thus necessary in order to solve such a problem. On the one hand, an interdisciplinary knowledge needs to pervade criminal law in an attempt to relieve its self-referentiality and pretended supremacy. On the other hand an alternative, and more agile, system -such as civil or administrative law- has to be identified in order to respond to the legitimate requests for protection in the case of a faulty behaviour of the authorities.

  4. Designing Supervision under the preventive Anti-money laundering policy in the European Union

    OpenAIRE

    van den Broek, Melissa

    2014-01-01

    Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing is currently one of the main instruments which regulates efforts to combat money laundering (and terrorist financing) in the European Union. Respecting national procedural autonomy, this directive leaves a high degree of freedom for the Member States in designing their own supervisory architectures under the preventive anti-money laundering policy. This contrib...

  5. Violent and Non-Violent Criminal Behavior among Young Chinese Drug Users: A Mixed Methods Study.

    Science.gov (United States)

    Liu, Liu; Chui, Wing Hong; Chen, Ye

    2018-03-02

    Young drug users are found to be increasingly involved in criminal justice issues. This exploratory and descriptive study aims to analyze the criminal behaviors among young Chinese drug users through a mixed methods research design. Quantitative analysis indicates that young drug users with and without a history of criminality show significant differences in terms of several features. Male drug users, particularly, those who are older, with religious beliefs, and initiated into drug use at younger age were most likely to commit crimes. Among drug users with criminal experiences, those who committed crimes prior to drug initiation have a greater likelihood of committing violent crimes. Furthermore, young drug users with severe depression are more likely to commit crimes, especially violent ones. Qualitative analysis further illustrates that young male drug users often get involved in criminal conduct of the youth gang nature with propensity for engaging in violent crimes as compared to their female counterparts who are more likely to turn into drug dealers and traffickers, in addition to engaging in larceny. The research findings are consistent with developmental theories and "victim to offender cycle". Integrated mental health and substance use services are suggested for crime prevention among young Chinese drug users.

  6. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  7. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  8. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  9. Some Common Issues and the Application of more Favorable Criminal Law for Crimes against the Person according to the New Criminal Code

    Directory of Open Access Journals (Sweden)

    Ion Rusu

    2015-12-01

    Full Text Available The paper examines the main common issues of crimes against the person, and some other situations of more favorable criminal law enforcement. The innovations consist in the conducted examination and the views expressed on some situations in which the more favorable criminal law should be applied. The main change with a strong preventive feature is to introduce the two institutions, namely, the renunciation of applying the punishment and postponing the punishment, which generally is given a favoring regime to physical or legal entities being at their first conflict with the law or in the case of committing crimes whose seriousness is reduced. The paper continues other papers published in the field, and it can be useful both to academics and practitioners in the domain of preventing and combating crime of this kind.

  10. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  11. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  12. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  13. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  14. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  15. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. [Personality disorders, violence and criminal behaviour].

    Science.gov (United States)

    Palmstierna, Tom

    2016-12-06

    Personality disorders, violence and criminal behaviour The importance of personality disorders for violent and criminal behaviour is illustrated by their high prevalence in prison populations. Especially antisocial personality disorder and antisocial personality traits are linked to violence. During diagnostic assessment of personality disorders, violence risk screening is recommended. Cognitive behaviour treatment focused on violent behaviour has some effect in criminal populations, but the antisocial personality traits are resistant to treatment. Evidence for pharmacological treatment of repetitive aggressive behaviour is weak. But, bensodiazepines seem to increase the risk of violent behaviour among patients with personality disorders. Antisocial personality traits diminish over time. This spontaneous decrease can be delayed by comorbidity such as other personality disorder, substance use disorder, psychosis and attention deficit disorders. Therefore it is recommended to actively treat these comorbid conditions.

  17. Conflicts of Jurisdiction in Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Mihail Silviu Pocora

    2015-05-01

    Full Text Available This paper will consider the practical settlement of conflicts of jurisdiction both in relation to the forum for prosecution and transfer of proceedings. The corollary of free movement of people is free movement of judgments, sentences and related powers of investigation and prosecution. Cross border crime requires to be addressed by equipping law enforcement and prosecution authorities with mechanisms to ensure the public interest in the investigation and prosecution of crime is met. The starting point for any consideration is the place where the criminal conduct took place. Sometimes the crime is such that criminal jurisdiction will be fixed - such as theft of property, crimes of violence - where others have an impact or criminal conduct in more than one jurisdiction - drug importation, major transnational drug dealing, human trafficking, terrorism.

  18. Self-conscious emotions and criminal offending.

    Science.gov (United States)

    Tibbetts, Stephen G

    2003-08-01

    This study examined the relation of personality traits--shame-proneness, guilt-proneness, and pride--on offending behavior. Using survey data from a sample of 224 college students, the construct and criterion-related validity of scales of the Shame Proneness Scale, the Test of Self-conscious Affect, and the Personality Feelings Questionnaire-2 were assessed. Regression analyses showed that self-conscious emotions are important in the etiology of criminal offending. Specifically, rated pride was positively correlated with self-reported criminal activity, whereas ratings of guilt were negatively associated with offending. The relation of shame with criminality varied depending on the type of measure used to indicate proneness to shame.

  19. BRIEF CONSIDERATIONS REGARDING MEDIATION IN CRIMINAL MATTERS

    Directory of Open Access Journals (Sweden)

    LUMINITA DRAGNE

    2012-05-01

    Full Text Available Mediation is an alternative means of conflict resolution, is designed as a flexible procedure whose utility was observed in contrast to the deficiencies of the judiciary system. In the field of criminal law, mediation is part of the larger concept of the restorative justice whose aim is restoring the main victim in its rights. From this perspective, to the criminal process is intended, in principal, repairing of the victim's prejudice and, subsequently, to encourage the delinquent in taking responsibility and to acknowledge his guilt, and also to determine him to actively participate in repairing the damage caused. The ultimate goal of the process is giving back the delinquent to society and consequently, reducing the relapse. Romanian legislator has not taken this concept, and how it is regulated mediation in criminal matters is hesitant, cautious and ultimately ineffective. Specifically, in situations that will actually occur, victim-delinquent mediation will only take the form of "assisted reconciliation."

  20. Criminal aspect of injuries in sports

    Directory of Open Access Journals (Sweden)

    Mandarić Sanja

    2016-01-01

    Full Text Available In this paper the concept of sports ethics is defined and attention is directed to kinds of behavior which are not considered as fair play, the general conception of criminal offence as well as the elements of general idea of criminal act, unlawfulness and guilt with special attention paid to the basis on which unlawfulness and delict, and with them, the criminal offence itself are excluded. Consent of the injured party as basis for excluding unlawfulness has been carefully considered, with emphasis on the fact that with accepting to participate is a certain sport an athlete does not consent to be hurt outside the frame which rules of a particular sport imply. The attitude is accepted that with his consent an athlete consented to the possibility for his integrity be endangered, which still does not mean that he consented to be injured indeed, i.e. a difference is recognized between the consequence of endangering and the consequence of injuring protected assets. After that, rules which are applied in certain sports are explained and connected with the acceptance of the injured party, and the stand is taken that acceptance of the injured party excludes existence of criminal deed only in a situation when an injury occurred within the rules of a particular sport. If the injury occurred by breaking the rules of the sport, it would be considered as a criminal act. In conclusion, the stand is taken that it is necessary to fight against all harmful occurrences in sports, including the injuries which occurred due to severe violation of rules which should be applied in a particular sport. It is concluded that consent of the injured party must not be an excuse for not applying criminal justice, if the injury occurred by violation of the rules of a particular sport.

  1. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  2. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  3. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  4. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  5. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  6. Criminal Policy Movements and Legal Education

    Directory of Open Access Journals (Sweden)

    Thula Rafaela de Oliveira Pires

    2016-10-01

    Full Text Available The article's intention is to make an analyse of the emerging criminal policy movements in Brazil, especially after the 1980 decade, and their influence on legal education. Based on empirical research in Law Course UNIFESO (Teresópolis- Rio de Janeiro, it is sought to identify the political and criminal discourses prevalent in positions of hegemonic power among the Law scholars. Beyond the necessity of interdisciplinary approach, it is defended a more radical critique of the knowledge production process, with the affiliation of decolonial perspective, fundamental for the deconstruction of punitive normalization standards adopted by the modern States, of colonial slave matrix.

  7. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  8. Reforming China’s Criminal Procedure Law

    OpenAIRE

    Winckler, Hugo

    2014-01-01

    Sources:- Wang Jianxun, “The provisions of the reform of criminal procedural law legalising secret investigations are a step backwards,” Caijing wang, 5 September 2011.- Chen Youxi, “The legalisation of secret investigations is an important violation of political integrity,” Zhongguo wangluo dianshitai – CNTV web site, Opinion section, 27 November 2011.- Wu Zhehua, “Chen Weidong discusses reform of the criminal procedure law: Behind each article there is a story,” Zhongguoguangbo wang, 8 Marc...

  9. Diagnosis of antisocial personality disorder and criminal responsibility

    NARCIS (Netherlands)

    Spaans, M.; Barendregt, M.; Haan, B.; Nijman, H.L.I.; Beurs, E. de

    2011-01-01

    The present study empirically investigates whether personality disorders and psychopathic traits in criminal suspects are reasons for diminished criminal responsibility or enforced treatment in high security hospitals. Recently, the tenability of the claim that individuals with personality disorders

  10. 76 FR 44757 - Blocking Property of Transnational Criminal Organizations

    Science.gov (United States)

    2011-07-27

    ... Property of Transnational Criminal Organizations By the authority vested in me as President by the... America, find that the activities of significant transnational criminal organizations, such as those... of international political and economic systems. Such organizations are becoming increasingly...

  11. International Criminal Justice and the Politics of Compliance

    NARCIS (Netherlands)

    Lamont, Christopher

    2010-01-01

    International Criminal Justice and the Politics of Compliance provides a comprehensive study of compliance with legal obligations derived from the International Criminal Tribunal for the former Yugoslavia's (ICTY) Statute and integrates theoretical debates on compliance into international justice

  12. The Value Of Justice In Child Criminal Justice System A Review Of Indonesian Criminal Law

    Directory of Open Access Journals (Sweden)

    Andi Sofyan

    2015-08-01

    Full Text Available The value of justice in Act No. 11 of 2012 concerns the Child Criminal Justice System Act No. SPPA confirms the Restorative Justice Approach as a method of disputes resolution. The method of research used was normative-legal research with philosophical approach. The results showed that the value of restorative justice through diversion contained in Act SPPA but the diversion limit for certain types of criminal acts and threats of punishment under seven 7 years and not a repetition criminal recidivists. This indicates that Act SPPA still contained a retributive justice not promote the interests of protection for child.

  13. Simply criminal: predicting burglars' occupancy decisions with a simple heuristic.

    Science.gov (United States)

    Snook, Brent; Dhami, Mandeep K; Kavanagh, Jennifer M

    2011-08-01

    Rational choice theories of criminal decision making assume that offenders weight and integrate multiple cues when making decisions (i.e., are compensatory). We tested this assumption by comparing how well a compensatory strategy called Franklin's Rule captured burglars' decision policies regarding residence occupancy compared to a non-compensatory strategy (i.e., Matching Heuristic). Forty burglars each decided on the occupancy of 20 randomly selected photographs of residences (for which actual occupancy was known when the photo was taken). Participants also provided open-ended reports on the cues that influenced their decisions in each case, and then rated the importance of eight cues (e.g., deadbolt visible) over all decisions. Burglars predicted occupancy beyond chance levels. The Matching Heuristic was a significantly better predictor of burglars' decisions than Franklin's Rule, and cue use in the Matching Heuristic better corresponded to the cue ecological validities in the environment than cue use in Franklin's Rule. The most important cue in burglars' models was also the most ecologically valid or predictive of actual occupancy (i.e., vehicle present). The majority of burglars correctly identified the most important cue in their models, and the open-ended technique showed greater correspondence between self-reported and captured cue use than the rating over decision technique. Our findings support a limited rationality perspective to understanding criminal decision making, and have implications for crime prevention.

  14. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  15. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  16. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  17. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  18. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  19. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  20. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  1. Criminal adjudication by state courts under the FDRE constitution ...

    African Journals Online (AJOL)

    ... delegation power or as an original power. This article explores how the state courts are adjudicating federal criminal matters, and how the criminal adjudicative jurisdiction of the federal courts and state courts is compartmentalized. Keywords: jurisdiction, criminal adjudication, compartmentalization, constitution, federalism ...

  2. 30 CFR 208.14 - Civil and criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Civil and criminal penalties. 208.14 Section... MANAGEMENT SALE OF FEDERAL ROYALTY OIL General Provisions § 208.14 Civil and criminal penalties. Failure to abide by the regulations in this part may result in civil and criminal penalties being levied on that...

  3. 33 CFR 401.205 - Civil and criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Civil and criminal penalties. 401... § 401.205 Civil and criminal penalties. (a) If the violation of the Seaway Regulations carries a... criminal proceedings shall not bar the initiation of civil penalty proceedings by the Associate...

  4. On the Issue of the Concept "Coercive Criminality"

    Directory of Open Access Journals (Sweden)

    Pestereva Y. S.

    2014-04-01

    Full Text Available The article deals with the actual problems relating to the concept of coercive criminality. Here is determined the lexical scope of the concept "coercion"; the philosophical and criminal law contents of the researched term are compared; the types of the coercive criminality are determined.

  5. The right to a fair appeal in international criminal law

    NARCIS (Netherlands)

    Djukic, Drazan

    2017-01-01

    The Right to a Fair Appeal in International Criminal Law – Layman’s Summary A criminal trial does not end after the first judgment of a court. A person is only finally found guilty or innocent after one or more appeals. Appeals thus have an important place in the criminal justice system. However,

  6. 28 CFR 3.2 - Assistant Attorney General, Criminal Division.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Assistant Attorney General, Criminal... Attorney General, Criminal Division. The Assistant Attorney General, Criminal Division, is authorized to exercise the power and authority of and to perform the functions vested in the Attorney General by the Act...

  7. 33 CFR 1.07-90 - Criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Criminal penalties. 1.07-90... GENERAL PROVISIONS Enforcement; Civil and Criminal Penalty Proceedings § 1.07-90 Criminal penalties. (a... death. (2) Marine Boards (46 CFR part 4). (3) Violations of port security regulations (33 CFR parts 6...

  8. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence/Criminal Information. 635.5... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.5 Police Intelligence/Criminal Information. (a) The purpose of gathering police intelligence is to identify individuals...

  9. 21 CFR 1405.625 - Criminal drug statute.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Criminal drug statute. 1405.625 Section 1405.625 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1405.625 Criminal drug statute. Criminal drug statute means a...

  10. 46 CFR 5.69 - Evidence of criminal liability.

    Science.gov (United States)

    2010-10-01

    ... INVESTIGATION REGULATIONS-PERSONNEL ACTION Statement of Policy and Interpretation § 5.69 Evidence of criminal liability. Evidence of criminal liability discovered during an investigation or hearing conducted pursuant... 46 Shipping 1 2010-10-01 2010-10-01 false Evidence of criminal liability. 5.69 Section 5.69...

  11. The Productivity of Criminology and Criminal Justice Faculty.

    Science.gov (United States)

    DeZee, Matthew R.

    The scholarly productivity of criminology and criminal justice faculty and programs was investigated. The methodologies that were used to rate journals that publish articles in the criminology/criminal justice field and to select 71 schools with graduate programs in criminology or criminal justice are described. Primary interest focused on…

  12. Mens Rea Principle and Criminal Jurisprudence in Nigeria ...

    African Journals Online (AJOL)

    This paper discusses the possibility or otherwise of the application of the common law doctrine of mens rea in Nigerian criminal jurisprudence. Our study discovers that the relevant provisions of the Criminal Code are exhaustive for considering and deciphering the criminal intent, if any, of an accused in view of conviction ...

  13. Civilisation of Criminal Justice: Restorative Justice amongst other strategies

    NARCIS (Netherlands)

    J.R. Blad (John)

    2013-01-01

    markdownabstract__Abstract__ Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be

  14. 26 CFR 301.6231(c)-5 - Criminal investigations.

    Science.gov (United States)

    2010-04-01

    ... criminal investigation for violation of the internal revenue laws relating to income tax will interfere... latest taxable year of the partner to which the criminal investigation relates shall be treated as... criminal investigation and written notification is sent by the Internal Revenue Service that the partner's...

  15. The Inextricable Link between Age and Criminal History in Sentencing

    Science.gov (United States)

    Bushway, Shawn D.; Piehl, Anne Morrison

    2007-01-01

    In sentencing research, significant negative coefficients on age research have been interpreted as evidence that actors in the criminal justice system discriminate against younger people. This interpretation is incomplete. Criminal sentencing laws generally specify punishment in terms of the number of past events in a defendant's criminal history.…

  16. Childhood and Adolescent Predictors of Late Onset Criminal Careers

    Science.gov (United States)

    Zara, Georgia; Farrington, David P.

    2009-01-01

    This study explores the emergence of a criminal career in adulthood. The main hypothesis tested is that late criminal onset (at age 21 or later) is influenced by early factors that delay antisocial manifestations. The Cambridge Study in Delinquent Development (CSDD) was used to examine early determinants of criminal behavior. 400 Inner London…

  17. Sexual stigma, criminalization, investment, and access to HIV services among men who have sex with men worldwide.

    Science.gov (United States)

    Arreola, Sonya; Santos, Glenn-Milo; Beck, Jack; Sundararaj, Mohan; Wilson, Patrick A; Hebert, Pato; Makofane, Keletso; Do, Tri D; Ayala, George

    2015-02-01

    Globally, HIV disproportionately affects men who have sex with men (MSM). This study explored associations between access to HIV services and (1) individual-level perceived sexual stigma; (2) country-level criminalization of homosexuality; and (3) country-level investment in HIV services for MSM. 3,340 MSM completed an online survey assessing access to HIV services. MSM from over 115 countries were categorized according to criminalization of homosexuality policy and investment in HIV services targeting MSM. Lower access to condoms, lubricants, and HIV testing were each associated with greater perceived sexual stigma, existence of homosexuality criminalization policies, and less investment in HIV services. Lower access to HIV treatment was associated with greater perceived sexual stigma and criminalization. Criminalization of homosexuality and low investment in HIV services were both associated with greater perceived sexual stigma. Efforts to prevent and treat HIV among MSM should be coupled with structural interventions to reduce stigma, overturn homosexuality criminalization policies, and increase investment in MSM-specific HIV services.

  18. Il crimine organizzato in Italia: analisi evolutiva

    Directory of Open Access Journals (Sweden)

    Elena Bianchini

    2007-12-01

    Full Text Available In Italy, organized crime presents today some specific characteristics : traditional for the existence of ancient roots from particular regions; new for the kind of illegal activities in which organized crime is involved and which is always changing and spreading making international alliances.In Italy, with specific attention to endogenous crime, the last Report on Crime underlines that “the more structured criminal alliances, such as cosa nostra, ‘ndrangheta, camorra and Apulian organized crime , keep on exerting an effective control effect in their original territories and so they are also a very serious threat for the development of relationships between the social components and also for the economy”. This is an alarming situation which requires urgent, preventive, istitutional and social action. The results from the present research are based on the reading and the analysis of the inaugural addresses of judicial years ( 2000-2007.Aujourd'hui en Italie, la criminalité organisée présente des caractéristiques particulières : traditionnelles, en raison de l'existence d'anciennes racines dans certains contextes régionaux ; nouvelles, à cause de la typologie d'activités illicites accomplies ; expansives, par l'aptitude à tisser des alliances transnationales. À propos de la criminalité endogène, le dernier Rapport sur la Criminalité en Italie souligne que "les associations criminelles les plus structurées, cosa nostra, 'ndrangheta, camorra et criminalité organisée des Pouilles, continuent à exercer une action de contrôle efficace des territoires d'origine et à menacer gravement le développement des relations parmi les différentes composantes sociales et de l'ordre économique". L'analyse ici présentée aussi, concernant les rapports inauguraux des années judiciaires (2000-2007, trace un cadre alarmant qui exige des interventions urgentes à niveau préventif, institutionnel et social.

  19. Strategies for Reducing Criminal Violence among Athletes.

    Science.gov (United States)

    Staffo, Donald F.

    2001-01-01

    Discusses the serious problem of criminal violence in the personal lives of athletes, suggesting strategies that physical educators, coaches, and school systems can implement with young athletes which could reduce the incidence and severity of violence later in life (e.g., teaching unconditional respect for others, continually reinforcing social…

  20. Criminal violence and displacement in Mexico

    Directory of Open Access Journals (Sweden)

    Sebastián Albuja

    2014-02-01

    Full Text Available Rampant criminal violence, from direct coercion and physical threats to the erosion of the quality of life and livelihood opportunities, pushes people to move in a variety of ways. Not everyone forced to move has equal access to protection or asylum.

  1. Challenging international criminal tribunals before domestic courts

    NARCIS (Netherlands)

    d' Aspremont, J.; Brölmann, C.; Reinisch, A.

    2011-01-01

    International courts, despite the wide-ranging means that have been put at their disposal, need the cooperation of various domestic actors. The cooperation of States with international criminal tribunals has not always been without difficulty, as these tribunals have been the object of various

  2. 22 CFR 1101.16 - Criminal penalties.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Criminal penalties. 1101.16 Section 1101.16 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED STATES AND MEXICO, UNITED STATES... public notice of a system of records as required by 5 U.S.C. 552a(e)(4). ...

  3. 25 CFR 11.410 - Criminal mischief.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Criminal mischief. 11.410 Section 11.410 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND... he or she: (1) Damages tangible property of another purposely, recklessly, or by negligence in the...

  4. CRIMINAL PSYCHOLOGY IN SPAIN: PRESENT AND FUTURE

    Directory of Open Access Journals (Sweden)

    José Luis González

    2015-05-01

    Full Text Available As part of legal psychology, as it is understood in Spain, we can distinguish between the applications of psychology in the different steps of the judicial process: in police stations during criminal investigations, in court when the perpetrators have already been identified and arrested, and in prisons where they are eventually sent after being convicted. This paper argues that when psychology assists the criminal investigation in the first step of the judicial process - the police activities-, we are talking about criminal psychology, at two levels: the operational level (mostly pertaining to criminal psychology and the strategic level (shared with other areas of expertise. After describing its peculiarities and specific areas, in analogy with the support provided by other forensic sciences, we explain that in Spain this specialty is carried out professionally from within our own police forces, with a profile that is very different from the more traditional police psychology, and in close collaboration with the academic environment with regard to the scientific development of techniques and procedures.

  5. Hyubris as a factor of individual criminal

    Directory of Open Access Journals (Sweden)

    V. V. Surkov

    2014-04-01

    Full Text Available Criminal personality for thousands of years is the object of philosophical research. For philosophical anthropology, in particular, it is important to understand which components of human nature can be regarded as criminal. The term “hubris” that appears in ancient Greek culture, today received its second wind. It is widely used (especially in the West to refer to the human outlook, which provokes too arrogant, defiant behavior, which is a public danger. The term “hubris” is often used in criticism of certain politicians. However, we propose to expand the scope of its application also in other spheres of public life. Іn the history of criminology there are many examples of people with hubris, especially among dangerous criminals. Therefore hubris can be considered as criminogenic factor that requires research and limitations of the society. In another case, there is a situation, by analogy with the term “intoxication of power”, can be called “intoxication of impunity”. This thesis is confirmed by authoritative theories developed in criminology, sociology, psychology too. It is also consistent with some modern philosophical views on the nature of the criminal personality. Analysis of factors that stimulate the emergence and growth of hubris, suggest that most are present in a mass society. It generates anomie (loss of values that щаеут manifests as hubris that can act as criminogenic factor. Therefore, hubris reducing requires changes in the organization of social life.

  6. 17 CFR 14.5 - Criminal conviction.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Criminal conviction. 14.5 Section 14.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... felony or of a misdemeanor involving fraud or involving moral turpitude in matters related to the...

  7. The Hispanic Experience of Criminal Justice.

    Science.gov (United States)

    Sissons, Peter L.

    This monograph explores the Hispanic experience of the criminal justice system by examining statistics provided by Federal, State, and local agencies. A review of the literature provides a theoretical perspective from which to view the data. Examination of the first set of data begins with a description of the experiences of Puerto Ricans in the…

  8. Criminal Justice Research Is about People.

    Science.gov (United States)

    Conrad, John P.

    1982-01-01

    Suggests that the Golden Age of criminal justice research has ended with an impending era of austerity. Reviews the work done in the past forty years and recommends a return to the people-oriented research that characterized the Chicago School of the early '20s rather than systems research. (Author/JAC)

  9. Open Access for International Criminal Lawyers

    NARCIS (Netherlands)

    van Laer, Coen

    2016-01-01

    This study investigates to what extent Open Access is useful for international criminal lawyers. Free reuse and distribution may be particularly advantageous for the audience in less resourceful countries. And individual authors need visibility to promote their academic reputation. However, many

  10. Association and Centrality in Criminal Networks

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    Network-based techniques are widely used in criminal investigations because patterns of association are actionable and understandable. Existing network models with nodes as first class entities and their related measures (e.g., social networks and centrality measures) are unable to capture...

  11. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  12. Predicting criminals' personality characteristics by using the Minnesota Multiphasic Personality Inventory (MMPI in committing type of crime

    Directory of Open Access Journals (Sweden)

    Mustafa Mohebbi

    2016-07-01

    Full Text Available Understanding criminals' personality characteristics could engender appropriate solutions for preventing crimes and treating criminals and the aim of the current work is to predict criminals' (robbers, swindlers and smugglers personality characteristics by using the Minnesota Multiphasic Personality Inventory (MMPI in committing type of crime. The research falls under the applied category in terms of goal while in terms of nature it is among surveydescriptive researches. The sample under investigation includes 480 people who were selected by way of classified random sampling method in a systematic form from among the population of criminals in the Central Prison, province of Kermanshah. The tool used in this paper is the Minnesota Multiphasic Personality Inventory (MMPI (short form of 71 questions. The results obtained from the Minnesota Multiphasic Personality Inventory (MMPI indicated that prevalence of anti-social personalitycharacteristics and mental weakness among robbers; depression, anti-social personality and schizophrenia among swindlers as well as anti-social traits, mental weakness and schizophrenia among smugglers are seen significantly. Also, the results of the variance analysis demonstrated that there is a significant difference between the (MMPI clinical scales among three groups of criminals (robbers, swindlers and smugglers on D scales (depression, Pd (Psychopathy deviation, Pt (Anxiety and psychosis, Sc (Schizophrenia and Ma (Hypomania (p<%5. Research findings revealed that criminals enjoy lower level of normal and positive personality dimensions. To sum up, we can infer that all personality characteristics exist in the population of criminals and therapy experts need to pay attention to all sorts of personalities for treating criminals affected with personality disorder.

  13. Bribery offences under Vietnamese criminal law in comparision with Swedish and Australian criminal law

    OpenAIRE

    Dao Le, Thu

    2011-01-01

    There have been attempts, all over the world, to address bribery with recourse to criminal law. As many other countries, Vietnam has been doing activities that show the determination of combating and controlling corruption, including strengthening penal provisions in terms of bribery. However, the situation of bribery in Vietnam is still alarming. For Vietnamese law enforcement authorities, criminal provisions concerning bribery are neither adequate nor clear. Analysis starts with bot...

  14. JPRS Report: East Asia, Southeast Asia, LPDR Criminal Code, Courts, and Criminal Procedure.

    Science.gov (United States)

    1991-03-05

    1941 - 1991 JPRS Repor East Asia Southeast Asia LPDR Criminal Code, Courts, and Criminal Procedure mom m £C QUALITY »ra^r...prostitution, will be impris- oned for three to five years. Article 124. Incest . Anyone who has sexual intercourse with parents, step- parents...This consists of facts which indicate whether there have been actions dangerous to society, the guilt of the per- sons who undertook the

  15. Criminal proceedings involving children in conflict with the law

    Directory of Open Access Journals (Sweden)

    Bolocan-Holban Augustina

    2017-07-01

    Full Text Available At each stage of criminal procedure involving children (juveniles in conflict with the law, it is important to be ensured the fundamental rights provided by international standards, as well by national criminal legislation. Starting with the first contact of the child with criminal justice system until the pronunciation of the decision by the Court, including the enforcement of the punishment, the juvenile must be supervised by qualified professionals from criminal justice system, who could intervene in each moment with a purpose of providing pertinent information to criminal investigative body and to the Court, in order to establish a proportionate and equitable punishment.

  16. The Expansion of Criminal Control: A Critical to Feather Functions

    Directory of Open Access Journals (Sweden)

    Mariel Muraro

    2015-12-01

    Full Text Available This article aims to relate the theories of punishment, retributive and preventive, with the criminological discourse, and make brief notes about the negative theories and criticism of the sentence. The article begins by making a few notes on the mass incarceration of the phenomenon, then going to discuss and present the form of action of the police state. Then they present the theories of punishment under the critical perspective, and then work the two main critical theories of punishment, thus treating the position Prof. Eugenio Raúl Zaffaroni and Prof. Juarez Cirino dos Santos. These presentations and discussions have left the critical discourse, not taking our work as end revisit the theoretical construction of the functions of the pen, just to demonstrate how the discourse of shame built by criminal law legitimizes selective and violent actions of the penal system.

  17. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  18. Criminal thinking styles and emotional intelligence in Egyptian offenders.

    Science.gov (United States)

    Megreya, Ahmed M

    2013-02-01

    The Psychological Inventory of Criminal Thinking Styles (PICTS) has been applied extensively to the study of criminal behaviour and cognition. Increasingly growing evidence indicates that criminal thinking styles vary considerably among individuals, and these individual variations appear to be crucial for a full understanding of criminal behaviour. This study aimed to examine individual differences in criminal thinking as a function of emotional intelligence. A group of 56 Egyptian male prisoners completed the PICTS and Bar-On Emotional Quotient Inventory (EQ-i). The correlations between these assessments were examined using a series of Pearson correlations coefficients, with Bonferroni correction. General criminal thinking, reactive criminal thinking and five criminal thinking styles (mollification, cutoff, power orientation, cognitive indolence and discontinuity) negatively correlated with emotional intelligence. On the other hand, proactive criminal thinking and three criminal thinking styles (entitlement, superoptimism and sentimentality) did not associate with emotional intelligence. Emotional intelligence is an important correlate of individual differences in criminal thinking, especially its reactive aspects. Practical implications of this suggestion were discussed. Copyright © 2013 John Wiley & Sons, Ltd.

  19. Turning Asylum Seekers into ‘Dangerous Criminals’: Experiences of the Criminal Justice System of those Seeking Sanctuary

    Directory of Open Access Journals (Sweden)

    Monish Bhatia

    2015-10-01

    Full Text Available Since the events of 9/11 in the US in 2001 and, four years later, the 7/7 London bombings in the UK, warnings of terrorist attacks are high on the public agenda in many western countries. Politicians and tabloid press in the UK have continued to make direct and indirect connections between asylum seekers, terrorism and crime. This has increasingly resulted in harsh policy responses to restrict the movement of ‘third-world’ nationals, criminalisation of immigration and asylum policy, and making the violation of immigration laws punishable through criminal courts. This paper largely highlights the narratives of five asylum seekers who committed ‘crime’ by breaching immigration laws and were consequently treated as ‘dangerous criminals’ by the state authorities. More importantly it shows how these individuals experienced this treatment. The aim of this paper is to give voice to the victims of state abuse, claim space for victim agency, gather victim testimonies, challenge official explanations and in the process confront criminal and racist state practices.

  20. Criminal investigations in child protective services cases: an empirical analysis.

    Science.gov (United States)

    Cross, Theodore P; Chuang, Emmeline; Helton, Jesse J; Lux, Emily A

    2015-05-01

    This study analyzed the frequency and correlates of criminal investigation of child maltreatment in cases investigated by child protective service (CPS), using national probability data from the National Survey of Child and Adolescent Well-Being. Criminal investigations were conducted in slightly more than 25% of cases. Communities varied substantially in percentage criminally investigated. Sexual abuse was the most frequent type of maltreatment criminally investigated followed by physical abuse. Logistic regression results indicated that criminal investigations were more likely when caseworkers perceived greater harm and more evidence; when CPS conducted an investigation rather than an assessment; when a parent or a legal guardian reported the maltreatment; and when cases were located in communities in which CPS and police had a memorandum of understanding (MOU) governing coordination. Most variation between communities in criminal investigation remained unexplained. The findings suggest the potential of MOUs for communities wanting to increase criminal investigation. © The Author(s) 2014.

  1. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  2. Making Immigrants into Criminals: Legal Processes of Criminalization in the Post-IIRIRA Era

    Directory of Open Access Journals (Sweden)

    Leisy Abrego

    2017-09-01

    Full Text Available During a post-election TV interview that aired mid-November 2016, then President-Elect Donald Trump claimed that there are millions of so-called “criminal aliens” living in the United States: “What we are going to do is get the people that are criminal and have criminal records, gang members, drug dealers, we have a lot of these people, probably two million, it could be even three million, we are getting them out of our country or we are going to incarcerate.” This claim is a blatant misrepresentation of the facts. A recent report by the Migration Policy Institute suggests that just over 800,000 (or 7 percent of the 11 million undocumented individuals in the United States have criminal records. Of this population, 300,000 individuals are felony offenders and 390,000 are serious misdemeanor offenders — tallies which exclude more than 93 percent of the resident undocumented population (Rosenblum 2015, 22-24.[1] Moreover, the Congressional Research Service found that 140,000 undocumented migrants — or slightly more than 1 percent of the undocumented population — are currently serving time in prison in the United States (Kandel 2016. The facts, therefore, are closer to what Doris Meissner, former Immigration and Naturalization Service (INS Commissioner, argues: that the number of “criminal aliens” arrested as a percentage of all fugitive immigration cases is “modest” (Meissner et al. 2013, 102-03. The facts notwithstanding, President Trump’s fictional tally is important to consider because it conveys an intent to produce at least this many people who — through discourse and policy — can be criminalized and incarcerated or deported as “criminal aliens.” In this article, we critically review the literature on immigrant criminalization and trace the specific laws that first linked and then solidified the association between undocumented immigrants and criminality. To move beyond a legal, abstract context, we also draw on

  3. A BRIEF STUDY ABOUT THE LEGAL NATURE OF PRECAUTIONA RY PRISONS (? IN BRAZILIAN CRIMINAL PROCESS

    Directory of Open Access Journals (Sweden)

    Tatiana Paula Cruz de Siqueira

    2015-12-01

    Full Text Available This article analyzes, even if soon, the legal nature of prison said as precautionary, that occur during the police investigation or criminal process. Over this study, prison in the act, preventive prison, according to each of its assumptions and, lastly, temporary prison will bel analyzed. At the end, will be presented the measures, which are effectively considered precautionary, serving to the utility of the final provision, like security measures

  4. The Essence Of The Legal Culture In Achieving The Purpose Of Criminalization For Corruptor

    Directory of Open Access Journals (Sweden)

    Halila Rama Purnama

    2015-08-01

    Full Text Available Abstract Nowadays efforts to eradicate corruption become a global problem and not only as a national or regional issues. For a developing country like Indonesia has almost become a condition sine qua non. This research reviews the role of legal culture in formulating the legal awareness of the public in an effort to prevent corruption. This research is a sociolegal research leading to search ontologically. The type of research combines the empirical and normative studies. The outcomes of the research indicate that as an extraordinary crime corruption cases should be carried out in an extraordinary way. The consequence it is not only the financial loss of state but a crime that violates the rights of social and economic at large and systemic. Observing the criminal sanctions applicable in the law of corruption linked to the purpose of criminalization against perpetrators of corruption corruptor it can be seen that the essence of criminalization is intended as an attempt to eradicate corruption. But these efforts to date cannot be said to achieve its goals because that looks just taking measure have not been effective to minimize corruption. Criminalization efforts have not actually created the states role in protecting people against the corruption.

  5. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  6. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  7. To the Question of Legal Defects of Article 354.1 of the Criminal Code of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Yuliya S. Pestereva

    2017-08-01

    Full Text Available The main problems of art. 354.1 “Rehabilitation of Nazism” of the Criminal Code of the Russian Federation, designed to prevent the spread of Nazi ideology, both in terms of legal technique and competition with other compounds are analyzed. The Authors suggest possible ways of solving the problems found.

  8. Crime and Young Men: The Role of Arrest, Criminal Experience, and Heterogeneity

    OpenAIRE

    Susumu Imai; Hajime Katayama; Kala Krishna

    2006-01-01

    Using National Youth Survey (NYS) data, we examine the relationship of current criminal activity and past arrests using an ordered probit model with unobserved heterogeneity. Past arrests raise current criminal activity only for the non-criminal type, while past criminal experience raises current criminal activity for both types. Also, the age crime profile peaks at age 18 for non-criminal type individuals, but for criminal type individuals, it continues to rise with age. Past research indica...

  9. The principle of guilt as a basis for criminal sanctions justification review in the Criminal Law in Serbia

    Directory of Open Access Journals (Sweden)

    Ćorović Emir A.

    2013-01-01

    Full Text Available The principle of guilt is one of the essential principles of criminal law. However, it is a very complex principle. Its content has been presented in this paper particularly referring to a systematic deviation of it in the criminal legislation of the Republic of Serbia. According to the provisions of the article 2 of the Criminal Code of Serbia the principle of guilt is related to punishments and warning measures, while security and educational measures remained beyond its reach. On the other side, The Criminal Code defining a crime offense in the article 14 demands culpability of perpetrator's behavior. It involves a conceptual problem: a possibility is given for criminal sanctions of the principle of guilt, article 2 of the Criminal Code not referring to security and educational measures could be applied for people acting without culpability. It is paradoxical to accept criminal-justice reaction in the form of criminal sanctions regarding people without guilt. According to author of this paper, such a normative solution brings into issue the relevant principle, more precisely its basis, generality and guidance, the qualities that every legal principle should maintain. Of course, deviations of legal principle and the principle of guilt are possible but they must be kept to a minimum. Otherwise, systematic legal principle deviations, in this case the principle of guilt, are not to be tolerated. Connecting the principle of guilt with the system of criminal sanctions opens the debate on voluntarism embodied in the freedom of will and guilt and positivism/determinism embodied in perpetrator's danger and educational neglect within the criminal law. It is over a century discussion in the science of criminal law. The author of the paper concludes criminal-justice reaction in the form of criminal sanction can be justified only of based on the principle of guilt. Otherwise, such a reaction has no place in the criminal law.

  10. The interaction of criminal procedure and outcome.

    Science.gov (United States)

    Laxminarayan, Malini; Pemberton, Antony

    2014-01-01

    Procedural quality is an important aspect of crime victims' experiences in criminal proceedings and consists of different dimensions. Two of these dimensions are procedural justice (voice) and interpersonal justice (respectful treatment). Social psychological research has suggested that both voice and respectful treatment are moderated by the impact of outcomes of justice procedures on individuals' reactions. To add to this research, we extend this assertion to the criminal justice context, examining the interaction between the assessment of procedural quality and outcome favorability with victim's trust in the legal system and self-esteem. Hierarchical regression analyses reveal that voice, respectful treatment and outcome favorability are predictive of trust in the legal system and self-esteem. Further investigation reveals that being treated with respect is only related to trust in the legal system when outcome favorability is high. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Extraversion, neuroticism, immoral judgment and criminal behaviour.

    Science.gov (United States)

    Addad, M; Leslau, A

    1989-01-01

    The present study examines delinquent behaviour by integrating two approaches until now employed separately: Eysnck's theory linking delinquency to extraversion and neuroticism, and Kohlberg's theory of moral development and its connection to moral behaviour. The study analyzes the relations between extraversion, neuroticism and moral judgment, as well as their independent and/or interactive effect upon the development of anti-social behaviour. The relationships are tested by retrospective measurements of personality traits and moral judgment in three groups: delinquency (N = 203), control (N = 82) and comparative (N = 407) groups. Findings show that criminals are higher than control subjects in neuroticism and immoral judgment but not in extraversion. Similar relationships were found between criminals and the comparative group, with one exception: here extraversion was found to be positively related to delinquency, both independently and interactively with neuroticism. The implications of these results for differential development of anti-social behaviour are discussed.

  12. Crime and criminal justice in Latin America

    Directory of Open Access Journals (Sweden)

    Rodrigo Ghiringhelli de Azevedo

    Full Text Available After a presentation of indicators that allow assessing the degree of democratization of the criminal justice system in the context of democratization process in Latin America, this article points out the discrepancy existing in that domain, in the several instances that make up the justice system, from criminal legislation to the prison system. Examining the specific situation of Brazil and Argentina, problems in the functioning of institutions responsible by crime as well as the increase in crime control are pointed out as factors that cause a growing loss of legitimacy for the system, which is unable to justify its high degree of selectivity and authoritarianism. Some efforts under way to approach that phenomenon are listed. Finally, a few alternatives for institutional improvement are presented, among which the action of social scientists by producing research and analyses, as a crucial instrument to enlarge institutional ability to deal with current social conflict on democratic bases.

  13. Transnational Crime Fictions and Argentina's Criminal State

    OpenAIRE

    Caballero, Juan

    2013-01-01

    My dissertation, titled "Transnational Crime Fictions and Argentina's Criminal State," proposes a new understanding of the dictatorship novels of Ricardo Piglia, Juan José Saer, and Manuel Puig grounded in their shared appropriation from popular crime fiction. Across the 1940's, 50's, and 60's, a wide range of popular crime fiction was translated, written, theorized, printed and reprinted in Argentina, and these popular genres grew steadily in readership, visibility, and cultural legitimacy....

  14. DETERMINATION OF POTENTIAL CRIMINALS IN SOCIAL NETWORK

    OpenAIRE

    Ceyhan, Eyüp Burak; Sağıroğlu, Şeref; Cesur, Ramazan; Kermen, Ayten

    2017-01-01

    This paper proposes a new approach to determine potential criminals by performing content analysis on Tweets. The analysis is done with the help of machine learning technologies and big data analysis. In this study, we have utilized from the MLP algorithm. A dataset consisting of 384 words are used to make the classification process. Dataset consist of two classes that are organized crime and cyber-crimes. In the analysis process, date, time, location values of sent twitter sharings are also ...

  15. 12 CFR 1403.11 - Criminal penalties.

    Science.gov (United States)

    2010-01-01

    ... Banks and Banking FARM CREDIT SYSTEM INSURANCE CORPORATION PRIVACY ACT REGULATIONS § 1403.11 Criminal penalties. Section 552a(i)(3) of the Privacy Act (5 U.S.C. 552a(i)(3)) makes it a misdemeanor, subject to a... from an agency under false pretenses. Sections 552a(i) (1) and (2) of the Act (5 U.S.C. 552a(i) (1), (2...

  16. Protecting Children Rights under International Criminal Justice

    OpenAIRE

    Erinda Duraj (Male)

    2015-01-01

    Children are a central concern of international criminal justice. International crimes and other forms of violence and the abuse of children are disturbing daily realities in today’s world. Children and young persons are increasingly being targeted for the purposes of murder, rape, abduction, mutilation, recruitment as child soldiers, trafficking, sexual exploitation and other abuses. Sierra Leone, the Democratic Republic of Congo, Rwanda, Colombia, and many others illustrate this. The partic...

  17. Registered criminality and sanctioning of schizophrenia patients

    DEFF Research Database (Denmark)

    Munkner, Runa; Haastrup, Soeren; Joergensen, Torben

    2009-01-01

    BACKGROUND: Patients with schizophrenia have been shown to have an increased risk of criminality, especially violent crimes. AIMS: The aim of the current study was to describe the pattern of crimes committed by Danish patients with schizophrenia and examine the sanctions given for crimes in relat...... than imprison, individuals with schizophrenia. CONCLUSION: The findings suggest that greater alertness is needed in the judicial system for individuals diagnosed with schizophrenia....

  18. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  19. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  20. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  1. The Relevant Physical Trace in Criminal Investigation

    Directory of Open Access Journals (Sweden)

    Durdica Hazard

    2016-01-01

    Full Text Available A criminal investigation requires the forensic scientist to search and to interpret vestiges of a criminal act that happened in the past. The forensic scientist is one of the many stakeholders who take part in the information quest within the criminal justice system. She reads the investigation scene in search of physical traces that should enable her to tell the story of the offense/crime that allegedly occurred. The challenge for any investigator is to detect and recognize relevant physical traces in order to provide clues for investigation and intelligence purposes, and that will constitute sound and relevant evidence for the court. This article shows how important it is to consider the relevancy of physical traces from the beginning of the investigation and what might influence the evaluation process. The exchange and management of information between the investigation stakeholders are important. Relevancy is a dimension that needs to be understood from the standpoints of law enforcement personnel and forensic scientists with the aim of strengthening investigation and ultimately the overall judicial process.

  2. Stalking: Criminological and criminal law aspects

    Directory of Open Access Journals (Sweden)

    Dimovski Darko

    2016-01-01

    Full Text Available Starting from the historical aspects of stalking crime, the author first provides an overview of different definitions of this socially negative behavior in the legal documents of countries where such conduct was first criminalized. The author presents statistical data on the scope of stalking in the United States and Australia. The second part of the paper discusses different types of stalkers, whose distinctive features are analyzed in more detail. In particular, the author focuses on the causal link between the stalking crime and violence, as well as the victims' responses to their own victimization. In the next part of this article, the author provides a detailed analysis of a wide range of consequences of stalking crime. In some cases, the victim of stalking may become the perpetrator of a criminal act of murder, whereas the stalker becomes a victim of this serious form of homicide. Although these cases are not numerous, they call for further analysis and proposing new legal solutions related to the privileged forms of murder, which are aimed at improving the position of the victim of stalking who is the perpetrator of such homicide. Finally, the author argues in favour of incriminating a new type of felony - the crime of stalking (in line with the model envisaged in the criminal legislation of the Republic of Croatia, as well as a privileged homicide which may be designated as a murder of a stalker committed by a victim of stalking.

  3. CRIMINALITY AT MINORS WITH MENTAL DEFICIENCY

    Directory of Open Access Journals (Sweden)

    Zoran Kitkanj

    2009-06-01

    Full Text Available The aim of this paper is to present, from penological aspect, the involvement and structure of recidivism at minors with mental deficiency within the whole area of juvenile criminality in Macedonia. The research covers 62 subjects who pay the penalty in juvenile penitentiary or institutional measure directing to correctional institution for minors. Of the total number of minors who hold one of the above-mentioned sanctions, minors with lower average IQ are presented with 56.4%. The shown involvement is in penological terms (refers to minors who hold institutional measure correctional institution for minors or penalty - juvenile penitentiary which does not mean that this category of juvenile delinquents participate in such percent in the total number of reported, accused and convicted minors. According to the research results it can be concluded that falling behind in intellectual development is an indicator for delinquent behavior but in no case it can be crucial or the most important factor for criminality. Of the total number of juvenile delinquents with intellectual deficit, 80% are repeat offenders in criminal legal sense. It is of great concern that 56% of the under average juvenile delinquents defied the law for the first time before the age of 14 years that is as children.

  4. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  5. Manufacturing white criminals: Depictions of criminality and violence on Law & Order

    Directory of Open Access Journals (Sweden)

    Andrew G. Selepak

    2015-12-01

    Full Text Available This study examines exposure to the police drama television genre and its impact on perceptions of crime and racial criminality. Content analyses of three seasons of Law & Order were examined to evaluate the show’s portrayal of race and crime compared to actual crime statistics for New York City during the same periods. A survey was also conducted to examine perceptions of personal safety and the influence of television’s depiction of race and crime. Results suggest whites are disproportionately portrayed as criminals five to eight times more often on police dramas compared to actual crime statistics for the city of New York, exposure to police dramas increases beliefs of threats to personal safety, and exposure to police dramas leads to elevated perceptions of white criminality among non-whites. Results provide additional support for cultivation theory and “Mean World Syndrome,” and implications for delimitation and racial distrust.

  6. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  7. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  8. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  9. Criminal law aspects of assisted human reproduction in Serbia

    Directory of Open Access Journals (Sweden)

    Samardžić Stefan

    2013-01-01

    Full Text Available Numerous shortcomings of the Law on Infertility Treatment by Biomedically Assisted Fertilization culminate in provisions defining criminal offences. A question is raised regarding the possibility and results of the application of such criminal provisions due to the legislative technique used in the process of their creation, language, qualified forms of the offences, span of criminal sanctions, as well as having in mind the overlapping of such criminal offences with some of the misdemeanors punishable by the same Law. A possibility to provide for a criminal law protection in this highly sensitive area is put into question due to a very courageous action of the legislator reflected in the attempt to introduce criminal offences, punishable by long prison sentences.

  10. An Analysis of the Death Penalty in Indonesia Criminal Law

    Directory of Open Access Journals (Sweden)

    Eddy Rifai

    2017-07-01

    Full Text Available This research uses normative juridical approach to study on the analysis of the death penalty executions and the legal policy of death executions in Indonesia. There are delays on death executions for the convicted person since they entitled to using rights namely filing a judicial review (PK/Peninjauan Kembali. Furthermore, the legal loophole in the execution of the death penalty by the publication of the Constitutional Court Number 107 / PUU-XIII / 2015 which assert that the Attorney as the executor can ask the convicted person or his family whether to use their rights or not if the convict clearly does not want to use his rights, the executions will be carried out. Legal policy on threats and the implementation of the death penalty in the draft of criminal code was agreed by draftsman of the bill with the solutions. The draftsman of the bill agrees that the death penalty will be an alternative punishment sentenced as a last resort to protect the society. The bill also regulates that the execution among others include that the execution can be delayed by ten years probations. If the public reaction on the convict is not too large or convict has regret and could fix it or the role in the crime is not very important and there is a reason to reduce punishment, the death penalty may be changed. For pregnant women and the mentally ill convicts the execution can only be carried after the birth and the person has recovered from mental illness. The existence of this solutions is still kept putting the death penalty in criminal law, whereas the effectiveness of the death penalty is scientifically still in doubt to solve crimes and to prevent crimes by the death penalty punishment.

  11. Economic Analysis of Criminal Law and Liberal Criminal Law: Confluences and Forks

    Directory of Open Access Journals (Sweden)

    Diego H. Goldman

    2017-12-01

    Full Text Available Not all economic analysis necessarily lead to a maximalist criminal law that threatens the fundamental rights, but on the contrary, can be found in economic science approaches perfectly compatible with the most liberal thought currents. This paper aims to make a critical study of economic theory usually associated with the Criminal EAL, its practical implications and its teleological budgets. Criticism will leave an openly liberal view, which defends the ideas and values that over the centuries have expressed such diverse thinkers as Adam Smith, Friedrich von Hayek, Robert Nozick or Juan Bautista Alberdi.

  12. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  13. Privacy rights in mental health counseling: Constitutional confusion and the voicelessness of third parties in criminal cases.

    Science.gov (United States)

    Murphy, Wendy J

    2011-01-01

    The past 20 years of criminal law and practice have produced much heat but little light on the issue of when, if ever, the accused in a criminal case can legitimately seek disclosure of a victim's privileged files that exist exclusively in the custody of a private third party. In many jurisdictions, forced disclosure is routine, and victims must choose between justice and privacy, resulting in either the dismissal or underprosecution of serious violence or the victim's opting to forego necessary treatment. This dilemma is disproportionately imposed on women and child victims of sexual violence, and it threatens to prevent healing for a significant percentage of victimized persons. This article outlines the legal and policy interests of third parties in this debate and offers a model set of procedures to protect against needless harm to third parties, while respecting the important rights of the criminally accused.

  14. Principle Mediation of Domestic Violence as Criminal Act

    OpenAIRE

    Wijaya, Sandy Ari

    2014-01-01

    Penal mediation is a process of extra judicial settlement for criminal case. The application ofpenal mediation on criminal law is to give the justice and protection to the victims of which it isnot accommodate by legality aspect in Indonesia criminal law. The existence of penal mediationprinciple with legal certainty affect the domestic violence (KDRT). The inconsistence continueswhen the penal mediation process relevance is applied to serious domestic violence that violate thehuman rights. T...

  15. Criminal victimization and psychotic experiences: cross-sectional associations in 35 low- and middle-income countries.

    Science.gov (United States)

    DeVylder, J E; Kelleher, I; Oh, H; Link, B G; Yang, L H; Koyanagi, A

    2018-04-22

    Criminal victimization has been associated with elevated risk for psychotic symptoms in the United Kingdom, but has not been studied in low- and middle-income countries (LMICs). Understanding whether crime exposure may play a role in the social etiology of psychosis could help guide prevention and intervention efforts. We tested the hypothesis that criminal victimization would be associated with elevated odds of psychotic experiences in 35 LMICs (N = 146 999) using cross-sectional data from the World Health Organization World Health Survey. Multivariable logistic regression analyses were used to test for associations between criminal victimization and psychotic experiences. Victimization was associated with greater odds of psychotic experiences, OR (95% CI) = 1.72 (1.50-1.98), and was significantly more strongly associated with psychotic experiences in non-urban, OR (95% CI) = 1.93 (1.60-2.33), compared to urban settings, OR (95% CI) = 1.48 (1.21-1.81). The association between victimization and psychosis did not change across countries with varying aggregated levels of criminal victimization. In the largest ever study of victimization and psychosis, the association between criminal victimization and psychosis appears to generalize across a range of LMICs and, therefore, across nations with a broad range of crime rates, degree of urban development, average per capita income, and racial/ethnic make-up. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  16. Criminal law as a response to medical malpractice: pluses and minuses--comparing Italian and U.S. experiences.

    Science.gov (United States)

    Di Landro, Andrea R

    2012-06-01

    The paper is divided into three parts. The first part sets out the comparative differences between the tort of malpractice in common law and the criminal negligence in civil law: while the common law takes for mens rea only the "gross" negligence, and rarely medical negligence, other law systems instead (and particularly Italian law) criminalize also ordinary negligence, frequently in medical malpractice cases. The second part of the paper addresses the pluses of using criminal law as response to medical malpractice: inadequate medical self-policing and "repeat offenders" problems are analysed, in the perspective of the patient, of the doctor, of the insurance company, and of the community. The third part addresses the minuses of the criminal law as response: medical "shame and blame" mentality, criminal stigma and culture of fear are disincentives to incident reporting and to system analysis (the most important means of prevention); "defensive medicine" and "courts-abiding medicine" are managed not yet in the patient's exclusive interest, but in the egoistic/utilitarian aim to avoid denunciations; finally, the uncertainty of the medicine, the accusatory system and the proof "beyond a reasonable doubt" seem hardly compatible with each other.

  17. ENFORCED DISAPPEARANCE OF PERSONS UNDER INTERNATIONAL CRIMINAL LAW: THE CASE “GUERRILHA DO ARAGUAIA” IN BRAZIL

    Directory of Open Access Journals (Sweden)

    Angela Pires Pinto

    2011-12-01

    Full Text Available The case “Guerrilha do Araguaia” is well known in Brazil in the view of the disappearances of opponents to the military regime occurred between 1972 and 1974, in the region known as Araguaia. Despite the efforts made by the families of the victims to seek responsibility and redress, few progress has been done. In 1995, Brazil recognized its responsibilities for the deaths and established a Commission to provide compensation to the families of the victims. The Amnesty Law prevented the State to initiate the criminal proceedings related to the responsibilities of those involved in the disappearances, torture and killings. On December 2010, the Inter-American Court of Human Rights decided that Brazil is responsible for the enforced disappearances in the Araguaia's region and, following its previous jurisprudence, determined that the State initiate adequate investigation and criminal proceedings related to the facts that amount to crimes against the humanity. In the view of the determination of criminal responsibilities on the “Guerrilha do Araguaia”'s case, this article will examine the grounds of criminal liability of the alleged offenders under the international criminal law as well as under the Brazilian domestic law, analysing the limitations that arise from both jurisdictions.

  18. Education in the family as a factor of pedagogical correction of legal consciousness in juvenile probation and parole, including registered in criminal-executive inspection

    Directory of Open Access Journals (Sweden)

    Gud M. B.

    2017-12-01

    Full Text Available The article discusses the concept of "legal consciousness of minors", the peculiarities of its formation in adolescence, and a pedagogical process of correction of legal consciousness adolescents in conditions of serving criminal sentences, when registration with the penal inspection. Analyzes one of the factors of correction of legal consciousness – raising in the family of convicted minors consisting on the account in the criminal-Executive inspection. The specifics of family upbringing and their impact on the efficiency of re-socialization of minors consisting on the account in criminally-executive inspection, as well as reducing recidivism. Examples of departmental statistics on the role of the family in preventing delinquency and crime among convicted adolescents. The basic directions of improvement of family education in the framework of the activities of employees of criminally-executive inspections.

  19. EUTHANASIA STIPULATED BY ROMANIAN CRIMINAL LAW, MITIGATING CIRCUMSTANCES VS. OFFENCE

    Directory of Open Access Journals (Sweden)

    MONICA POCORA

    2012-05-01

    Full Text Available This paper aims to be a scientific approach to the issue of euthanasia, bringing into the debate current and future controversies raised by euthanasia, as a result of the introduction into the Romanian penal law of the criminal offence of homicide by request of the victim. The study represents an approach to moral, religious, constitutional, civil, criminal procedure debates and last but not least to criminal debates regarding the legalization of the euthanasia, as the most difficult task lies with the criminal law.

  20. Biological and Chemical Weapons: Criminal Sanctions and Federal Regulations

    National Research Council Canada - National Science Library

    Garcia, Michael J

    2004-01-01

    .... In accordance with these obligations, the United States has enacted various federal requirements and criminal sanctions applying to biological and chemical weapons, Re cent anti4errorisrn legislation...

  1. Issues of remedial development of forms in criminal proceedings

    Directory of Open Access Journals (Sweden)

    Tsyganenko Sergey, S.

    2015-12-01

    Full Text Available The paper deals with the main issues of the modern concept of the criminal proceeding differentiation in terms of new methodological and theoretical approaches - models of criminal justice and the theory of criminal procedural strategy. This draws attention to a trend to expand the scope of application in criminal proceedings, along with production and procedural forms of justice and law and technology. In connection with what is considered their place in the structure of modern criminal procedure, the application conditions and development prospects. For a long time in the theory of criminal systemology a key element in the process acted as a procedural form of normative-functional complex stages and phases of activity in the pre-trial and judicial parts of the criminal justice system. Its mission has been focused on the achievement of major milestones in the implementation of justice, which, ultimately, are expressed in establishing the truth in the case. Thus, there was a two-element mechanism consisting of pre-trial proceedings, due to the need to solve the crime and bringing charges and proceedings, consisting primarily of the trial based on the principles of justice. This order, established regulations, is unified - it is equally applied to all categories of criminal cases and with all the procedural authorities. Modern criminal procedure is a differentiated form in which, along with established procedural steps and process of production, and has been actively used legal procedural technology.

  2. Change and Continuity in Indonesian Islamist Ideology and Terrorist Strategies

    Directory of Open Access Journals (Sweden)

    Adam James Fenton

    2015-04-01

    Full Text Available The “Islamisation” of Indonesia has exerted a transformative force on every aspect of Indonesian society. That process continues today. It has created streams of change and continuity in thoughts, ideologies and practices, of enormous complexity. Strict doctrinal interpretation of Koranic text is not a new phenomenon, contrary to what some reports in the mass media might suggest. Its roots stretch back at least as far as the 1800s with the outbreak of violent conflicts between those urging a stricter, scripturalist application of Islam, and those adhering to traditionalist and colonialist ideologies --culminating in the Padri war of West Sumatra of 1821-38. Indicating an ostensible continuity of ideology, modern extremist ideologues, such as Abu Bakar Bashir, urge their followers toward violent conflict and terrorist actions based on an ideology of strict “Middle Eastern” interpretation of fundamental Islamic tenets. This paper argues that the strategies of those carrying out radical and violent ideologies are undergoing change, as are the strategies of the authorities tasked with combating them. Radical groups have displayed a shift away from large-scale, attacks on symbolic foreign targets towards low-level violence primarily aimed at law enforcement authorities. Authorities, on the other hand, have shown a greater tendency to shoot dead those suspected of involvement with violent radical groups. This paper will examine the changing strategies of violent radical groups and the continuity, and evolution, of the underlying Islamic ideology that provides religious justification for their violent acts. The paper will argue that engaging Indonesia’s politically active youth in an ideological dialogue on Islamism and democracy provides the best prospect for disengagement from, and breaking the cycle of recruitment for, radical violence and terrorism.[Proses panjang Islamisasi di Indonesia telah menghasilkan kekuatan transformatif di

  3. Safeguarding the Dignity of Women under the Criminal Law Amendment Act 2013-A Critical Analysis

    Directory of Open Access Journals (Sweden)

    R C Borpatragohain

    2013-11-01

    Full Text Available This viewpoint aims to analyse the Criminal Law Amendment Act 2013 from a legal perspective. In doing so, it discusses the statutory safeguards of rights to a dignified life of a woman by analysing the various existing laws, which have been significantly amended to build the Criminal Act, 2013. These laws are: Indian Penal Code (IPC 1860; Indian Evidence Act 1872, Code of Criminal Procedure as amended in 1973, Immoral Trafficking Prevention Act 1956, Information Technology Act 2000, The Juvenile Justice (Care and Protection of Children Act 2000, The Protection of Women from Domestic Violence Act 2005, The Protection of Children from Sexual Offences Act, 2012, The Sexual Harassment of Women at Workplace (Prevention, Prohibition and Redressal Act 2013. In the conclusion, I urge that although efficient laws are in operation in India towards protecting the right to live with dignity of women, however, incidents of violence against women are on the rise. Hence, a concerted effort in bringing appropriate attitudinal change is the task ahead for all Indians.

  4. Debt as a Criminal Risk Factor in Denmark

    Directory of Open Access Journals (Sweden)

    Annette Olesen

    2016-09-01

    Full Text Available Existing studies of crime preventive factors have illustrated that ex-prisoners who began a course of education, obtained employment and/or had permanent housing were less likely to relapse into crime. However, this study shows that the aforementioned crime preventing factors became less effective due to the ex-prisoners’ debt. Those convicted in Denmark are personally liable for their own legal costs. Thus, we must regard most ex-prisoners as being highly indebted to the state. The debt of ex-prisoners was generally understood as being the cause of financial problems, but legal regulation and informal punishment, as unintended consequences of indebtedness, were still poorly explored. This research indicates that legal regulation and informal punishment based on indebtedness may serve as an argument for considering debt as a criminal risk factor which has made the preventive factors less effective and has driven ex-prisoners farther from legitimate socio-economic advantaged affiliations and invited criminal behaviour.Estudios existentes sobre factores de prevención de delitos pusieron de manifiesto que era menos probable que los ex presos que iniciaron un curso de educación, consiguieron un empleo y/o tenían una vivienda permanente, recayeran en la delincuencia. Sin embargo, este estudio demuestra que los factores de prevención de delitos anteriormente mencionados resultan menos efectivos debido a la deuda de los ex prisioneros. En Dinamarca, los condenados deben hacerse cargo de sus propios costes legales. Por lo tanto, debemos considerar que la mayoría de los ex presos han contraído una alta deuda con el Estado. Generalmente, se entendía que la deuda de los ex prisioneros era causa de problemas financieros, pero había pocos estudios sobre la regulación legal y el castigo informal, como consecuencias no intencionadas del endeudamiento. Esta investigación indica que la regulación legal y el castigo informal basado en el

  5. The right to information in criminal proceedings in the light of proposed changes of the Criminal Law Codification Commission

    OpenAIRE

    Andrzejewska, Marzena

    2013-01-01

    The article addresses the issue of the right to information from the point of view of the participants of criminal proceedings. The execution of the right contributes to the principle of equality between the parties, secure execution of the adversarial principle, transparency and to creating the image of law-abidingness and transparent jurisdiction in the mindset of society. Particular attention has been paid to the draft amendment to the Criminal Procedure Code, prepared by the Criminal Law ...

  6. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  7. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  8. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  9. What Explains Criminal Violence in Mexico City? A Test of Two Theories of Crime

    Directory of Open Access Journals (Sweden)

    Carlos Vilalta

    2016-02-01

    Full Text Available There are competing theories of what drives crime in cities and neighbourhoods. Two widely cited theoretical approaches focused on social disorganization and institutional anomie propose different explanations for the causes and dynamics of criminality. Yet these theories are seldom empirically tested, much less acknowledged, outside of North America and Western Europe. This article considers their applicability in Mexico’s capital, a sprawling metropolis of more than 20 million people. The authors administer spatial and general statistical tests to explain the geographical patterns of crime rates across multiple forms of criminality. The assessment demonstrates that both theories accurately predict the spatial distribution of crime. The article concludes with a host of policy conclusions, emphasizing social crime prevention over more traditional law and order measures. and consolidating families, parents and childcare.

  10. Criminal law policy of Latvia in the context of European Union: The treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Vilks A.

    2012-10-01

    Full Text Available The article is devoted to the analysis of the content of EU Treaty of Lisbon, which deals with ensurance of freedom, security and justice in the joint European space. The Treaty of Lisbon describes the attempts of the European Union to ensure a high security level to prevent and fight crime, rasism and xenophobia, to develop particular measures of coordination and cooperation between police and judicial authorities and other competent authorities for their further development, as well as for the mutual recognition of judgements in criminal matters. Correspondingly, the implementation of the requirements of the Treaty of Lisbon identifies the need to form an adequate national criminal law policy in our country as well.

  11. Assessment of Risk of Violent Behavior in Female Psychiatric Patients with a Criminal History

    Directory of Open Access Journals (Sweden)

    Makurina A.P.,

    2014-11-01

    Full Text Available We present the results of study of illegal actions predictors in individuals with mental disorders and discuss the specific features of female criminality. On a sample of 69 patients with a diagnosis of organic mental disorder and schizophrenia, with criminal histories, we applied clinical and psychological hermeneutic analysis, used questionnaires to determine the self-assessments of patients, self-control diagnosis, self-regulation style features, diagnosis of aggression and hostility, coping strategies, destructive attitudes in interpersonal relationships. It made possible to identify clinical, social and pathopsychological factors of aggressive behavior in forensic patients. These individual psychological characteristics of mentally ill women will improve the prognosis of their aggressive behavior, implement differentiated preventive measures in the hospital and to establish appropriate intervention programs

  12. How to Use a Trafficked Woman. The Alliance between Political and Criminal Trafficking Organisations

    Directory of Open Access Journals (Sweden)

    John Davies

    2011-03-01

    Full Text Available The principal argument of this paper is that migrant women with secure mobility rights and supportive social networks can avoid or mitigate many trafficking harms. However the paper contends that some actors have conspired to prevent such circumstances so as to pursue diverse political agendas at the expense of migrant women. The paper’s analysis restructures the trafficking contest from organised criminals versus law enforcement agencies to principally a contest between migrant women and those political agents who benefit from the moral panic associated with trafficking. It is then argued that it is these more sophisticated political actors rather than organised criminals and the clients of sex workers are the most important stakeholders in sustaining or exploiting trafficking harm. Therefore, it is concluded that resolving many trafficking harms in the EEA could be achieved by subverting political traffickers through improving migration policy rather than fighting organised crime.

  13. Chavism and Criminal Policy in Venezuela, 1999-2014

    Directory of Open Access Journals (Sweden)

    Martha Lia Grajales

    2017-03-01

    Full Text Available For a long time, the Venezuelan democracy was an exception in South America due to a party system that was based on what was known as the ‘Punto Fijo Pact’. At the start of the 1980s a series of economic, social and political events began to occur, which caused this ‘exceptionalism’ to stagger and disrupt the institutionality of the traditional Venezuelan democratic State. The events led to a deep national crisis and the birth of a new political era. By the end of the 1990s, there had been a significant shift towards left-wing governance. Hugo Chávez Frías subsequently won the presidential elections in 1998. This paper analyzes some aspects of the criminal policies that were implemented during the reign of left-wing leader Chávez till his death in 2013 and thereafter by Chavist party president elect, Nicolás Maduro during 2013-2014. Four stages can be identified in the behavior of incarceration rates. The first stage, from 1999 to 2000, was characterized by the lowest recordings of incarceration rates and the lowest measured percentage of preventive detention in Venezuela in thirty years. The second stage, from 2001 to 2005, saw a slight increase in the incarceration rate which then remained stable. The third stage, from 2006 to 2012, and the fourth stage, from 2013 to 2014, are characterized by sustained increases in preventive detention, incarceration and murder rates.

  14. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  15. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  16. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  17. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  18. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  19. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  20. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  1. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  2. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  3. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  4. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  5. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  6. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  7. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  8. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  9. Awor nan ta yama nos criminal! (and now they can call us criminals!)

    NARCIS (Netherlands)

    Rothfusz, Jacquelien

    2012-01-01

    In this article, the author will question the seemingly obvious boundary between civil disobedience, as conceptualised by Rawls and Arendt, and several examples of criminal, or simply annoying, activities which don't meet their criteria, such as the case of the ‘Top 50'. The ‘Top 50' are

  10. The Law and Practice of Criminal Asset Forfeiture in South African Criminal Procedure: A Constitutional Dilemma

    Directory of Open Access Journals (Sweden)

    Vinesh Basdeo

    2014-08-01

    Full Text Available The deprivation of the proceeds of crime has been a feature of criminal law for many years. The original rationale for the confiscation of criminal assets at international level was the fight against organised crime, a feature of society described by the European Court of Human Rights as a "scourge" so that the draconian powers which are a feature of confiscation regimes around the world have been approved in circumstances which otherwise might have caused governments considerable difficulties before the international human rights tribunals. The primary objective of this article is to determine if the asset forfeiture measures employed in the South African criminal justice system are in need of any reform and/or augmentation in accordance with the "spirit, purport and object" of the South African Constitution. This article attempts to answer three questions. Firstly, why is criminal asset forfeiture important to law enforcement? Secondly, in which circumstances can property be forfeited and what types of property are subject to forfeiture? Thirdly, how is forfeiture accomplished, and what are its constitutional ramifications?

  11. Criminal Responsibility, Free Will, and Neuroscience

    Science.gov (United States)

    Hodgson, David

    This chapter identifies retributive and consequentialist purposes of the criminal law, and it outlines arguments that retribution should be abandoned, in cluding arguments, based on philosophy and neuroscience, that free will and re sponsibility are illusions. The author suggests that there are good reasons to retain retribution, and identifies ways in which this might be supported, including com patibilist and libertarian views of free will. The author gives reasons for preferring libertarian views, and concludes by considering the role that neuroscience may be expected to play in the future development of the law.

  12. Criminal psychological profiling of serial arson crimes.

    Science.gov (United States)

    Kocsis, Richard N; Cooksey, Ray W

    2002-12-01

    The practice of criminal psychological profiling is frequently cited as being applicable to serial arson crimes. Despite this claim, there does not appear to be any empirical research that examines serial arson offence behaviors in the context of profiling. This study seeks to develop an empirical model of serial arsonist behaviors that can be systematically associated with probable offender characteristics. Analysis has produced a model of offence behaviors that identify four discrete behavior patterns, all of which share a constellation of common nondiscriminatory behaviors. The inherent behavioral themes of each of these patterns are explored with discussion of their broader implications for our understanding of serial arson and directions for future research.

  13. Legal Uncertainty in Criminal Cases Termination Institute Enforcement in Connection with Reconciliation of the Parties

    Directory of Open Access Journals (Sweden)

    Zabuga E. E.

    2014-07-01

    Full Text Available The author analyzes the judicial application practice of the RF Criminal Code, Art. 76, of the RF Criminal Procedure Code (in criminal cases involving crimes small and moderate, Art. 25; some procedural problems are designated.

  14. The Law and Practice of Criminal Asset Forfeiture in South African ...

    African Journals Online (AJOL)

    The Law and Practice of Criminal Asset Forfeiture in South African Criminal ... of criminal assets at international level was the fight against organised crime, ... of the South African Constitution.2 This article attempts to answer three questions.

  15. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  16. Crimes against property: critical analysis of transforming the Russian criminal legislation and the practice of its enforcement

    Directory of Open Access Journals (Sweden)

    Vladimir V. Sverchkov

    2018-03-01

    ambiguous provisions on assessment of the crime under paragraph ldquogrdquo of part 2 of Article 158 of the Russian Criminal Code c contradictory definition of the moment of completion of corpus delicti of administrativelegal acquisition of property by theft and the moment of completion of corpus delicti of the criminallegal secret acquisition of property d provisions that prevent delimitation of the criminallegal embezzlement of property from the minor waste of property and bringing the perpetrator to criminal or administrative liability e questionable advice to lawenforcers on the classification of theft that involves threatening lifehealth of the victim f contradictory explanation of the judicial practice of application of Article 163 of the Russian Criminal Code. Practical significance the main provisions and conclusions should be used to improve the lawmaking activity and judicial interpretive practice.

  17. CRIMINALIZATION AND PROSECUTION OF HUMAN TRAFFICKING IN ETHIOPIA: ASSESSING THE LEGAL FRAMEWORK IN LIGHT OF INTERNATIONAL STANDARDS

    Directory of Open Access Journals (Sweden)

    Z.Sh. Woldemichael

    2017-01-01

    Full Text Available As is the case in many countries, in Ethiopia human trafficking causes multi-dimensional harmful consequences on individuals. With a view to addressing the problem, in 2012 Ethiopia acceded to the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime. For the purpose of translating the requirements of the UN Trafficking Protocol into reality, the government has taken various steps including legislative measures. Proclamation No. 909/2015 (Prevention and Suppression of Trafficking in Persons and Smuggling of Migrants Proclamation is the most recent law adopted to deal with smuggling of migrants and human trafficking. The Proclamation comprises four key aspects: criminalization and prosecution; prevention; protection, rehabilitation and compensation; and cooperation. This article critically examines whether the criminalization and prosecution aspect of the Proclamation complies with international standards.

  18. The nuclear terrorist, radiological, biological, chemical threat. Medical approach

    International Nuclear Information System (INIS)

    Gourmelon, P.; Vidal, D.; Renaudeau, C.

    2005-01-01

    This book illustrates the cooperation of the civil and the military experts in the domain of the NBRC (nuclear, biological, radiological and chemical threat). The different aspects bond to the use of nuclear, biological and chemical weapons, are discussed. Al topics of each domains (NRBC) are presented: historical and fundamental aspects, diagnostic, therapeutic and prevention. (A.L.B.)

  19. Fetal Abuse and the Criminalization of Behavior during Pregnancy.

    Science.gov (United States)

    Farr, Kathryn Ann

    1995-01-01

    Discusses efforts to criminalize fetal abuse, harm caused from a pregnant woman's use of illegal drugs. Such efforts have typically failed to withstand judicial scrutiny. Suggests that criminal prosecution for fetal abuse relies on questionable procedures, is unevenly applied, and may keep women from seeking drug treatment or prenatal care. (LKS)

  20. The principle of equality of arms in international criminal proceedings

    NARCIS (Netherlands)

    Fedorova, M.I.

    2012-01-01

    This book studies the interpretation and application of the principle of equality of arms in proceedings before several international criminal courts. The coming of age of these institutions merits an evaluation of the application of one of the fundamental principles underlying a criminal procedure.

  1. 42 CFR 38.8 - Criminal and civil penalties.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Criminal and civil penalties. 38.8 Section 38.8... EXAMINATIONS DISASTER ASSISTANCE FOR CRISIS COUNSELING AND TRAINING § 38.8 Criminal and civil penalties... a civil penalty of not more than $5,000 for each violation. (c) Whoever knowingly misapplies the...

  2. International Criminal Law: Over-studied and Underachieving?

    NARCIS (Netherlands)

    van Sliedregt, E.

    2016-01-01

    In his recent review of Neil Boister's book, An Introduction to Transnational Criminal Law, Robert Currie praises the author for shedding light on a field of law that has suffered from inattention. Transnational criminal law (TCL), the 'other' branch of what was traditionally called international

  3. Problem of Determining the Chance (Casus) in Criminal Law

    Science.gov (United States)

    Veresha, Roman V.

    2016-01-01

    The article considers a concept of chance (casus) in criminal law and its main features. A definition of chance (casus) was analyzed as faultless causing of harm from a perspective of delimitation of the concept from carelessness in the form of criminal negligence. Particular attention is paid to the legislative definition of faultless causing of…

  4. The Use of Criminal History Information in College Admissions Decisions

    Science.gov (United States)

    Pierce, Matthew W.; Runyan, Carol W.; Bangdiwala, Shrikant I.

    2014-01-01

    To understand the potential public health and social justice implications of criminal background screening on college admissions, we examined postsecondary institutions' reasons for collecting or not collecting applicants' criminal justice information. We invited heads of admissions from 300 randomly sampled postsecondary institutions to complete…

  5. 28 CFR 90.15 - Filing costs for criminal charges.

    Science.gov (United States)

    2010-07-01

    ... with the filing of criminal charges against the domestic violence offender, or the costs associated... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Filing costs for criminal charges. 90.15 Section 90.15 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) VIOLENCE AGAINST WOMEN The STOP...

  6. Forgiveness in Criminal Law through Incorporating Restorative Mediation

    NARCIS (Netherlands)

    Claessen, Jacques

    2017-01-01

    In this monograph, the author argues for the integration of the concept of forgiveness into criminal law through incorporating restorative justice practices such as victim-offender mediation. Although forgiveness is not a purpose in itself nor can it be enforced, criminal law should provide room for

  7. Childhood Neurodevelopmental Disorders and Violent Criminality: A Sibling Control Study

    Science.gov (United States)

    Lundström, Sebastian; Forsman, Mats; Larsson, Henrik; Kerekes, Nora; Serlachius, Eva; Långström, Niklas; Lichtenstein, Paul

    2014-01-01

    The longitudinal relationship between attention deficit hyperactivity disorder (ADHD) and violent criminality has been extensively documented, while long-term effects of autism spectrum disorders (ASDs), tic disorders (TDs), and obsessive compulsive disorder (OCD) on criminality have been scarcely studied. Using population-based registers of all…

  8. 75 FR 9613 - Draft NIJ Restraints Standard for Criminal Justice

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF JUSTICE Office of Justice Programs [OJP (NIJ) Docket No. 1512] Draft NIJ Restraints Standard for Criminal Justice AGENCY: National Institute of Justice, Office of Justice Programs, DOJ. ACTION: Notice of Draft NIJ Restraints Standard for Criminal Justice and Certification Program...

  9. An Examination of Criminal Behavior among the Homeless.

    Science.gov (United States)

    Solarz, Andrea

    Homelessness is a significant social problem in the United States, with an estimated 2.5 million homeless people in this country today. While criminal activity may become a means for the homeless to obtain resources needed for basic survival, little is known about the level of criminal activity among the homeless or about the types of crimnal…

  10. Highlight: The need for victim support services in India's Criminal ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Agnes spoke about the concerns and challenges faced by victims within the Indian criminal justice system. Over the years, Majlis has been working on sexual assault of women and girls with the state machinery (courts, police, lawyers and jurists) and within the criminal justice system. Drawing from their body of work, Agnes ...

  11. Harmony, Law and Criminal Reconciliation in China: A Historical Perspective

    NARCIS (Netherlands)

    W. Pei (Wei)

    2016-01-01

    textabstractIn 2012, China revised its Criminal Procedure Law (2012 CPL). One of the major changes is its official approval of the use of victim-offender reconciliation, or ‘criminal reconciliation’ in certain public prosecution cases. This change, on the one hand, echoes the Confucian doctrine that

  12. Admissibility of hearsay evidence in criminal trials: an appraisal of ...

    African Journals Online (AJOL)

    Admissibility of hearsay evidence in criminal trials: an appraisal of the Ethiopian legal framework. ... Haramaya Law Review ... Despite Ethiopia following a common law approach regarding evidentiary principles, rules and procedural safeguards in criminal trials, the country does not have a codified and compiled evidence ...

  13. Theories on Criminality and Mental Retardation Project CAMIO, Volume 2.

    Science.gov (United States)

    Haskins, Jimmy R.; Friel, Charles M.

    This historical review of theories on criminality and mental retardation is part of Project CAMIO (Correctional Administration and the Mentally Incompetent Offender), a Texas study to determine the incidence of criminal incarceration of the mentally retarded (MR) and to identify laws, procedures, and practices which affect the prosecution and…

  14. Criminal Conduct: A Cause for Discipline of Teachers.

    Science.gov (United States)

    Larke, Patricia J.

    1987-01-01

    Reviews factors considered by courts in judicial decisions concerning teachers involved in criminal offenses relating to alcohol and drug violations, larceny, theft, shoplifting, gambling, and manslaughter. The courts have held that when criminal conduct shows a connection between the offense and the teacher's effectiveness then cause exists for…

  15. 28 CFR 0.85a - Criminal justice policy coordination.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Criminal justice policy coordination. 0.85a Section 0.85a Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Federal Bureau of Investigation § 0.85a Criminal justice policy coordination. The Federal Bureau...

  16. Criminal Liability of Political Decision-Makers in the Netherlands

    NARCIS (Netherlands)

    Geelhoed, Willem; Zimmermann, Frank

    2017-01-01

    Dutch criminal law does not provide for criminal liability for a political decision-maker who decides to build a bridge, if thereafter the project runs out of control or the bridge appears not to justify the funds spent on the project. This is most probably even the case if the decision-maker knew

  17. Criminal Policy Debate as an Active Learning Strategy

    Science.gov (United States)

    Mellgren, Caroline; Ivert, Anna-Karin

    2016-01-01

    One of the biggest challenges for criminal justice educators is to deal with the strongly held opinions and preconceived notions about criminal justice issues among students. It often takes the form of students being reluctant to accept certain premises that does not comply with their own experience of the issue. The general tendency to reject…

  18. Critical assessment of Nigeria criminal justice system and the ...

    African Journals Online (AJOL)

    Critical assessment of Nigeria criminal justice system and the perennial problem of awaiting trial in Port Harcourt maximum prison, Rivers State. ... Global Journal of Social Sciences ... Keywords: Nigeria criminal justice system, awaiting trial, rigidity of the penal law, holding charges, delay in the disposal of cases ...

  19. 25 CFR 11.902 - Non-criminal proceedings.

    Science.gov (United States)

    2010-04-01

    ... BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.902 Non-criminal proceedings. No adjudication upon the status of any minor in the jurisdiction of the children's court shall be deemed criminal or be deemed a conviction of...

  20. Paraphilia and sex offending - A South African criminal law perspective.

    Science.gov (United States)

    Carstens, Pieter; Stevens, Philip

    2016-01-01

    Historically, the link between sexual deviance and criminality has been described and documented, asserted by psychiatry, and manifested in law. Laws that have regulated sexual behaviour have referred to terms such as 'sexual deviation', 'sexual perversion' or even archaic moral terms such as 'unnatural acts and unspeakable crimes against nature'. A possible link between sexual perversion, psychopathy, and criminality, specifically manifesting in sexual homicide, has been the subject of remarkable research in forensic psychiatry. This contribution examines the phenomenon of paraphilia with specific reference to its definition, diagnostic classification and characteristics, as well as a few selections of incidences of paraphilia in South African criminal case law. A brief assessment is made of how South African criminal courts have dealt with paraphilia. In this regard, an analysis is made of the criminal liability of the paraphiliac. The South African response to sexual deviation as addressed in the Criminal Law (Sexual Offences and Related Matters) Amendment Act 32 of 2007 will also be addressed with reference to its efficacy in addressing paraphilia within South African criminal law. The interface between criminal law and medical ethics within the context of this theme will also be canvassed. In conclusion, recommendations for possible reform are canvassed. Copyright © 2016. Published by Elsevier Ltd.