WorldWideScience

Sample records for prevent terrorist criminal

  1. Terrorist Criminal Pipelines and Criminalized States: Emerging Alliances

    Science.gov (United States)

    2011-06-01

    the state in fact has a virtual monopoly on power and the use of force, but turns the state into a functioning criminal enterprise for the benefit...is clear is that Iran has greatly increased its diplomatic, economic, and intel- ligence presence in Latin America, an area where it has virtually ...Guerras Asimétricas y de Cuarta Generación Dentro Del Penasmiento Venezolano en Materia de Seguridad y Defensa [Asymmetrical and Fourth Generation Warfare

  2. Preventing Criminal Recidivism Through Mental Health and Criminal Justice Collaboration.

    Science.gov (United States)

    Lamberti, J Steven

    2016-11-01

    Criminal justice system involvement is common among persons with serious mental illness in community treatment settings. Various intervention strategies are used to prevent criminal recidivism among justice-involved individuals, including mental health courts, specialty probation, and conditional release programs. Despite differences in these approaches, most involve the use of legal leverage to promote treatment adherence. Evidence supporting the effectiveness of leverage-based interventions at preventing criminal recidivism is mixed, however, with some studies suggesting that involving criminal justice authorities in mental health treatment can increase recidivism rates. The effectiveness of interventions that utilize legal leverage is likely to depend on several factors, including the ability of mental health and criminal justice staff to work together. Collaboration is widely acknowledged as essential in managing justice-involved individuals, yet fundamental differences in goals, values, and methods exist between mental health and criminal justice professionals. This article presents a six-step conceptual framework for optimal mental health-criminal justice collaboration to prevent criminal recidivism among individuals with serious mental illness who are under criminal justice supervision in the community. Combining best practices from each field, the stepwise process includes engagement, assessment, planning and treatment, monitoring, problem solving, and transition. Rationale and opportunities for collaboration at each step are discussed.

  3. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  4. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB) References: See Enclosure 1 1. PURPOSE. In...including the Coast Guard at all times, including when it is a Service in the Department of Homeland Security by agreement with that Department), the...in accordance with national, international, and host nation laws, and applicable agreements and arrangements with host nations. 4

  5. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer L

    2005-01-01

    ... before. Globalization, technological advances, and anarchy resulting from the end of the Cold War has made transnational crime much easier to perpetrate and has given criminals flexibility to change tactics...

  6. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer

    2004-01-01

    ... before. Globalization, technological advances and anarchy resulting from the end of the Cold War has made transnational crime much easier to perpetrate and given criminals flexibility to change tactics...

  7. A Chronology of Terrorist Attacks and Other Criminal Actions Against Maritime Targets

    Science.gov (United States)

    1983-09-01

    incidents. Other groups include the IRA, Moslem separatists in the Southern Philippines, right -wing Christian extremists in Lebanon, Polisario guerrillas... emigres , Palestinian groups, and the IRA alone account for nearly 40 percent of the terrorist attacks recorded in this chronology. These groups are...opponent of Dr. Salazar’s government. The liner was on a holiday cruise witn over 600 Portuguese, American, Dutch, Venezuelan and Spanish passengers on

  8. Preventing Terrorist Bombings on United States Subway Systems

    Science.gov (United States)

    2006-09-01

    extracurricular activities to deter drug use; drug and alcohol tests for railway employees to encourage safety; car stops at borders to intercept illegal...26 Table 3. Possible Signs of Suspicious Activity .............................................................27 Table 4...Mass transportation has been and remains an attractive target for terrorist activity throughout the world. In the last three years, major

  9. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends (Walker Paper, Number 1)

    Science.gov (United States)

    2005-05-01

    20,000 of those human beings are delivered annually by criminals to the United States and forced into prostitution, pornography, and sweatshop labor, it...searchers. It is rarely acknowledged as an emerging issue that demands a fresh look and unique solutions . Regarding the nexus, Cilluffo accurately...engage the “silent majority” of Muslims, ask- ing for their intervention and collaboration of solutions , instead of imposing our will and culture

  10. Are We Doing Enough to Prevent a Nuclear Terrorist Attack?

    Science.gov (United States)

    2013-03-01

    Cesium-137 from nuclear medicine therapy units, Cobalt-60 from food sterilization irradiators, Strontium-90 from communications generators, and...Plutonium-239. A terrorist group would not use the medical isotopes to design and build a nuclear weapon, but the isotopes could be used in a...sized devices used as scanning tools to search for 18 and detect nuclear and radiological materials; hand-held radioisotope identification

  11. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  12. Neurocriminology: implications for the punishment, prediction and prevention of criminal behaviour.

    Science.gov (United States)

    Glenn, Andrea L; Raine, Adrian

    2014-01-01

    Criminal behaviour and violence are increasingly viewed as worldwide public health problems. A growing body of knowledge shows that criminal behaviour has a neurobiological basis, and this has intensified judicial interest in the potential application of neuroscience to criminal law. It also gives rise to important questions. What are the implications of such application for predicting future criminal behaviour and protecting society? Can it be used to prevent violence? And what are the implications for the way offenders are punished?

  13. The EU as a Promoter of Preventive Criminal Justice and the Internal Security Context

    NARCIS (Netherlands)

    Herlin Karnell, S.E.M.

    2015-01-01

    This paper discusses the current tendency in the EU to promote a criminal justice model focusing on prevention. In doing so, I examine the EU’s internal security agenda with regard to criminal law and assess the extent to which this strategy fits the picture of an European Area of Freedom, Security

  14. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  15. Opportunities for AIDS prevention in a rural state in criminal justice and drug treatment settings.

    Science.gov (United States)

    Farabee, D; Leukefeld, C G

    1999-01-01

    This study examined the likelihood that drug users would receive HIV/ AIDS prevention information and supplies (e.g., condoms and bleach) in the rural state of Kentucky. Despite evidence of high HIV risk among criminal justice and substance-using populations, incarceration and substance-user treatment were only minimally associated with prior HIV prevention exposure or HIV testing. These data strongly support the use of criminal justice and treatment settings to provide AIDS prevention interventions for the high-risk drug-using populations they serve, and to target HIV prevention services in rural as well as urban areas.

  16. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  17. Developing a Culturally Appropriate HIV and Hepatitis C Prevention Intervention for Latino Criminal Justice Clients.

    Science.gov (United States)

    Ibañez, Gladys E; Whitt, Elaine; Rosa, Mario de la; Martin, Steve; O'Connell, Daniel; Castro, Jose

    2016-07-01

    The population within the criminal justice system suffers from various health disparities including HIV and hepatitis C virus (HCV). African American and Latino offenders represent the majority of the offender population. Evidence-based interventions to prevent HIV and HCV among criminal justice clients are scant and usually do not take cultural differences into account. Toward this end, this study describes the process of culturally adapting an HIV/HCV prevention intervention for Latino criminal justice clients in Miami, Florida, by using the ecological validity model. Recommendations for culturally adapting an intervention for Latinos include an emphasis on language and integrating cultural themes such as familism and machismo. © The Author(s) 2016.

  18. GST – the idea and recommendations for the prevention of criminal behaviour

    Directory of Open Access Journals (Sweden)

    Robert Agnew

    2011-12-01

    Full Text Available The article is a presentation of the main assumptions of the General Strain Theory (GST and the possibility to put theory into practice in the field of prevention of criminal behaviour. The GST was created in the ‘90s by Robert Agnew as a continuation of previous structural theories (Merton, Cloward – Ohlin, Cohen. Up to this day it has been widely verified empirically and along with other criminology theories (the theory of social learning/theory of different relations, theory of social control, theories of interaction is both a fundamental but also alternative ground for interpreting social behaviour. Due to its universal assumptions, GST is now being developed also by Polish researchers. In the article are presented the fundamental strategies of prevention of criminal behaviour based on GST and examples of particular programs being carried out in the US and Poland. Pilot studies on building in Poland a pioneer local system of prevention, based on GST, are presented. In the conclusions the authors stress the importance of GST in the genesis of criminal behaviour. The content of this article is therefore a result of an American-Polish cooperation in the field of prevention of criminal behaviour. It seems that international and based on mutual partnership approach is the hallmark of the current stage of the Polish resocialization system development.

  19. [Practical problems in criminal laws of prevention of cruelty to animals].

    Science.gov (United States)

    Iburg, U

    2000-03-01

    1. To ascertain serious pains and sufferings in the meaning of section 17 no. 2 b law of prevention of cruelty to animals you cannot do without the help of an expert witness for taking possession of evidence--apart from simple cases. Except the clarifying of fundamental questions concerning prevention of cruelty to animals a professional statement of the administrative veterinary surgeon will be as a rule sufficient. 2. For the actual seizure of animals for the purpose of confiscation and compulsory disposal the criminal justice is extremely dependent on the support of the authorities of administration. Therefore a trouble-free cooperation of criminal justice, veterinary authorities, animal homes and--concerning the protection of species--authorities for protection of endangered nature is imperative. 3. The main problems with the application of the regulation concerning the interdiction of keeping animals according to sections 20 and 20 a law of prevention of cruelty to animals are justified in the legal prerequisites. It is unsatisfactory that an interdiction of keeping animals cannot be imposed by summary punishment order and that a confiscation of animals is not possible by criminal proceedings in case of offence against sections 20 subsection 3, 20 a subsection 3 law of prevention of cruelty to animals. Therefore an admission of the sections as mentioned above to section 19 law of prevention of cruelty to animals seems to be convenient.

  20. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  1. Disrupting Terrorist Networks: An Analysis of the PKK Terrorist Organization

    Science.gov (United States)

    2010-12-01

    Turkey (and the State’s Counter Measures), 361. 68 the refugees are able to find a job and provide their own financial support.271 Ultimately, the...concur, this embeddedness did not turn the PKK into a criminal group. In this part of the chapter, the study focused on the assisting factors that...PKK too. The next chapter will further analyze the role of geographical safe havens along with the embeddedness of the PKK terrorist organization in

  2. Case management helps prevent criminal justice recidivism for people with serious mental illness.

    Science.gov (United States)

    Leutwyler, Heather; Hubbard, Erin; Zahnd, Elaine

    2017-09-11

    Purpose The purpose of this paper is to discuss how case management can decrease recidivism for people with serious mental illness (SMI) because people with SMI are at high risk for incarceration and recidivism. Design/methodology/approach Examples of successful case management models for formerly incarcerated individuals with SMI found through a secondary analysis of qualitative data and an analysis of the literature are presented. Findings Currently, no international, national, or statewide guidelines exist to ensure that formerly incarcerated individuals with SMI receive case management upon community reentry despite evidence that such services can prevent further criminal justice involvement. Recommendations include establishment of and evaluation of best practices for case management. In addition, the authors recommend additional funding for case management with the goal of greatly increasing the number of individuals with SMI leaving the criminal justice system in their ability to access adequate case management. Originality/value Providing effective case management tailored to the needs of formerly incarcerated people with SMI improves their quality of life and reduces their involvement in the criminal justice system with clear positive outcomes for public safety and public health.

  3. Prevention of Crime and the Optimal Standard of Proof in Criminal Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    2003-01-01

    The standard of proof in criminal law a®ects retributive justice throughthe number of wrong convictions and wrong acquittals. It also a®ects thelevel of crime, since a higher standard of proof implies less deterrence andless incapacitation. This article derives an expression for the optimal...... standardfrom a trade-o® between these e®ects, and applies the expression tothe crime of sexual violation against women. For this crime, social preferencesfor justice versus prevention of crime are elicited through a surveyand inserted into the expression for the optimal standard. The result indicatesthat...

  4. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  5. Extended-Release Naltrexone to Prevent Opioid Relapse in Criminal Justice Offenders.

    Science.gov (United States)

    Lee, Joshua D; Friedmann, Peter D; Kinlock, Timothy W; Nunes, Edward V; Boney, Tamara Y; Hoskinson, Randall A; Wilson, Donna; McDonald, Ryan; Rotrosen, John; Gourevitch, Marc N; Gordon, Michael; Fishman, Marc; Chen, Donna T; Bonnie, Richard J; Cornish, James W; Murphy, Sean M; O'Brien, Charles P

    2016-03-31

    Extended-release naltrexone, a sustained-release monthly injectable formulation of the full mu-opioid receptor antagonist, is effective for the prevention of relapse to opioid dependence. Data supporting its effectiveness in U.S. criminal justice populations are limited. In this five-site, open-label, randomized trial, we compared a 24-week course of extended-release naltrexone (Vivitrol) with usual treatment, consisting of brief counseling and referrals for community treatment programs, for the prevention of opioid relapse among adult criminal justice offenders (i.e., persons involved in the U.S. criminal justice system) who had a history of opioid dependence and a preference for opioid-free rather than opioid maintenance treatments and who were abstinent from opioids at the time of randomization. The primary outcome was the time to an opioid-relapse event, which was defined as 10 or more days of opioid use in a 28-day period as assessed by self-report or by testing of urine samples obtained every 2 weeks; a positive or missing sample was computed as 5 days of opioid use. Post-treatment follow-up occurred at weeks 27, 52, and 78. A total of 153 participants were assigned to extended-release naltrexone and 155 to usual treatment. During the 24-week treatment phase, participants assigned to extended-release naltrexone had a longer median time to relapse than did those assigned to usual treatment (10.5 vs. 5.0 weeks, P<0.001; hazard ratio, 0.49; 95% confidence interval [CI], 0.36 to 0.68), a lower rate of relapse (43% vs. 64% of participants, P<0.001; odds ratio, 0.43; 95% CI, 0.28 to 0.65), and a higher rate of opioid-negative urine samples (74% vs. 56%, P<0.001; odds ratio, 2.30; 95% CI, 1.48 to 3.54). At week 78 (approximately 1 year after the end of the treatment phase), rates of opioid-negative urine samples were equal (46% in each group, P=0.91). The rates of other prespecified secondary outcome measures--self-reported cocaine, alcohol, and intravenous drug use

  6. The Geography of Pre-Criminal Space: Epidemiological Imaginations of Radicalisation Risk in the UK Prevent Strategy, 2007-2017.

    Science.gov (United States)

    Heath-Kelly, Charlotte

    2017-01-01

    This paper explores geographical and epistemological shifts in the deployment of the UK Prevent strategy, 2007 - 2017. Counter-radicalisation policies of the Labour governments (2006 - 2010) focused heavily upon resilience-building activities in residential communities. They borrowed from historical models of crime prevention and public health to imagine radicalisation risk as an epidemiological concern in areas showing a 2% or higher demography of Muslims. However, this racialized and localised imagination of pre-criminal space was replaced, after the election of the Conservative-Liberal Democrat coalition in 2010. Residential communities were then de-emphasised as sites of risk, transmission and pre-criminal intervention. The Prevent Duty now deploys counter-radicalisation through national networks of education and healthcare provision. Localised models of crime prevention (and their statistical, crime prevention epistemologies) have been de-emphasised in favour of big data inflected epistemologies of inductive, population-wide 'safeguarding'. Through the biopolitical discourse of 'safeguarding vulnerable adults' the Prevent Duty has radically reconstituted the epidemiological imagination of pre-criminal space, imagining that all bodies are potentially vulnerable to infection by radicalisers and thus warrant surveillance.

  7. The geography of pre-criminal space: epidemiological imaginations of radicalisation risk in the UK Prevent Strategy, 2007–2017

    Science.gov (United States)

    Heath-Kelly, Charlotte

    2017-01-01

    ABSTRACT This article explores geographical and epistemological shifts in the deployment of the UK Prevent strategy, 2007–2017. Counter-radicalisation policies of the Labour governments (2006–2010) focused heavily upon resilience-building activities in residential communities. They borrowed from historical models of crime prevention and public health to imagine radicalisation risk as an epidemiological concern in areas showing a 2% or higher demography of Muslims. However, this racialised and localised imagination of pre-criminal space was replaced after the election of the Conservative-Liberal Democrat coalition in 2010. Residential communities were then de-emphasised as sites of risk, transmission and pre-criminal intervention. The Prevent Duty now deploys counter-radicalisation through national networks of education and health-care provision. Localised models of crime prevention (and their statistical, crime prevention epistemologies) have been de-emphasised in favour of big data inflected epistemologies of inductive, population-wide “safeguarding”. Through the biopolitical discourse of “safeguarding vulnerable adults”, the Prevent Duty has radically reconstituted the epidemiological imagination of pre-criminal space, imagining that all bodies are potentially vulnerable to infection by radicalisers and thus warrant surveillance. PMID:28680475

  8. Effectiveness of crime prevention through environmental design in reducing criminal activity in liquor stores: a pilot study.

    Science.gov (United States)

    Casteel, Carri; Peek-Asa, Corinne; Howard, John; Kraus, Jess F

    2004-05-01

    Liquor store employees experience disproportionately higher rates of workplace injury death than employees in any other retail setting. However, efforts to introduce workplace violence prevention programs into liquor stores have been minimal. This study examines the effectiveness of a Crime Prevention Through Environmental Design intervention in reducing criminal activity in Santa Monica, California liquor stores. Nine stores enrolling in the study received an individualized intervention safety plan; the remaining 13 served as a comparison group. Mixed-effects Poisson regression was used to examine intervention effectiveness. The largest reductions in criminal activity occurred for robbery and shoplifting outcomes. We conclude that the Crime Prevention Through Environmental Design program reduced crime and injury in liquor stores and educated small businesses about the risks associated with retail violence and the countermeasures that can be taken.

  9. THE REFLECTION OF PROCEDURAL GUILT IN THE CRIMINAL PROCEDURE PROVISIONS. LIABILITY FOR UNJUST CONDEMNATION OR FOR TAKING PREVENTIVE MEASURES UNLAWFULLY

    Directory of Open Access Journals (Sweden)

    ELIZA EMANUELA OPREA

    2013-05-01

    Full Text Available In the criminal proceedings of some law states the wrongful sentencing of individuals is very rare, having a comprehensive system of procedural safeguards which prevent such a situation. The purpose of the criminal proceedings is to punish only the culprits, the Criminal Procedure code frontispiece being stated the idea that no innocent person should be held criminally liable. By achieving this aspect of purpose is ensured observance of legality and the rule of law. All the basic rules and the whole organization of the criminal trial are polarized around this major goal of justice. Also the professional qualification level of those summoned to administer criminal justice in the modern state to minimizes the risk of judiciar miscarriages. The deep humanism of our law requires though the regulation of those procedural arrangements, through which in the event of an act of injustice, the wrongly convicted is able to obtain prompt repairs that society owes them. A very important aspect related to the evolution over time of the regulation of this institution, is that in its doctrine of integration in the European Union, Romania has adopted a series of laws and regulations designed to ensure our legislation’s alignment with the relevant legislation of the countries from the European community and to ensure the compliance with the European Convention on Human Rights. This process is still ongoing, therefore the establishment and the subsequent modification of the special procedure concerning the remedies for the material or moral damage in the event of unjust sentence or unlawful deprivation of liberty was based on the desire to avoid the conviction situation of the Romanian state by the international courts for failure to comply with the Art. 5 paragraph 5 of the Convention for the Protection of Human Rights and Fundamental Freedoms that 'any individual who is the victim of arrest or detention in conditions contrary to the provisions of this article

  10. Designating Domestic Terrorist Individuals or Groups

    Science.gov (United States)

    2010-09-01

    partially defined domestic terrorism as: …the unlawful use, or threatened use, of violence by a group or individual based and operating entirely within...appear intend to intimidate, or the locale in which perpetrators operate… Domestic terrorism is the unlawful use, or threatened use, of violence by...use violence and criminal activity to further their agendas. (Mueller, 2010) This research focused on the domestic terrorist threat to the homeland

  11. Criminal procedure code and charter of criminal proceedings in terrorism investigation: learning from the past

    OpenAIRE

    Makarov M.A.; Smakhtin E.V.

    2014-01-01

    Basic procedural institutions of terrorism investigation are studied by comparing the provisions of the Charter of criminal proceedings of the Russian Empire in 1864 and the current procedural law. The comparative solutions to the following investigation problems by Charter and the Code are shown: 1) terrorists confess to less serious crimes, representing themselves as accomplices (articles 208, 222 of the RF Criminal Code) to avoid punishment for terrorism (article 205 of the RF Criminal Cod...

  12. Understanding Terrorist Network Topologies and Their Resilience Against Disruption

    NARCIS (Netherlands)

    Lindelauf, R.; Borm, P.E.M.; Hamers, H.J.M.

    2009-01-01

    This article investigates the structural position of covert (terrorist or criminal) networks. Using the secrecy versus information tradeoff characterization of covert networks it is shown that their network structures are generally not small-worlds, in contradistinction to many overt social

  13. ECONOMIC AND LEGAL MECHANISMS TO COUNTER TERRORIST THREATS

    Directory of Open Access Journals (Sweden)

    G. V. Startsev

    2010-01-01

    Full Text Available Issues related to problems arising while using economic and legal facilities of counteraction to terroristic threats in Russian Federation A complex of. key national safety maintenance matters vital in modern conditions is analyzed. Particular attention is paid to economic and financial safety in interrelation with issues common to counteraction to organized and economic criminality, corruption and terrorism.

  14. Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals

    Directory of Open Access Journals (Sweden)

    Chao Zhang

    2016-06-01

    Full Text Available Game theoretic approaches have recently been used to model the deterrence effect of patrol officers’ assignments on opportunistic crimes in urban areas. One major challenge in this domain is modeling the behavior of opportunistic criminals. Compared to strategic attackers (such as terrorists who execute a well-laid out plan, opportunistic criminals are less strategic in planning attacks and more flexible in executing well-laid plans based on their knowledge of patrol officers’ assignments. In this paper, we aim to design an optimal police patrolling strategy against opportunistic criminals in urban areas. Our approach is comprised by two major parts: learning a model of the opportunistic criminal (and how he or she responds to patrols and then planning optimal patrols against this learned model. The planning part, by using information about how criminals responds to patrols, takes into account the strategic game interaction between the police and criminals. In more detail, first, we propose two categories of models for modeling opportunistic crimes. The first category of models learns the relationship between defender strategy and crime distribution as a Markov chain. The second category of models represents the interaction of criminals and patrol officers as a Dynamic Bayesian Network (DBN with the number of criminals as the unobserved hidden states. To this end, we: (i apply standard algorithms, such as Expectation Maximization (EM, to learn the parameters of the DBN; (ii modify the DBN representation that allows for a compact representation of the model, resulting in better learning accuracy and the increased speed of learning of the EM algorithm when used for the modified DBN. These modifications exploit the structure of the problem and use independence assumptions to factorize the large joint probability distributions. Next, we propose an iterative learning and planning mechanism that periodically updates the adversary model. We

  15. Criminal procedure code and charter of criminal proceedings in terrorism investigation: learning from the past

    Directory of Open Access Journals (Sweden)

    Makarov M.A.

    2014-12-01

    Full Text Available Basic procedural institutions of terrorism investigation are studied by comparing the provisions of the Charter of criminal proceedings of the Russian Empire in 1864 and the current procedural law. The comparative solutions to the following investigation problems by Charter and the Code are shown: 1 terrorists confess to less serious crimes, representing themselves as accomplices (articles 208, 222 of the RF Criminal Code to avoid punishment for terrorism (article 205 of the RF Criminal Code; 2 mass absence of prosecution witnesses at the hearing, giving reason to doubt the objectivity and the admissibility of evidence; 3 low efficiency of overt procedural activities, the need for covert operations based not on the particular fact, but on crime detection actions against terrorist organizations members; 4 the use of force during the arrest, causing the terrorists death, excludes the achievement of criminal law and criminal justice goals and also leads to the loss of evidence (to prove the guilt of the survived terrorists; 5 a significant amount of time passes between the alleged crime and passing the sentence, the minimum time of the terrorism investigation is 12 months, as a result higher courts stop the prosecution (changing the sentence for terrorists Atgeriev, Alkhazurov, Gaysumov in April 2002 by the RF Supreme Court due to the fact that more than five years have passed from the day of committing crimes till passing the sentence. The authors come to the paradoxical conclusion that the procedural law of the XIX century was much more effective than modern one.

  16. Criminal Law

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    <> book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....... book contains a thorough description of Danish substantive criminal law, criminal procedure and execution of sanctions. The book was originally published as a monograph in the International Encyclopaedia of Laws/Criminal Law....

  17. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  18. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  19. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  20. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  1. Criminal groups and criminal subculture

    OpenAIRE

    Romanova N.M.

    2013-01-01

    The paper provides a classification of criminal groups, structured by the following parameters: a) operation mode (secret/open), b) law-enforcement and administrative support (presence/absence). We describe four types of criminal groups: a) legitimized criminal organization, b) secret criminal organization engaged in illegal business, c) secret general crime group, and d) general crime group operating openly. The four types differ in the content of criminal subculture. Modern criminal subcult...

  2. "Drugs and AIDS--reaching for help": a videotape on AIDS and drug abuse prevention for criminal justice populations.

    Science.gov (United States)

    Gross, M; DeJong, W; Lamb, D; Enos, T; Mason, T; Weitzman, E

    1994-01-01

    This article describes the development of a videotape targeted at persons under supervision of the criminal justice system. The videotape seeks to encourage those who use illicit drugs to enter drug treatment and to motivate those at risk for exposure to human immunodeficiency virus (HIV) to alter behaviors that may transmit infection. The criminal justice system presents an important opportunity to deliver such messages, particularly to a large population of persons briefly detained in a jail or lockup and released without subsequent incarceration. Evidence suggests that, even in this audience, knowledge of how to prevent exposure to HIV is widespread, yet those at risk often fail to take appropriate precautions: motivating behavior change demands more than imparting information. In order to shape this videotape, we analyzed the target audience and developed a drama-based approach that applies the framework of social learning theory, the health belief model, and principles of social marketing. This article describes the integration of that theoretical framework into the production process, content, and strategy of the videotape.

  3. International Criminalization of International Terrorizm

    Directory of Open Access Journals (Sweden)

    Alexander Grigoryevich Volevodz

    2014-01-01

    Full Text Available Analysis and studying of the terrorism in all its facets is a complex entangled problem with less clear legal regulation that it might seem at first glance, especially after its transformation from local phenomenon into a world threat. Hitherto terrorism and actions connected to it have been criminalized by the majority of states. There are in modern criminal law whole systems of rules on criminal liability for terrorism which differs considerably from country to country. Terrorism has been criminalized in numerous international regional and universal antiterrorist legal instruments. The author notes that differences in definitions that are enshrined in them hinders international cooperation in criminal matters with respect to terrorist cases. Difficulties reside in the necessity to meet the dual criminality requirement and in the political offense exception. These difficulties can only be overcome through elaboration of a universally recognized definition of the notion of international terrorism and making it legally binding via its inclusion into a universal convention. The issue of definition of international terrorism is an important part of an efficient mutual assistance among states in fight against this crime. In this article the author accounts of actual ways of tackling by the international community of the issue of criminalization of international terrorism and of factors influencing them.

  4. Assessing informed consent in an opioid relapse prevention study with adults under current or recent criminal justice supervision.

    Science.gov (United States)

    Allen, Ashleigh A; Chen, Donna T; Bonnie, Richard J; Ko, Tomohiro M; Suratt, Colleen E; Lee, Joshua D; Friedmann, Peter D; Gordon, Michael; McDonald, Ryan; Murphy, Sean M; Boney, Tamara Y; Nunes, Edward V; O'Brien, Charles P

    2017-10-01

    Concerns persist that individuals with substance use disorders who are under community criminal justice supervision experience circumstances that might compromise their provision of valid, informed consent for research participation. These concerns include the possibilities that desire to obtain access to treatment might lead individuals to ignore important information about research participation, including information about risks, or that cognitive impairment associated with substance use might interfere with attending to important information. We report results from a consent quiz (CQ) administered in a multisite randomized clinical trial of long-acting naltrexone to prevent relapse to opioid use disorder among adults under community criminal justice supervision-a treatment option difficult to access by this population of individuals. Participants were required to answer all 11 items correctly before randomization. On average, participants answered 9.8 items correctly (89%) at baseline first attempt (n=306). At week 21 (n=212), participants scored 87% (9.5 items correct) without review. Performance was equivalent to, or better than, published results from other populations on a basic consent quiz instrument across multiple content domains. The consent quiz is an efficient method to screen for adequate knowledge of consent information as part of the informed consent process. Clinical researchers who are concerned about these issues should consider using a consent quiz with corrected feedback to enhance the informed consent process. Overall, while primarily useful as an educational tool, employing a CQ as part of the gateway to participation in research may be particularly important as the field continues to advance and tests novel experimental treatments with significant risks and uncertain potential for benefit. Copyright © 2017. Published by Elsevier Inc.

  5. Terror breeds terrorists.

    Science.gov (United States)

    de Zulueta, Felicity

    2006-01-01

    Terrorism can be carried out by the state or by its citizens. The latter may be labelled 'freedom fighters' or 'terrorists' depending on the political context. One of the most important aetiological factors driving Islamic terrorists is the experience of alienation and shame. This sense of being made to feel totally invalidated, of feeling worthless in the eyes of the other, is at the root of rage and violent revenge, implying that the way the current 'War on Terror' is being fought by the United States and the United Kingdom can only lead to more terrorism and danger for our society.

  6. TERRORIST THREATS AND PUBLIC TRANSPORTATION

    OpenAIRE

    Ioan NASCU

    2009-01-01

    public transportation is an activity facing various problems. One of them, very complex and dangerous, is terrorism which together with criminal activities and vandalism, is making the top of the threats affecting public transportation and therefore urban life quality. Public transportation has several characteristics which make it vulnerable to terroris attacks and a main target for them. To compensate for these weeknesses, certain solutions are necessary to prevent the attack or in case it ...

  7. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  8. Terrorists and Fair Trial: The Right to a Fair Trial for Alleged Terrorists Detained in Guantánamo Bay

    Directory of Open Access Journals (Sweden)

    Kai Ambos

    2013-09-01

    Full Text Available This paper inquires into whether the right to a fair trial can be restricted with regard to alleged terrorists within the framework of the ‘war on terror’. After briefly identifying the relevant sources of this right and its content, possible restrictions are analysed. The paper elaborates, in particular, on international humanitarian law, such as the Third and Fourth Geneva Convention, and international human rights law, such as the International Covenant on Civil and Political Rights and the American Declaration of the Rights and Duties of Man. It further deals with US constitutional law. We conclude that the right to a fair trial fully applies to alleged terrorists irrespective of the context of their detention (armed conflict or peace or the qualification of these terrorists (de facto or unlawful combatants and thus amounts to a general principle of transnational criminal law.

  9. Potential criminal adversaries of nuclear programs: a portrait

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, B.M.

    1980-07-01

    This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed by various categories of potential nuclear adversaries.

  10. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  11. Prevention by All Means?
    A Legal Comparison of the Criminalization of Online Grooming and its Enforcement

    Directory of Open Access Journals (Sweden)

    Renée Kool

    2011-10-01

    Full Text Available The obligation to criminalise online grooming, recently prescribed by the Council of Europe in the Treaty of Lanzarote, illustrates modern citizens' fears of external dangers, especially towards the sexual abuse of minors. The authorities' image of online grooming being unclear, the penalisatiom tends to be of a symbolic nature, implying false prophecies of legal protection. Moreover, the penalisation of online grooming indicates a precautionary use of the criminal law, so its justification lies within the perpertrators' objectionable motive, the latter violating basic assumptions of criminal law. Next to theoretical objections, practical issues are to be foreseen, as the criminal investigation of online grooming indicates the use of undercover tactics, which has a bearing on the procedural risk, e.g. the entrapment defence. Nevertheless, the British authorities have been able to penalise online grooming rather successfully. The Netherlands having recently (in July 2010 introduced a similar provision, this calls for a comparative analysis. Does the penalisation of online grooming have any added value, especially in light of the tendency towards a precautionary use of the criminal law, and what features are apparent in the British success?

  12. [The role of religion in the promotion of health, in the prevention of violence and in the rehabilitation of individuals involved in criminal activity: literature review].

    Science.gov (United States)

    Ribeiro, Fernanda Mendes Lages; Minayo, Maria Cecília de Souza

    2014-06-01

    This is a review of the literature on the role of religion in the promotion of health, the prevention of violence and the rehabilitation of individuals involved in criminal activities. Research was conducted in the Medline through PubMed, Lilacs, Scopus, Social Index with full text, Sociological abstracts and Social services abstracts databases. Twenty-nine essays in Portuguese, English and Spanish were selected and analyzed between 1990 and 2011. The results indicate the function of the religious group and the role of religion in the rehabilitation of individuals, the prevention of criminal involvement, corrective orientations and in social iniquity environments. A debate is presented on the main themes revealed, highlighting the multiplicity of religious roles, their influence over prisoners, as a social control and support base and its influence on mental health promotion and quality of life. The relation between religion and the public sphere is discussed, emphasizing the role of religious groups and the fragility of the State in providing basic public policies. Despite revealing the successful role of religion in violence prevention and in rehabilitation, some studies question this relation and highlight the conflicts between the concepts employed and the final results.

  13. Criminal Compliance

    Directory of Open Access Journals (Sweden)

    Cristina Antonella Andretta

    2015-10-01

    The article discusses the concepts of both compliance and criminal compliance, its main components and structure as well as the main rules relating to its global application, and finally his emergence in the Ecuadorian legal system.

  14. The nuclear specific danger prevention in the Bundesamt fuer Strahlenschutz; Die nuklearspezifische Gefahrenabwehr im Bundesamt fuer Strahlenschutz

    Energy Technology Data Exchange (ETDEWEB)

    Lange, Britta [Bundesamt fuer Strahlenschutz, Berlin (Germany). Arbeitsgruppe Nuklearspezifische Gefahrenabwehr (AG-NGA)

    2016-07-01

    The nuclear-related danger prevention (NGA: nuklearspezifische Gefahrenabwehr) in the BfS is usually seen as part of emergency planning. NGA is dealing with incidents resulting from possible or verified radioactive material abuse. It is always assumed or expected that there is a criminal or in the worst case terroristic intention. Therefore the NGA operation is usually of a radiological situation a combination with police actions inducing enhanced challenges to planning, communication and cooperation.

  15. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  16. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  17. Cooperative game theoretic centrality analysis of terrorist networks : The cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2013-01-01

    The identification of key players in a terrorist organization aids in preventing attacks, the efficient allocation of surveillance measures, and the destabilization of the corresponding network. In this paper, we introduce a game theoretic approach to identify key players in terrorist networks. In

  18. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  19. The Relationship between Criminal and Terrorist Organizations and Human Smuggling

    Science.gov (United States)

    2009-12-01

    areas collectively and in a scholarly manner. Frequently, human smuggling organizations will attempt to bribe or corrupt border officials into turning...and there are border agents willing to accept their bribes , corruption will continue to be a serious threat to the U.S.-Mexico border...Additionally, corruption efforts by these organizations places a weak link in U.S. border security that can be exploited for nefarious purposes. Enhanced

  20. Defending against a stockpiling terrorist

    OpenAIRE

    Hausken, Kjell; Zhuang, Jun

    2011-01-01

    This is an electronic version of an article published in Hausken, K. & Zhuang, J. (2011) Defending against a stockpiling terrorist. The Engineering Economist: A Journal Devoted to the Problems of Capital Investment, 56(4), pp. 321-353. The Engineering Economist is available online at: http://www.tandfonline.com/doi/abs/10.1080/00137916908928807#.UnjESBA2HZU. A government defends against a terrorist who attacks repeatedly and stockpiles its resources over time. The government defends an ...

  1. Blows to the head during development can predispose to violent criminal behaviour: rehabilitation of consequences of head injury is a measure for crime prevention.

    Science.gov (United States)

    León-Carrión, José; Ramos, Francisco Javier Chacartegui

    2003-03-01

    Criminal behaviour and violence may be the consequence of head injuries acquired during childhood and youth (gang fights, domestic violence, small blows to the head while driving, falls and so forth). In this study, a comparison was made of the school and head injury histories of violent and non-violent prisoners. It was found that the delinquent subjects in both groups had a history of academic difficulties. However, what differentiated the violent from the non-violent group was a history of having suffered head injuries that were never treated. Problems at school are not enough themselves to predict violent behaviour. A history of discrete neurological damage as a consequence to blows received to the head must also be present. The results suggest to the authors that the treatment of the cognitive, behavioural and emotional consequences of brain injury could be a measure for crime prevention. Measures both for prevention and rehabilitation are discussed.

  2. Affect and criminal responsibility

    Directory of Open Access Journals (Sweden)

    Drakić Dragiša S.

    2017-01-01

    , the author claims that acting in affect is rarely sudden and unexpected but rather it is a consequence of permanent conflict situation. The author puts forward his arguments for such claims. At the end, the author deals with the issue of 'quilt for one's own actions taken in affect', within the limits of criminal responsibility. He rejects opinions of authors that support the possibility of establishing a special type of guilt for 'explosion of affect' that lead to an offense committed in the state of insanity, provided that such explosion could have, supposedly, been foreseen and prevented. At the end, the author concludes that psychiatric assessment of defendant that committed offences in affect is one of the most difficult and riskiest tasks put before the court-psychiatrist.

  3. The Deradicalisation of Terrorists

    Directory of Open Access Journals (Sweden)

    Jason-Leigh Striegher

    2013-03-01

    Full Text Available Governments today tend to grapple with the development and implementation of deradicalisation programs; and as such, the results of such programs have led to varying degrees of success. The programs of three nation states—Yemen, Saudi Arabia and Indonesia have been selected for discussion due to the diversity of programs used in these Islamic states. This study focuses on the distinction between disengagement and deradicalisation; and identifying and understanding the affects that push and pull factors potentially have to extricate identified terrorists from violent extremism. It also highlights Jack Roche as an example of someone that in general deradicalised himself as a result of push and pull factors. “If the development of terrorism is a product of its own time and place, it follows that issues of disengagement (and all that that implies will also be context-specific and necessarily nuanced . . . in terms of how the programmes are constructed, implemented, and promoted . . .” (Horgan, 2008a: 7.

  4. Condoms and sexual health education as evidence: impact of criminalization of in-call venues and managers on migrant sex workers access to HIV/STI prevention in a Canadian setting.

    Science.gov (United States)

    Anderson, S; Shannon, K; Li, J; Lee, Y; Chettiar, J; Goldenberg, S; Krüsi, A

    2016-11-17

    Despite a large body of evidence globally demonstrating that the criminalization of sex workers increases HIV/STI risks, we know far less about the impact of criminalization and policing of managers and in-call establishments on HIV/STI prevention among sex workers, and even less so among migrant sex workers. Analysis draws on ethnographic fieldwork and 46 qualitative interviews with migrant sex workers, managers and business owners of in-call sex work venues in Metro Vancouver, Canada. The criminalization of in-call venues and third parties explicitly limits sex workers' access to HIV/STI prevention, including manager restrictions on condoms and limited onsite access to sexual health information and HIV/STI testing. With limited labour protections and socio-cultural barriers, criminalization and policing undermine the health and human rights of migrant sex workers working in -call venues. This research supports growing evidence-based calls for decriminalization of sex work, including the removal of criminal sanctions targeting third parties and in-call venues, alongside programs and policies that better protect the working conditions of migrant sex workers as critical to HIV/STI prevention and human rights.

  5. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  6. Postcode Criminals

    Science.gov (United States)

    Hiett, Sandra; Kushner, Joann

    2013-01-01

    Postcode Criminals was the second phase of an international participatory community arts project challenging negative stereotypes of urban youth. Concerned with the impact of zero tolerance community policing strategies in the UK and USA, artists Joann Kushner and Dread Scott developed an art-based project with a social justice agenda. To give…

  7. Countering the nuclear terrorist threat

    International Nuclear Information System (INIS)

    Vantine, H.C.

    2002-01-01

    Full text: An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to a RDD. RDDs, or 'dirty bombs' as they are often called, spread radioactivity but they do not generate nuclear yield. The fabrication of a RDD requires radioactive material and a dispersal mechanism. Standards for safe handling and accountability of radioactive material vary around the world. Terrorist acquisition and use of an IND is a low-probability but high-consequence threat. Terrorist use of a RDD is a threat of higher probability but lower consequence. Two threats need to be considered for civil radiological and nuclear facilities. One is the theft of materials by terrorists, and the other is an attack on a facility to disperse radiological or nuclear materials. Facilities may include reactors as well as nuclear waste and storage areas. While important elements of a layered defense against these threats are already in place, improved international cooperation and a sustained investment in the science and technology needed to win the war on terrorism is necessary. (author)

  8. School Preparation to the Terrorist Threat. SVRC Fact Sheet

    Science.gov (United States)

    School Violence Resource Center, 2004

    2004-01-01

    This fact sheet provides a list of "lessons learned" to assist schools in better preparing for a crisis event. The list was compiled by the Centers for Disease Control and Prevention and the U.S. Department of Education specifically to assist schools in preparing for a terrorist attack. The lessons can help schools better identify appropriate…

  9. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  10. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver Buçaj

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism phenomena in line with the principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in the context of cyber attacks events in attempt to establish a legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  11. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law

    Directory of Open Access Journals (Sweden)

    Enver BUÇAJ

    2017-03-01

    Full Text Available This paper scrutinizes and highlights imminent need to regulate cyber terrorism pheromone in line with principle of international law. In so doing, this paper intends to ascertain legal basis to regulate cyber terrorism at international level. It explains the normative conduct by drawing on adjustments of certain member states of European Union as well as from none-European member states. Particular attention will be given as to how Kosovo has addressed cyber terrorism within its legal framework of criminal acts. The paper also addresses practical consequences of cyber terrorism in context of cyber-attacks events in attempt to establish legal basis for its prevention and punishment of cyber criminals wherever it happens. The author articulates its arguments by examining the presumed threats as a result of cyber terrorism activities, as well as based on well-known cyber terrorist behaviors and constant literature that insinuate that cyber-attacks are imminent threats. Lastly, as there is neither a particular treaty nor State practices, the author considers of utmost importance to spell out different views and statistics alluding that the need to regulate cyber terrorism in line with principle of international criminal law is a necessity.

  12. Environmental criminal offences - victimless crimes?

    Directory of Open Access Journals (Sweden)

    Batrićević Ana

    2013-01-01

    Full Text Available Ecological criminal offences, the most serious forms of harming and threatening of environment or its integral parts, represents a global phenomenon of great social hazard. They are often connected with organized transnational criminality, criminal offences against life and bodily integrity, corruption, tax evasion and discrimination. Disputable nature of the subject these incriminations protect imposes a question: “Who are the victims of ecological criminal offences - individuals, social groups, entire society or environment as value per se?” Perceiving ecological criminal offences as victimless crimes diminishes their importance and the circle of subjects interested to unveil, prove, prevent, suppress and impose punishments for these offences. Therefore, the author discusses the sustainability of the traditional, anthropocentrically defined term of victim in the context of biocentrism and its growing influence on criminal law, criminology and victimology. Attempting to determine whether ecological criminal offences represent victimless crimes, the author analyzes their term, characteristics and significance. Starting from the traditional definition of victim, she analyzes the term of “victimless crimes“ and its (unsustainability in the context of environmental crime, focusing on its most frequent victims and the necessity of their protection.

  13. Criminal law

    International Nuclear Information System (INIS)

    Silva, J.M. da.

    1979-01-01

    Facts concerning the application of atomic energy are presented and those aspects which should be under tutelage, the nature and guilt of the nuclear offenses and the agent's peril are presented. The need of a specific chapter in criminal law with adequate legislation concerning the principles of atomic energy is inferred. The basis for the future elaboration this legislation are fixed. (A.L.S.L.) [pt

  14. Terrorist targeting, information and secret coalitions

    NARCIS (Netherlands)

    Koster, M.; Lindner, I.; McCormick, G.; Owen, G.

    2010-01-01

    We consider a game played by a state sponsor of terrorism, a terrorist group, and the target of terrorist attacks. The sponsoring state wishes to see as much damage inflicted on the target of attack as possible, but wishes to avoid retaliation. To do so, his relationship with the terrorist group

  15. The New Rule of the Preventing Measures in the Brazilian Criminal Procedure Law: Judicial Subjectivity and Constitutional Criticism.

    Directory of Open Access Journals (Sweden)

    Hamilton da Cunha Iribure Júnior

    2015-12-01

    Full Text Available This approach is summarized in particular in a substantial analysis of some of the main innovations incorporated into the Criminal Procedure Code by Law n. 12.403/11 and its consequences in view of the new constitutional order. The problem is centered in the new procedural devices that add up to a microsystem application specific procedural measures, authorizing of the application of a range of alternatives precautionary measures to procedural prison. One of the start-up propositions of the current Brazilian Constitutional Law is that the State must promote and respect the existence worthy of human beings valuing it both in its individual dimension as a context of social justice. The plea guides a plurality of key elements, which, though heterogeneous, maintain a concatenation each other, justifying the existence of the democratic state. Not only as a Republican foundation, but mainly as a guiding rule creation and interpretation of legal standards, human dignity establishing a new concrete constitutional order making it a fundamental rights application base that, in turn, lining up as the primary core of existence and justification of the state body, his biggest reason. The method employed is the direct, document analysis, inference about the system that currently governs the measures that matter to a lesser restriction on individual freedom by aligning the current thinking of the higher courts in Brazil.

  16. Pathways Explaining the Reduction of Adult Criminal Behaviour by a Randomized Preventive Intervention for Disruptive Kindergarten Children

    Science.gov (United States)

    Vitaro, Frank; Barker, Edward D.; Brendgen, Mara; Tremblay, Richard E.

    2012-01-01

    Objective: This study aimed to identify the pathways through which a preventive intervention targeting young low-SES disruptive boys could result in lower crime involvement during adulthood. Method: The preventive intervention was implemented when the children were between 7 and 9 years and included three components (i.e. social skills, parental…

  17. Internet Posting of Chemical Worst Case Scenarios: A Roadmap for Terrorists

    Science.gov (United States)

    1999-02-10

    with homework and connect with friends. As a parent, the greatest concern I used to have about the Internet was porn and the other things that sickos...states, terrorists, and orga- nized criminals .’’ Indeed, the President’s budget for 1999, pending congressional ap- proval, devotes hundreds of millions...Brutalized groups that either bum with revenge following a genocide against their nation or face the prospect of imminent destruction without any

  18. Austria and the Threats from Islamist Radicalisation and Terrorist Involvement: An Overview of Governmental and Non-Governmental Initiatives and Policies

    Directory of Open Access Journals (Sweden)

    Katharina Götsch

    2017-09-01

    Full Text Available Unlike other European countries, Austria has so far been spared from terrorist attacks in the context of radical Islamism. However, the perceived threat, several criminal cases of terrorist involvement as well as being indirectly affected by attacks in other countries led to a high level of public and governmental attention to the issues of radicalisation, terrorist involvement and deradicalisation in Austria. Due to strong public pressure and growing recognition of the existing problem and hazard areas by governmental and non-governmental actors, a number of (1 initiatives providing support and counselling in case of radicalisation have been launched (e.g. Extremism Information Centre; DERAD or extended. Furthermore, (2 governmental agencies and political stakeholders have been pushing for enhanced means for the criminal prosecution and conviction of criminal offenses in the context of terrorism. The article presents an overview and review of new and renewed initiatives as well as (planned policy changes countering radicalisation and deradicalisation and terrorist involvement (support of terrorist organisations, membership, plans for terrorist attacks, etc. and thus a summarising insight into the case of Austria.

  19. Extended-release naltrexone to prevent relapse among opioid dependent, criminal justice system involved adults: rationale and design of a randomized controlled effectiveness trial.

    Science.gov (United States)

    Lee, Joshua D; Friedmann, Peter D; Boney, Tamara Y; Hoskinson, Randall A; McDonald, Ryan; Gordon, Michael; Fishman, Marc; Chen, Donna T; Bonnie, Richard J; Kinlock, Timothy W; Nunes, Edward V; Cornish, James W; O'Brien, Charles P

    2015-03-01

    Extended-release naltrexone (XR-NTX, Vivitrol; Alkermes Inc.) is an injectable monthly sustained-release mu opioid receptor antagonist. XR-NTX is a potentially effective intervention for opioid use disorders and as relapse prevention among criminal justice system (CJS) populations. This 5-site open-label randomized controlled effectiveness trial examines whether XR-NTX reduces opioid relapse compared with treatment as usual (TAU) among community dwelling, non-incarcerated volunteers with current or recent CJS involvement. The XR-NTX arm receives 6 monthly XR-NTX injections at Medical Management visits; the TAU group receives referrals to available community treatment options. Assessments occur every 2 weeks during a 24-week treatment phase and at 12- and 18-month follow-ups. The primary outcome is a relapse event, defined as either self-report or urine toxicology evidence of ≥10 days of opioid use in a 28-day (4 week) period, with a positive or missing urine test counted as 5 days of opioid use. We describe the rationale, specific aims, and design of the study. Alternative design considerations and extensive secondary aims and outcomes are discussed. XR-NTX is a potentially important treatment and relapse prevention option among persons with opioid dependence and CJS involvement. ClinicalTrials.gov: NCT00781898. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. The geography of pre-criminal space : epidemiological imaginations of radicalisation risk in the UK prevent strategy, 2007-2017

    OpenAIRE

    Heath-Kelly, Charlotte

    2017-01-01

    This article explores geographical and epistemological shifts in the deployment of the UK Prevent strategy, 2007–2017. Counter-radicalisation policies of the Labour governments (2006–2010) focused heavily upon resilience-building activities in residential communities. They borrowed from historical models of crime prevention and public health to imagine radicalisation risk as an epidemiological concern in areas showing a 2% or higher demography of Muslims. However, this racialised and localise...

  1. The geography of pre-criminal space: epidemiological imaginations of radicalisation risk in the UK Prevent Strategy, 2007?2017

    OpenAIRE

    Heath-Kelly, Charlotte

    2017-01-01

    ABSTRACT This article explores geographical and epistemological shifts in the deployment of the UK Prevent strategy, 2007?2017. Counter-radicalisation policies of the Labour governments (2006?2010) focused heavily upon resilience-building activities in residential communities. They borrowed from historical models of crime prevention and public health to imagine radicalisation risk as an epidemiological concern in areas showing a 2% or higher demography of Muslims. However, this racialised and...

  2. Congress, NRC mull utility access to FBI criminal files

    International Nuclear Information System (INIS)

    Ultroska, D.

    1984-01-01

    Experiences at Alabama Power Company and other nuclear utilities have promped a request for institutionalizing security checks of personnel in order to eliminated convicted criminals and drug users. The Nuclear Regulatory Commission (NRC), which could provide FBI criminal history information by submitting fingerprints, does not do so, and would require new legislation to take on that duty. Believing that current malevolent employees can be managed with existing procedures, NRC allows criminal background checks only on prospective employees in order to avoid a negative social impact on personnel. Legislation to transfer criminal histories to nuclear facilities is now pending, and NRC is leaning toward a request for full disclosure, partly because of terrorist threats and partly to save manpower time and costs in reviewing case histories

  3. A Comparative View of Terrorist Acts and Legislative Measures Countering this Phenomenon in Albania and the United States of America

    Directory of Open Access Journals (Sweden)

    Lirime Çukaj

    2013-07-01

    Full Text Available Terrorist acts have been a worrisome phenomenon for all nations. Paradoxically, although states have been conscious about the danger of this phenomenon, there is no definition of terrorist acts so far. States have been skeptical and they have not agreed that the judgment of these criminal offences be performed by international jurisdictions, thus opting for the domestic jurisdiction. Nevertheless, states have lacked the willingness to establish joint criminal policies and find efficacious means to combat these terrorist acts. One of these efficacious means has been the seizure and confiscation of licit and illicit assets possessed by terrorist groups. This is the focus of this short study, which will be inclusive by viewing this topic under the general framework of international acts, our domestic legislation, as well as the American one. This paper aims at presenting the legislative measures taken by the Albanian state to meet international requirements. It endeavors to provide arguments why all licit and illicit assets associated with terrorist acts are seized and confiscated. Special attention is paid to the way these assets are administered. Moreover, this study tries to analyze the achievements and problems in Albania, as well as provide conclusions and recommendations.

  4. Cost-effectiveness of extended release naltrexone to prevent relapse among criminal justice-involved individuals with a history of opioid use disorder.

    Science.gov (United States)

    Murphy, Sean M; Polsky, Daniel; Lee, Joshua D; Friedmann, Peter D; Kinlock, Timothy W; Nunes, Edward V; Bonnie, Richard J; Gordon, Michael; Chen, Donna T; Boney, Tamara Y; O'Brien, Charles P

    2017-08-01

    Criminal justice-involved individuals are highly susceptible to opioid relapse and overdose-related deaths. In a recent randomized trial, we demonstrated the effectiveness of extended-release naltrexone (XR-NTX; Vivitrol ® ) in preventing opioid relapse among criminal justice-involved US adults with a history of opioid use disorder. The cost of XR-NTX may be a significant barrier to adoption. Thus, it is important to account for improved quality of life and downstream cost-offsets. Our aims were to (1) estimate the incremental cost per quality-adjusted life-year (QALY) gained for XR-NTX versus treatment as usual (TAU) and evaluate it relative to generally accepted value thresholds; and (2) estimate the incremental cost per additional year of opioid abstinence. Economic evaluation of the aforementioned trial from the taxpayer perspective. Participants were randomized to 25 weeks of XR-NTX injections or TAU; follow-up occurred at 52 and 78 weeks. Five study sites in the US Northeast corridor. A total of 308 participants were randomized to XR-NTX (n = 153) or TAU (n = 155). Incremental costs relative to incremental economic and clinical effectiveness measures, QALYs and abstinent years, respectively. The 25-week cost per QALY and abstinent-year figures were $162 150 and $46 329, respectively. The 78-week figures were $76 400/QALY and $16 371/abstinent year. At 25 weeks, we can be 10% certain that XR-NTX is cost-effective at a value threshold of $100 000/QALY and 62% certain at $200 000/QALY. At 78 weeks, the cost-effectiveness probabilities are 59% at $100 000/QALY and 76% at $200 000/QALY. We can be 95% confident that the intervention would be considered 'good value' at $90 000/abstinent year at 25 weeks and $500/abstinent year at 78 weeks. While extended-release naltrexone appears to be effective in increasing both quality-adjusted life-years (QALYs) and abstinence, it does not appear to be cost-effective using generally accepted value

  5. CLASSIFICATION OF CRIMINAL GROUPS

    OpenAIRE

    Natalia Romanova

    2013-01-01

    New types of criminal groups are emerging in modern society.  These types have their special criminal subculture. The research objective is to develop new parameters of classification of modern criminal groups, create a new typology of criminal groups and identify some features of their subculture. Research methodology is based on the system approach that includes using the method of analysis of documentary sources (materials of a criminal case), method of conversations with themembers of the...

  6. Terrorism x Principle of Legality: The Consequences of Criminal Law of The Enemy at the Law N. 13.260/16

    Directory of Open Access Journals (Sweden)

    Ana Claudia da Silva Abreu

    2016-12-01

    Full Text Available The article deals with the crime of terrorism, particularly the criminal conduct introduced by law number 13.260/16. The global demand after the terrorist attacks of September 11, 2001, occurred in the United States, there is the adoption of legislative measures aimed at combating such crime. The anti-terror laws usually falls within the context of so-called Criminal Law of the enemy. However, it is necessary to analyze the principle of legality as a limit of criminalization, to set the terrorist phenomenon in the context of democratic societies. It was adopted the monographic method, while technical research, the indirect documentation.

  7. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  8. Criminal Law in Denmark

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Garde, Peter; Greve, Vagn

    resource for criminal lawyers, prosecutors, law enforcement officers, and criminal court judges handling cases connected with Denmark. Academics and researchers, as well as the various international organizations in the field, will welcome this very useful guide, and will appreciate its value in the study......Derived from the renowned multi-volume International Encyclopaedia of Laws, this book provides a practical analysis of criminal law in Denmark. An introduction presents the necessary background information about the framework and sources of the criminal justice system, and then proceeds...... to a detailed examination of the grounds for criminal liability, the justification of criminal offences, the defences that diminish or excuse criminal liability, the classification of criminal offences, and the sanctions system. Coverage of criminal procedure focuses on the organization of investigations, pre...

  9. Definition of Terrorist Act under Eth Law

    African Journals Online (AJOL)

    Wondwossen_D_K

    Abstract. While regional and international human rights institutions claim that the definition of a terrorist act under the Anti-terrorism Proclamation No. 652/2009 is overly broad as a result of which citizens not involved in a genuinely terrorist act are prosecuted and jailed, the Ethiopian government defends the law pointing ...

  10. The Mass Media Role in Terrorist Campaigns.

    Science.gov (United States)

    Moore, Tim; Clavier, David E.

    Terrorists seek recognition for their cause by using violence to create public fear which will force the government into repressive counter-measures. The mass media play a vital role in this strategy. News reports of terrorism may magnify the climate of fear, thereby augmenting the public's overreaction. Moreover, broadcast of terrorist acts may…

  11. Dutch politicians' coping with terrorist threat

    NARCIS (Netherlands)

    Nijdam, Mirjam J.; Gersons, Berthold P. R.; Olff, Miranda

    2010-01-01

    The psychosocial effects of terrorist threat and close protection have never been studied systematically in political leaders. We conducted a study among 12 Dutch politicians and their partners who were living under terrorist threat and close protection in the aftermath of two political murders.

  12. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  13. A Review of Sources on Terrorist Financing

    Directory of Open Access Journals (Sweden)

    Muhamet ALIU

    2017-03-01

    Full Text Available Terrorism financing is one of the most complex problems the democratic world is facing today. The transfer of funds to support terrorist activities has created enormous challenges across the world. This has fuelled several inter-religious and nationalist hate, and as such has put many nations into war with terrorist organisations. The main objective of this study is to review the sources of terrorist financing. The paper relies on secondary data that were drawn from various books, journals, as well as from institutional materials relevant to the issues raised. It concludes that terrorists are exploiting established financial systems at the global level to move their finances, and that informal systems remain the biggest challenge to thwart terrorist activities.

  14. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  15. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  16. THE CRIMINAL CHARGE

    OpenAIRE

    George Octavian NICOLAE; Sebastian Bogdan GAVRILĂ

    2017-01-01

    The process of criminal prosecution against a particular individual is ordered by the prosecutor or law enforcement investigator by ordinance. After the decision to carry on with the criminal investigation, the suspected person, the perpetrator acquires a legal standing which allows a full spectrum of rights and obligations stipulated by law. This project is focused on the link between our national criminal law regulation regarding the criminal investigation and the demands of the European Co...

  17. THE CRIMINAL CHARGE

    Directory of Open Access Journals (Sweden)

    George Octavian NICOLAE

    2017-05-01

    Full Text Available The process of criminal prosecution against a particular individual is ordered by the prosecutor or law enforcement investigator by ordinance. After the decision to carry on with the criminal investigation, the suspected person, the perpetrator acquires a legal standing which allows a full spectrum of rights and obligations stipulated by law. This project is focused on the link between our national criminal law regulation regarding the criminal investigation and the demands of the European Convention for human rights.

  18. A generative model for predicting terrorist incidents

    Science.gov (United States)

    Verma, Dinesh C.; Verma, Archit; Felmlee, Diane; Pearson, Gavin; Whitaker, Roger

    2017-05-01

    A major concern in coalition peace-support operations is the incidence of terrorist activity. In this paper, we propose a generative model for the occurrence of the terrorist incidents, and illustrate that an increase in diversity, as measured by the number of different social groups to which that an individual belongs, is inversely correlated with the likelihood of a terrorist incident in the society. A generative model is one that can predict the likelihood of events in new contexts, as opposed to statistical models which are used to predict the future incidents based on the history of the incidents in an existing context. Generative models can be useful in planning for persistent Information Surveillance and Reconnaissance (ISR) since they allow an estimation of regions in the theater of operation where terrorist incidents may arise, and thus can be used to better allocate the assignment and deployment of ISR assets. In this paper, we present a taxonomy of terrorist incidents, identify factors related to occurrence of terrorist incidents, and provide a mathematical analysis calculating the likelihood of occurrence of terrorist incidents in three common real-life scenarios arising in peace-keeping operations

  19. The Decision Calculus of Terrorist Leaders

    Directory of Open Access Journals (Sweden)

    J. Tyson Chatagnier

    2012-10-01

    Full Text Available This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizations. After reviewing the results and insights derived from this analysis, we conclude with implications for policies to counter terrorism.

  20. Mentally disordered criminal offenders in the Swedish criminal system.

    Science.gov (United States)

    Svennerlind, Christer; Nilsson, Thomas; Kerekes, Nóra; Andiné, Peter; Lagerkvist, Margareta; Forsman, Anders; Anckarsäter, Henrik; Malmgren, Helge

    2010-01-01

    Historically, the Swedish criminal justice system conformed to other Western penal law systems, exempting severely mentally disordered offenders considered to be unaccountable. However, in 1965 Sweden enforced a radical penal law abolishing exceptions based on unaccountability. Mentally disordered offenders have since then been subjected to various forms of sanctions motivated by the offender's need for care and aimed at general prevention. Until 2008, a prison sentence was not allowed for offenders found to have committed a crime under the influence of a severe mental disorder, leaving forensic psychiatric care the most common sanction in this group. Such offenders are nevertheless held criminally responsible, liable for damages, and encumbered with a criminal record. In most cases, such offenders must not be discharged without the approval of an administrative court. Two essentially modern principles may be discerned behind the "Swedish model": first, an attempted abolishment of moral responsibility, omitting concepts such as guilt, accountability, atonement, and retribution, and, second, the integration of psychiatric care into the societal reaction and control systems. The model has been much criticized, and several governmental committees have suggested a re-introduction of a system involving the concept of accountability. This review describes the Swedish special criminal justice provisions on mentally disordered offenders including the legislative changes in 1965 along with current proposals to return to a pre-1965 system, presents current Swedish forensic psychiatric practice and research, and discusses some of the ethical, political, and metaphysical presumptions that underlie the current system. Copyright 2010 Elsevier Ltd. All rights reserved.

  1. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  2. Liability for damage caused by terrorist attacks

    International Nuclear Information System (INIS)

    Heller, W.

    2004-01-01

    After the terrorist attacks on September 11, 2001, one of the questions raised was about the potential liability of the operator of a nuclear power plant for damage sustained by a third party as a result of a comparable terrorist attack on a nuclear power plant. Internationally, this situation is regulated by the Convention on Third-Party Liability in Nuclear Power, the so-called Paris Liability Convention, of 1960, 1964, 1982. Among other things, that Convention excludes liability in cases directly resulting form 'actions of armed conflict..'. The problem arises, among other things, from the absence of an internationally acknowledged definition of terrorism or terrorist attack, and from the idea that, according to the Paris Convention, the legal entities assumed to be involved in such actions are states and weapons. National and international agreements and laws about the liability of the operator of nuclear facility for damage to third parties as a result of terrorist actions are analyzed and discussed. (orig.)

  3. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  4. Identifying and structuring the objectives of terrorists.

    Science.gov (United States)

    Keeney, Gregory L; Von Winterfeldt, Detlof

    2010-12-01

    The risk of terrorism is of great concern to many countries and significant resources are spent to counter this threat. A better understanding of the motivation of terrorists and their reasons for selecting certain modes and targets of attack can help improve the decisions to allocate resources in the fight against terrorism. The fundamental question addressed in this article is: "What do terrorists want?" We take the view that terrorists' preferences for actions are based on their values and beliefs. An important missing piece in our knowledge of terrorists' preferences is an understanding of their values. This article uses a novel approach to determine these values and state them as objectives, using principles from decision analysis and value-focused thinking. Instead of interviewing decisionmakers and stakeholders, as would be normal in decision analysis, we extract the values of terrorists by examining their own writings and verbal statements. To illustrate the approach, we extract the values of Al-Qaeda and structure them in terms of strategic, fundamental, and means objectives. These objectives are interrelated through a means-ends network. This information is useful for understanding terrorists' motivations, intent, and likely actions, as well as for developing policies to counter terrorism at its root causes. © 2010 Society for Risk Analysis.

  5. Criminal characteristics of a group of primary criminals diagnosed with aspd: approach to criminal recidivis

    Directory of Open Access Journals (Sweden)

    R. Larrotta-Castillo

    Full Text Available Abstract Introduction: Antisocial personality disorder (ASPD is commonly associated with the risk of criminal recidivism. Knowing more about the factors associated with this pattern of behaviour can help with the design of effective prevention strategies. The purpose of this article is to establish if there are differences in socio-criminogenic variables of a group of criminals sentenced for the first time and with APSD compared to another group of first-time offenders who do not present this disorder. Materials and methods: Analytical observation study of 70 men classified into 2 groups according to the presence of ASPD TPA (n=47; age: 29.98±7.8 years or absence of ASPD (n=23; age: 32.35±8.7 years. Results: The inmates with ASPD showed higher frequencies of current consumption of psychoactive substances (31.9%, criminal associations and simultaneous use of psychoactive substances (70.2%, having committed the crime under the effects of a psychoactive substance (55.3%, not having the possibility of distancing themselves from criminal associations (83% and a lack of legal resources for proceedings for defence and release (76.6%. Discussion: This sample contains a group of variables called dynamic that are more commonly present amongst first time offenders with ASPD; said variables have been associated as major predictors of recidivism. Given that they are regarded as dynamic, they may well be modifiable.

  6. Economic Criminal Acts according to Criminal Code of Republic of Kosovo

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Bajram Ukaj

    2015-06-01

    Full Text Available This article analyses the criminal offences against economy in the Criminal Code of Kosovo, which are increasingly becoming an important object of study, both at national and international levels. The criminal offences against economy are in principle blanket nature offences, guiding nature, since the vast majority of such norms are further delineated in other bylaws, while the criminal code provisions provide on criminal offences, thereby guiding towards another legal or sub-legal provision. Economic and financial crimes in Kosovo are already making a remarkable increase, as proven by statistical records of state authorities. The increased rate of economic crimes is a result of many factors and circumstances present in Kosovo, which may be different from regional countries. The inefficient fight and prevention of organized crime and corruption in the period between 1999-2010 was stimulated and favoured by several specific factors that are elaborated in this article.

  7. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  8. Psychology and criminal justice

    OpenAIRE

    Adler, Joanna R.

    2013-01-01

    This chapter is designed to give the reader a flavour of a few areas in which psychology has been applied to criminal justice. It begins by providing some historical context and showing the development of some applications of psychology to criminal justice. The chapter is broadly split into 3 sections: Pre Trial; Trial; and Post Trial. In most of this chapter, the areas considered assess how psychology has had an influence on the law and how psychologists work within criminal justice settings...

  9. Criminal Aspects of Pornography

    OpenAIRE

    Svoboda, Filip

    2015-01-01

    Criminal Aspects of Pornography Summary The main purpose of this thesis is to introduce the phenomenon of pornography in terms of criminal law, to point out flaws in the current relevant criminal legislation in the Czech Republic and to propose a possible solution in a form of potential legislative changes. The thesis is composed of five chapters. The first chapter deals with definition issue of vague legal term of "pornography" and other related terms ("child pornography", "hardcore pornogra...

  10. How to identify the person holding the highest position in the criminal hierarchy?

    Directory of Open Access Journals (Sweden)

    Grigoryev D.A.

    2014-12-01

    Full Text Available The current version of the resolution of the RF Supreme Court Plenum of June 10, 2010 N 12, clarifying the provisions of the law on liability for crimes committed by a person holding the highest position in the criminal hierarchy (Part 4 of Article 210 of the RF Criminal Code, is criticized. Evaluative character of the considered aggravating circumstance doesn’t allow to develop clear criteria for identifying the leaders of the criminal environment. Basing on the theory provisions and court practice, the authors suggest three criteria. The first criterion is specific actions including: establishment and leadership of the criminal association (criminal organization; coordinating criminal acts; creating sustainable links between different organized groups acting independently; dividing spheres of criminal influence, sharing criminal income and other criminal activities, indicating person’s authority and leadership in a particular area or in a particular sphere of activity. The second is having money, valuables and other property obtained by criminal means, without the person’s direct participation in their acquisition; transferring money, valuables and other property to that person systematically, without legal grounds (unjust enrichment; spending that money, valuables and other property to carry out criminal activities (crimes themselves and conditions of their commission. The third is international criminal ties manifested in committing one of the crimes under Part 1 of Article 210 of the RF Criminal Code, if this crime is transnational in nature; ties with extremist and (or terrorist organizations, as well as corruption ties. The court may use one or several of these criteria.

  11. Criminality and Asbestos in Industry.

    Science.gov (United States)

    Castleman, Barry

    2017-02-01

    Criminal prosecutions of individuals in the asbestos industry are reviewed, particularly the case of asbestos owner-executive Stephan Schmidheiny. Italian courts sentenced Schmidheiny to sixteen to eighteen years in jail for creating an environmental disaster causing three thousand deaths. The convictions were overturned on a technicality, and a murder case against Schmidheiny has started. His firm, Eternit, made asbestos-cement building products in many countries. Schmidheiny directed a cover-up that the Italian Court of Appeal blamed for delaying the ban of asbestos in Italy by ten years. Today, the asbestos industry is a criminal industry, profiting only by minimizing its costs for the prevention and compensation of occupational and environmental illness. The asbestos industry should only be consulted by governments for the purpose of closing it and dealing with the legacy of in-place asbestos.

  12. Theoretical Aspects in Developing Directions for Risking Terroristic Threats for National Economy

    Directory of Open Access Journals (Sweden)

    Rizgar J. Aziz Galali

    2017-12-01

    Full Text Available The current stage of the existence of the world community is characterized by an ever-increasing level of threat of the emergence of undesirable effects on the world economy of acts of a terrorist nature. Historical facts show that such phenomenon as terrorism can take place in any state of the world, regardless of the standard of living of the population, education and other factors. However, studies in this area still show that countries with an underdeveloped economy and a low standard of living of the population are more likely to be affected by terrorist acts. Such states can act as the "cradle" of terrorism and this, first of all, affects their economic and social situation. But practice shows that terrorism is capable of spreading actively around the world, therefore, an important element in preventing the emergence of terrorism is the construction of an integral system of national economic security, with a special place to search for and develop methods and approaches to reduce the risks of terrorist threat. The article is devoted to the consideration of topical issues of the theory of the emergence of a terrorist threat, as well as the possible negative impact of terrorist acts on the national economy, its security and stability. In addition, the article suggests an improved scheme of risks of the national economy, as well as a scheme of types of diversification of risks of a terrorist threat, and a mechanism for managing the risk of a terrorist threat to the national economy has been developed.

  13. The secret society and the social dynamics of terrorist behavior.

    Science.gov (United States)

    Mackert, Jürgen

    2014-01-01

    The article argues that individualist accounts cannot adequately explain the social dynamics of terrorist behavior as they turn analyses of terrorism into analyses of terrorists. A relational approach that concentrates on the social relations between terrorist organizations and their members would be able to do this, however. Therefore, the article presents a formal analysis that makes the "secret society" of terrorists the lynchpin of an explanation of how terrorist organizations shape the behavioral conditions of volunteers and suicide terrorists in a manner that triggers a type of behavior we might call terrorism.

  14. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ...; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions Regulations AGENCY: Office of... administers three sanctions programs with respect to terrorists and terrorist organizations. The Terrorism... foreign terrorists that disrupt the Middle East peace process.'' The Global Terrorism Sanctions...

  15. Intelligence as evidence in criminal proceedings

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2011-01-01

    Full Text Available The fight against modern forms of crime such as organized crime, terrorism and other very serious crimes caused not only modification of procedural principles and procedural rules, but also the necessity of re-examination of evidence in terms of introducing new evidence in criminal proceedings. Given that the prevention, detection and proving in cases of mentioned offenses represent the systemic issue and that the efficiency is caused by cohesion of preventive and repressive mechanisms in each strategy of preventing and combating serious crimes, the more often raised question, aroused from the practice, is the issue of the use of information gathered by the police or security services as evidence in criminal proceedings. In addition, there is the issue of use of illegal evidence, the ways in which these evidence are defined in some jurisdictions and which are the legal consequences of their use in judicial decision, whether it is based only on them, or on some other evidence beside them. The author addresses the issues of necessity and justification for use of information of security services as evidence in criminal proceedings, their definition and difference with respect to data, experiences and practices in other countries and of course their use as evidence in criminal proceedings of Serbia. Also, the paper addresses the Criminal Intelligence Analytics, exchange of information between the competent authorities at national and international level.

  16. The International Criminal Court

    DEFF Research Database (Denmark)

    Damgaard, Ciara Therése

    This article considers whether acts of international terrorism can and should be prosecuted before the International Criminal Court as crimes against humanity.......This article considers whether acts of international terrorism can and should be prosecuted before the International Criminal Court as crimes against humanity....

  17. The social psychological makings of a terrorist.

    Science.gov (United States)

    Webber, David; Kruglanski, Arie W

    2018-02-01

    Social psychological factors pertain to all aspects of terrorism, including how terrorist organizations operate, and the impact of terrorism on everyday people. The present analysis focuses on the aspect of terrorism where social psychology's voice is perhaps most critical: radicalization (i.e., how terrorists are made) and deradicalization (i.e., how terrorists are unmade). In reviewing the literature, we identify three factors critical to radicalization: (1) the individual need that motivates one to engage in political violence, (2) the ideological narrative that justifies political violence, and (3) the social network that influences one's decisions along the pathway to extremism. Theoretical and empirical contributions are discussed. We end with an examination of interviews conducted with former extremists of various ideological leanings to highlight these same three factors as critical to their individual deradicalization experiences. Published by Elsevier Ltd.

  18. Debt as a Criminal Risk Factor in Denmark

    DEFF Research Database (Denmark)

    Olesen, Annette

    2016-01-01

    and informal punishment, as unintended consequences of indebtedness, were still poorly explored. This research indicates that legal regulation and informal punishment based on indebtedness may serve as an argument for considering debt as a criminal risk factor which has made the preventive factors less...... effective and has driven ex-prisoners farther from legitimate socio-economic advantaged affiliations and invited criminal behaviour....

  19. Terrorist Precursor Crimes: Issues and Options for Congress

    National Research Council Canada - National Science Library

    O'Neil, Siobhan

    2007-01-01

    ... not. Terrorist precursor crimes, offenses committed to facilitate a particular attack or promote a terrorist campaign's objectives, are thought to be often carried out far away from the primary theater...

  20. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  1. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  2. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  3. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  4. Denmark: criminal law as an anchorage point for pro-active anti-terrorism legislation

    DEFF Research Database (Denmark)

    Vestergaard, Jørn

    2012-01-01

    The article focuses on the compatibility of criminal law anti-terrorism legislation in Danish law with basic principles regarding the rule of law and due process. The so-called anti-terror-packages of 2002 and 2006 involve a set of rather uncertain and wide-reaching provisions fundamentally...... challenging the principle of legality and substantially widening of the scope of criminal law. These provisions criminalize various activities more or less remote from actual or attempted terrorist acts and participation in such activities, too. The legislature has even over-implemented vari-ous legal......, the challenges regarding rule of law and due process also relate to secondary legislation in fields like law enforcement, criminal procedure, intelligence, public law, treatment of foreigners, etc....

  5. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  6. POLÍTICA ANTITERROR: OS DIREITOS HUMANOS NA ENCRUZILHADA DA PREVENÇÃO E DA REPRESSÃO AOS ATOS TERRORISTAS -- ANTI TERROR POLICY: HUMAN RIGHTS AT THE CROSSROADS OF PREVENTION AND REPRESSION TO TERRORIST ACTS

    Directory of Open Access Journals (Sweden)

    Cláudio Rogério Sousa Lira

    2016-06-01

    Full Text Available Resumo: A pesquisa tem como tema o terrorismo e os direitos humanos. Inicialmente, neste trabalho retoma-se a questão conceitual dos direitos humanos e do terrorismo. A discussão central é conduzida em razão da prática do terror e dos meios punitivos empregados pelos Estados como forma de repressão à atuação das organizações terroristas. Não é novidade que os atos terroristas recentes chocaram a sociedade pelo emprego de métodos violentos nunca antes experimentados. A partir de ideologias religiosas-econômicas-políticas, grupos terroristas vitimam e mutilam inocentes. Em resposta a essas atrocidades, os Estados empregam métodos de contra-ataque próprios de guerra, buscando, quase sempre, uma vingança institucionalizada. É nessa encruzilhada em que se encontram os direitos humanos, já que a política de prevenção e de repressão aos atos terroristas não observa o devido processo legal. Ao final, neste trabalho sugere-se, a partir da percepção de filósofos e de juristas, que as respostas aos atos terroristas não se coadunam com os preceitos dos direitos humanos. Palavras-chave: Direitos humanos. Terrorismo. Política criminal.

  7. Dentistry and criminal law.

    Science.gov (United States)

    Khoury, B S; Khoury, J N

    2017-09-01

    Criminal law in dentistry, as shaped and moulded by the prevailing views of society, defines what is or is not socially acceptable. It applies in both personal and professional contexts with the intended consequence of protecting the public from unacceptable conduct and potential imbalances of power. At its centre, a patient's consent plays a pivotal role in transforming unlawful conduct into lawful conduct. This literature review considers the current law and the trend of utilizing criminal law in addition to non-criminal law alternatives of reprimanding clinicians for failure to achieve consent in the course of dental practice. Dentists must appreciate this change and the prosecuting authority's increasing willingness to resort to criminal law. © 2017 Australian Dental Association.

  8. Civil & Criminal Penalties

    Data.gov (United States)

    US Consumer Product Safety Commission — When CPSC is involved in a civil or criminal investigations into violations of the Consumer Products Safety Act the Commission publishes final determinations and...

  9. Euthanasia and criminal law

    OpenAIRE

    Ullrichová, Petra

    2008-01-01

    71 8. Summary- Euthanasia and criminal law Euthanasia is often regarded as a controversial topic that is being discussed all around the world. The legislative rules differ among the countries to various extent. The scope of this work is to offer a summary of legal regulations in euthanasia, particulary in the area of criminal law and a several examples of these regulations in Europe, USA and Australia. In the first chapter, the term of euthanasia is defined which is necessary for the purpose ...

  10. Juveniles in criminal procedure

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2012-01-01

    Full Text Available Taking into consideration the importance and role of children in modern society, as well as their position, this article has as its focus juveniles in criminal procedure. The existence of a separate juvenile justice system independent of the criminal law applicable to the adult offenders and general criminal procedure, as well as the periodic changes of the dominant approach in theory and practice reflects the ascendancy of different theoretical perspectives in the juvenile justice. In this paper, the authors scrutinize the models of responding to juvenile crime - justice and welfare model - as two models of the greatest importance in the present reaction of the society to the crimes conducted by the youngest delinquents at the beginning of the new century and millennium. Furthermore, the paper deals with a matter of international legal standards which, to a large extent, give shape to the legal framework for juvenile offenders and provide their rights and position in the criminal procedure. The authors refer to the internationally accepted documents on several levels. From the (almost universally accepted multilateral conventions on human rights, through the field of recommendations, rules and guidelines which are obeyed and enforced in practice of the juvenile justice although they are of non-binding nature, via the regional European legislative to the national provisions in a particular number of countries. On all the levels mentioned above the rights of the juveniles are regulated having in mind their possible role in the criminal procedure as a perpetrator of a criminal act, as a victim or as a witness. This paper also analyzes the criminal procedure with respect to juvenile perpetrators of the criminal acts in the Republic of Serbia and compliance of the provisions currently in vigor with the international legal standards contained in the international conventions and other internationally accepted and recognized instruments.

  11. Criminal tendencies and psychological testing

    Directory of Open Access Journals (Sweden)

    Sobchik L. N.

    2017-04-01

    Full Text Available Methods of psychological diagnostics closer to the psychology main research areas, which involve measuring the accuracy and statistical reliability. A set of methods that includes questionnaires should be complemented with projective tests in which the stimulus material is verbal in nature. The article presents the results of surveys of different groups of persons in conflict with the law, as well as screening tests contingent of youth groups and adolescents. High performance, spontaneously manifested aggressiveness, traits, emotional immaturity, low self-control and primitive-the requirement of the hierarchy of values at statistically significant level are identified in the data psychodiagnostic study, thus allowing to allocate the risk of wrongful conduct and to develop preventive measures of psycho-pedagogical and social nature. Psychological testing is an effective tool in the study of criminal predisposici and gives the key to a science-based approach in the development of preventive measures aimed at reducing crime.

  12. The Developmental Dynamics of Terrorist Organizations

    Science.gov (United States)

    Clauset, Aaron; Gleditsch, Kristian Skrede

    2012-01-01

    We identify robust statistical patterns in the frequency and severity of violent attacks by terrorist organizations as they grow and age. Using group-level static and dynamic analyses of terrorist events worldwide from 1968–2008 and a simulation model of organizational dynamics, we show that the production of violent events tends to accelerate with increasing size and experience. This coupling of frequency, experience and size arises from a fundamental positive feedback loop in which attacks lead to growth which leads to increased production of new attacks. In contrast, event severity is independent of both size and experience. Thus larger, more experienced organizations are more deadly because they attack more frequently, not because their attacks are more deadly, and large events are equally likely to come from large and small organizations. These results hold across political ideologies and time, suggesting that the frequency and severity of terrorism may be constrained by fundamental processes. PMID:23185267

  13. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project...crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...within Colombia, the primary one being social inequality between the locals and the government. Another factor is the drug dealers’ desire to

  14. Conceptualizing Terrorist Violence and Suicide Bombing

    OpenAIRE

    Murad Ismayilov

    2010-01-01

    This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualizat...

  15. Extremist Ideological Influence on Terrorist Decision Frameworks

    Science.gov (United States)

    2012-05-11

    culture in terms of lists of domain-general, stable traits, such as individualist - collectivist value orientations li7J Researchers operating within this...heavily on terrorist communication of specific aspects from their ideological framework to shape the common perspective of their intended audiences...to define culture from a cognitive perspective . There is a somewhat natural tendency to talk about culture as if it were a concrete, material thing

  16. [Behavioral patterns of domestic terrorist groups in Japan].

    Science.gov (United States)

    Oue, Wataru

    2013-08-01

    This study examined the behavioral patterns of Japanese extremist groups, based on 377 terror incidents that occurred in Japan between 1990 and 2010. These incidents included bombings, rocket attacks, hostage taking, and vehicle assaults. Information was drawn primarily from on-line newspaper databases. A multiple correspondence analysis was performed using five categories: extremist group identity, time of attack, target of attack, attack strategy, and method of claiming responsibility. Extremist group characteristics varied along two dimensions: the interaction level between terrorist and victim, and the indiscriminate level of use of force. We categorized multiple far-left, far-right, and religious extremist groups based on these two dimensions. Our findings may help prevent terror attacks, and help identify the group responsible for a given incident.

  17. Smoking behaviour under intense terrorist attacks.

    Science.gov (United States)

    Keinan-Boker, Lital; Kohn, Robert; Billig, Miriam; Levav, Itzhak

    2011-06-01

    Smoking is one of the varied psychological reactions to stress. This study examined the rate and changes in cigarette smoking among former Gaza and current West Bank Jewish settlers subjected to direct and indirect terrorist attacks during the Al-Aksa Intifada. The relationship with degree of religious observance and emotional distress was explored as well. In this cross-sectional study, the respondents were settlers randomly selected and interviewed by telephone (N = 706). The interview schedule included socio-demographic items, information on direct exposure to terrorist attacks (e.g. threat to life or physical integrity, personal losses, property damage) and on steady and changes in smoking habits, and a scale to measure emotional distress. In contrast with the country population, a larger percentage of settlers who smoked increased the number of cigarettes consumed with exposure to terrorism (10 and 27%, respectively). Respondents who were injured or had their home damaged reported a higher rate of smoking during the preceding year (30 and 20%, respectively). Emotional distress was related to cigarette smoking, but not in the controlled analysis. Religious observance had no effect. Direct or indirect exposure to terrorist attacks had an impact on smoking prevalence rates and on changes in smoking habits. Studies investigating reactions to traumatic events should include a detailed section on smoking while mental health interventions should address the needs of smokers.

  18. Several criminal, phenomenological and etiological features of criminal offences of counterfeiting money in Kosovo

    Directory of Open Access Journals (Sweden)

    MSc. Milot Krasniqi

    2012-12-01

    Full Text Available The Republic of Kosovo is making efforts as a young state to strengthen rule of law and efficiently combat criminality in general, and specifically organized crime, as a condition for its journey towards European integration perspectives.  For a normal functioning of the economic system, the safety and protection of controlled circulation of money are of vital importance. In this direction, the state takes actions and measures to ensure that manufacturing and emissions of banknotes and bonds are undertaken by competent authorities, such as the Central Bank, and render impossible the counterfeiting of money. In Kosovo, money counterfeiting is not widely studied. Consequently, there are no recent research papers over the time when these offences have marked rather high records. This circumstance, and especially the fact that these offences are rather frequent in Kosovo, made me enter the research of this type of criminality.    Apart from principles and rules stipulated by special laws of the field of economy, protection of the economic system is also helped by the Criminal Code, which incriminates the act of counterfeit money as a criminal offence against the economic system, thereby ensuring general prevention of potential offenders, and repressive measures against confirmed offenders. Protection of economic and monetary systems is also provided upon by numerous international acts.  The paper is permeated by conclusions, analysis and independent recommendations, which I believe will contribute de lege ferrenda to criminal policies in preventing and combating this type of crime. In researching the criminal offences of counterfeiting money, I have used the method of historical materialism, dogmatic law method, statistical methods, surveys and interviews, and studies of individual cases.    From the research of this type of crime, I have concluded that these criminal offences are a serious type of crime, which may result in major individual

  19. Can Education Reform Canada's Criminals?

    Science.gov (United States)

    Griffin, D. K.

    1978-01-01

    Discusses the development of the existing correctional programs in Canada's prisons, some theories of criminality, and two competing views on the best way to reform criminals today. Also gives a short review of penitentiary education programs. (RK)

  20. A Proposal: The U.N. Post-Conflict Criminal Justice Reform Project

    Science.gov (United States)

    2006-04-01

    Council [ ECOSOC ], Commission on Crime Prevention and Criminal Justice, Report on the Thirteenth Session, 1162, U.N. Doc. E/CN. 15/2004/16 (May 11-20...and Criminal Justice, http://www.unodc.org/unodc/en/crime_cicp_commission.html (last visited Dec. 5, 2005). 197 See U.N. Econ. & Soc. Council [ ECOSOC ...Mar. 12, 2003). 198 See U.N. Econ. & Soc. Council [ ECOSOC ], Commission on Crime Prevention and Criminal Justice, Standards and Norms in Crime

  1. Framing in criminal investigation: How police officers (re)construct a crime.

    Science.gov (United States)

    Salet, Renze

    2017-06-01

    Failures in criminal investigation may lead to wrongful convictions. Insight in the criminal investigation process is needed to understand how these investigative failures may rise and how measures can contribute to the prevention of this kind of failures. Some of the main findings of an empirical study of the criminal investigation process in four cases of major investigations are presented here. This criminal investigation process is analyzed as a process of framing, using Goffman's framing (Goffman, 1975) and interaction theories (Goffman, 1990). It shows that in addition to framing, other substantive and social factors affect the criminal investigation.

  2. [Forensic-medical assessment of terroristic chemical attacks].

    Science.gov (United States)

    Babakhanian, R B; Bushuev, E S

    2005-01-01

    By potential damage, chemical terroristic attacks are much more dangerous than terroristic bombing. To fight chemical terrorism it is necessary to create the system of medical-environmental defense of the population. In line with emergency medicine, forensic medical service is a very important element of the antiterroristic defense. The activity of forensic-medical experts in the field of terroristic chemical attack is analysed.

  3. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  4. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  5. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  6. Competing for Criminal Money

    NARCIS (Netherlands)

    Rawlings, G.; Unger, B.

    2005-01-01

    To compete for criminal money by means of low bank secrecy seems a tempting strategy for countries in order to attract additional funds. We show in a model that this “Seychelles-strategy” can increase national output, in particular if a country takes a (Stackelberg ) leadership in the competition

  7. Criminal Justice Curriculum Models.

    Science.gov (United States)

    Lumb, Richard C.; Alm, Mary

    This report outlines three new curriculum models for criminal justice developed as part of the North Carolina Community College System's Curriculum Improvement Project (CIP): the "Generalist"; "Generalist-with-Options" for a Law Enforcement Specialty, Corrections Specialty, or Protective Services Specialty; and "Generalist…

  8. Criminal Justice Web Sites.

    Science.gov (United States)

    Dodge, Timothy

    1998-01-01

    Evaluates 15 criminal justice Web sites that have been selected according to the following criteria: authority, currency, purpose, objectivity, and potential usefulness to researchers. The sites provide narrative and statistical information concerning crime, law enforcement, the judicial system, and corrections. Searching techniques are also…

  9. The Influence of Beccaria in Modern Criminal Law

    Directory of Open Access Journals (Sweden)

    Manuel Alberto Leyva Estupiñán

    2015-12-01

    Full Text Available “On Crimes and Punishments” by Cesar Beccaria is a fundamental work for modern Criminal Law. The ideas of liberal Criminal Law are presented throughout the book and the basis of philosophy used as a criteria, clearly reappears in Western thought by the middle of the 18th Century. Beccaria is one of the first authors that actually criticize the inquisitive system and canonical law from a philosophical and Criminal Law point of view. The author criticizes capital punishment, tortures to the accused and concludes that prevention should be the final objective of punishment.

  10. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    describes it in accordance with its own goals and political concerns. The cliché of one man’s terrorist is another man’s freedom fighter mindset causes...47 76 Justine A. Rosenthal, “For-Profit Terrorism: The Rise of Armed Entrepreneurs ,” Studies in Conflict & Terrorism 31, no. 6 (06/13; 2015/07...the left of Makarenko’s continuum. She sees these kinds of hybrids as “armed entrepreneurs ” and names their activity as “for- profit-terrorism

  11. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...... and followers etc. In this research we analyze and predict the most likely role a particular node can adapt once a member of the network is either killed or caught. The adaptation is based on computing Bayes posteriori probability of each node and the level of the said node in the network structure....

  12. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  13. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  14. National Intelligence Estimate: The Terrorist Threat to the US Homeland

    National Research Council Canada - National Science Library

    2007-01-01

    .... Among the key judgments in this NIE are the following: the U.S. Homeland will face a persistent and evolving terrorist threat over the next 3 years, with the main threat coming from Islamic terrorist groups and cells, especially al-Qa'ida...

  15. Terrorist Use of the Internet: Information Operations in Cyberspace

    Science.gov (United States)

    2011-03-08

    terrorist financing enterprise. Internet Ponzi schemes , identity theft, counterfeiting, and other types of computer fraud have been shown to yield high...CRS Report for Congress Prepared for Members and Committees of Congress Terrorist Use of the Internet: Information Operations in...reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching

  16. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions...

  17. 22 CFR 40.32 - Terrorist activities. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Terrorist activities. 40.32 Section 40.32 Foreign Relations DEPARTMENT OF STATE VISAS REGULATIONS PERTAINING TO BOTH NONIMMIGRANTS AND IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Security and Related Grounds § 40.32 Terrorist...

  18. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  19. Terrorist threats: Technical and policy approaches to countering them

    Science.gov (United States)

    Fainberg, Anthony

    2017-11-01

    This paper presents a summary of the history of terrorist threats to the United States and other nations over the last few decades, and will discuss means, both technical and policy-oriented, that can counter such threats. Changing trends in terrorist attacks are discussed, together with the need to develop countermeasures to changes in the types of threats.

  20. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer

    2004-01-01

    ... to continually evade law enforcement. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  1. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer L

    2005-01-01

    ... to evade law enforcement continually. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  2. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    barriers, technological advances and anarchy encountered due the end of the Cold War. These dynamics have also contributed to rise of a new class of...set off a bomb at Los Angeles International Airport; a 1995 plan to blow up 12 transpacific flights of U.S. commercial airliners; a 1995 plan to

  3. Terrorist speech and the criminal law – a comparative analysis / Johannes Keiler

    Index Scriptorium Estoniae

    Keiler, Johannes

    2017-01-01

    Inglismaa ja Madalmaade kriminaalõigussüsteemide võitlusest terroristliku kõne vastu, terroristliku kõne abil otsesest ja kaudsest õhutamisest terrorismile. Terroristliku kõne kriminaliseerimisest

  4. Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment

    Science.gov (United States)

    2007-11-01

    allied interests. Judgments in the U.S. Army and Marines 2006 Counterin- surgency field manual —serving as a guide for ongoing efforts in Iraq...recent overview documents (as well as in numerous specialized field manuals and in planning materials): a. Capstone Concept for Special Operations 2006...Cruces, New Mexico, 16 October 2005. Original sources cited include articles from El Universal, Proceso /Apro, Frontera, and others. See also FNS

  5. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  6. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy......The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes the development of expanded and improved intelligence a pre-requisite for their success As such, the intelligence community is actively developing new technologies to facilitate the identification...... and targeting of new and emerging threats. These threats can be manifested in network-centric form of organizations, doctrines, and technologies attuned to the information age. It is a widely held belief that terrorist activities are done by dispersed organizations (like non-hierarchical organizations), small...

  7. Criminal Justice History

    Directory of Open Access Journals (Sweden)

    Thomas Krause

    2005-01-01

    Full Text Available This review article discusses studies on the history of crime and the criminal law in England and Ireland published during the last few years. These reflect the ›history of crime and punishment‹ as a more or less established sub-discipline of social history, at least in England, whereas it only really began to flourish in the german-speaking world from the 1990s onwards. By contrast, the legal history of the criminal law and its procedure has a strong, recently revived academic tradition in Germany that does not really have a parallel in the British Isles, whose legal scholars still evidence their traditional reluctance to confront penal subjects.

  8. Pathological gambling and criminality.

    Science.gov (United States)

    Folino, Jorge Oscar; Abait, Patricia Estela

    2009-09-01

    To review research results on the relationship between pathological gambling and criminality, published in 2007 and 2008, in English and in Spanish. An important association between pathological gambling and criminality was confirmed in populations of anonymous gamblers, helpline callers and substance abusers. Helplines provide a timely service to gamblers who have not reached the maximum stages in the development of a pathological gambling pattern. Pathological gambling is associated with violence in couples and dysfunctional families. Inversely, violence is also an antecedent promoting vulnerability toward pathological gambling. Impulsiveness shows diverse relationships with pathological gambling and violence as well. A pathological gambler's involvement in crime is exceptionally considered without responsibility by justice, but it may be an indicator of the disorder severity and the need for special therapeutic tactics. While reviewing the present study, research work was published that contributed to a better understanding of the association between pathological gambling and criminality and went further into their complex relationship and the formulation of explanatory models related to impulsiveness.

  9. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  10. Personality-related determinants of criminal recidivism

    Directory of Open Access Journals (Sweden)

    Međedović Janko

    2012-01-01

    Full Text Available The goal of this study was to explore personality-related determinants of recidivism, with recidivism being defined as a the number of lawful sentences a person had (criminal legal recidivism, and b the number of prison sentences pronounced (penal recidivism. The study was carried out in two independent samples: a convicts from the Correctional Institution of Belgrade - Penitentiary of Padinska Skela (N=113, and b convicts from the Special Prison Hospital in Belgrade (N =112. The variables of the Five-Factor Model of Personality (Neuroticism, Extraversion, Openness, Agreeableness and Conscientiousness were measured, together with two additional basic personality traits: Disintegration (a broad dimension of psychosis-proneness, and Amorality (three factors representing a disposition to amoral forms of behavior. In addition, psychopathy (Manipulative and Antisocial tendencies - a psychological entity expected to most successfully predict criminal recidivism - was measured as well. The efficiency of prediction of the two criteria of recidivism was assessed separately in each of those two samples. The results revealed differences in the orchestration of predictors depending on the kind of recidivism as the criterion and the severity of offense. The most important predictors of both forms of recidivism in the sample of convicts with lower intensity of criminal behavior were psychopathic traits. However, in the sample of convicts with higher intensity and variety of criminal behavior, the most important predictors of the number of sentences were Antisociality and Amorality Induced by Frustration, while the most important predictors of the number of prison sanctions were Amorality Induced by Brutality and Disintegration. [Projekat Ministarstva nauke Republike Srbije, br. 47011: Criminality in Serbia: Phenomenology, Risks and Possibilities of Social Prevention i br. 179018: Identification, Measurement and Development of Cognitive and Emotional

  11. Criminal milieu and criminal phenomenon: Criminology and criminalistics aspects

    Directory of Open Access Journals (Sweden)

    Manojlović Dragan

    2015-01-01

    Full Text Available The authors goal in this work is to present a more innovative concept of research of criminal milieu and criminal phenomenon. He writes about achieved classification in the field of criminal milieu and criminal phenomenon, which are tightly connected with the corpus of criminal activities, or even, as some the opticians say, with crime, criminal organizations and criminal profit. Conceptual findings are disclosed, with special attention/accent to the complexity of criminal milieu and phenomena in it. Besides the classification, the paper also contains the elements which constitute/build certain types of criminal milieu, it's layering, structure of criminal phenomenon and how the structure of criminal milieu is sustained. It seems to the author that actual trends in criminal milieu research, within these borders, are still not promoted and presented enough in domestic literature, and the fact that the criminal milieu is the lifeline of criminal activities is a reason strong enough to encourage research in this unexplored field. Deciding to write for the first time, within these borders, an article about the criminal under world and crime, shows that I had no ide how much torment it would cause me. While writing, I met with difficulties interms of contextualization and conceptual definitions. It turns out that the identification and isolation of these institutes in criminology and criminological scientific thought, within these borders, to me is unexpectedly challenging and too complex theoretical demand for this work scope. However, I'm neither the first norther only one with this kind of problem. Every attempt of theoretical contribution to better understanding the concept of crime- and criminological thought is faced with a multitude of difficult questions. This however, does not mean that the attempts of scientific thinking and research of these complex institutes and attempts to determine them, are theoretically meaningless or impossible. The

  12. Review on emergency medical response against terrorist attack.

    Science.gov (United States)

    Wang, De-Wen; Liu, Yao; Jiang, Ming-Min

    2014-01-01

    Terrorism is a global issue and a constant international threat. As a result, anti-terrorism and emergency response strategies are tasks of critical importance that have a direct impact on the national security of every country in the world. This paper reviews new characteristics of international anti-terrorism measures and offers an in-depth reflection on emergency medical response countermeasures; additionally, this paper presents the goals of related research, which include: 1) to present a model of a highly efficient medical response command; 2) to introduce the pre-planning phases of the emergency medical response; 3) to establish a response system capable of handling various types of terror attacks; 4) to promote anti-terrorism awareness to the general public and emphasize its prevention; and 5) to continue basic investigations into emergency medical responses for various types of terrorist attacks (for example, the classifications and characteristics of new injuries, pathophysiology, prevention and treatment of the resultant stress disorders, improved high-efficiency medical response measures and equipment, etc.).

  13. 25 CFR 11.406 - Criminal coercion.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Criminal coercion. 11.406 Section 11.406 Indians BUREAU... ORDER CODE Criminal Offenses § 11.406 Criminal coercion. (a) A person is guilty of criminal coercion if... withhold action as an official, or cause an official to take or withhold action. (b) Criminal coercion is...

  14. International Criminal Law & Its Paradoxes

    DEFF Research Database (Denmark)

    Carlson, Kerstin Bree

    2017-01-01

    This article challenges international criminal tribunals' (ICTs) capacity to perform the socially constitutive work of transitional justice. Highlighting paradigmatic ICT jurisprudence, it shows both the "progress" and "justice" constructs central to the work and legitimacy of international...... criminal law are unrealizable under current ICT practice. This is due to international criminal law's foundational, legitimizing basis in natural law, rather than political liberalism. The article calls for a revision of ICT institutional accountability structures....

  15. Organization of preparatory criminal proceedings

    OpenAIRE

    Lukić Tatjana

    2011-01-01

    Our criminal law has been developing in the direction of democratization and respect of the minimum legal standards as a condition for an objective assessment of criminal offenses and the protection of human rights and the law does, more or less, like all social phenomena resist the rapid and radical change. The investigation, as part of criminal proceedings is undoubtedly the most important and also the most delicate part of the proceedings. The issue of different organization of the concept...

  16. Criminal Protection Of The Criminal Legal Proceedings Lawful Procedure

    Directory of Open Access Journals (Sweden)

    Elena V. Selina

    2014-09-01

    Full Text Available In the present article the problem of criminal code provisions on crimes against justice and changes which happened in the procedure of justice for criminal cases implementation since the beginning of judicial reform discrepancy is researched. In spite of the fact that in the considered segment the last changes were made rather recently (Federal Law of December 28, 2013 No. 432-FZ, in general this sphere of regulation is not complete. Due to the corpus delicti "Attraction of the obviously innocent to criminal liability" the concept of criminal prosecution is analyzed. In regard to this author characterize that only court can make a decision that person is guilty for the crime. The concept of legal responsibility as a need to undergo deprivations or at least condemnation for made (if authentically established offense corresponds to it. Author outlines that it is only possible to release one from of responsibility only if one is subject to responsibility. Today it is possible to included cases when consent of the person with the termination of criminal case and prosecution exists. It is proven that in the meaning of the article 299 of the Criminal Code of the Russian Federation criminal prosecution is told as attraction for being accused. But other forms of criminal prosecution are not considered in full. Author analyze contradictions between the title and disposition of the article 307 of the Criminal Code of the Russian Federation concerning punishability for criminal acts: title covers the conclusion and disposition – only indications. Elimination of this contradiction lies in the plane of the criminal procedure form of obtaining conclusion and indications development and gnoseological nature of the new type of proofs study.

  17. Criminal Law Study Guide (Revision)

    National Research Council Canada - National Science Library

    1998-01-01

    .... While exhaustive of neither topics discussed nor references cited, It does address fundamental concepts of criminal liability, Defenses, and pleading, as well as offenses most commonly encountered...

  18. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  19. Modeling Criminal Activity in Urban Landscapes

    Science.gov (United States)

    Brantingham, Patricia; Glässer, Uwe; Jackson, Piper; Vajihollahi, Mona

    Computational and mathematical methods arguably have an enormous potential for serving practical needs in crime analysis and prevention by offering novel tools for crime investigations and experimental platforms for evidence-based policy making. We present a comprehensive formal framework and tool support for mathematical and computational modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal activities in urban environments. The focus is on spatial and temporal aspects of different forms of crime, including opportunistic and serial violent crimes. However, the proposed framework provides a basis to push beyond conventional empirical research and engage the use of computational thinking and social simulations in the analysis of terrorism and counter-terrorism.

  20. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  1. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  2. Prison as a Criminal School:

    DEFF Research Database (Denmark)

    Gorinas, Cedric; Damm, Anna Piil

    We investigate peer effects on crime-specific recidivism using register data for the entire Danish prison population. We find that inmates strengthen criminal capital in prison due to exposure to offenders with the same field of specialisation (reinforcing peer effects). Our results accord...... are especially strong due to exposure to more experienced criminals and dropouts....

  3. Racial Profiling and Criminal Justice

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2011-01-01

    According to the main argument in favour of the practice of racial profiling as a low enforcement tactic, the use of race as a targeting factor helps the police to apprehend more criminals. In the following, this argument is challenged. It is argued that, given the assumption that criminals are c...

  4. Defendants' Rights in Criminal Trials.

    Science.gov (United States)

    Martin, Ralph C., II; Keeley, Elizabeth

    1997-01-01

    Reviews the protections afforded by the Constitution for defendants in criminal trials. These include the right to a jury trial (in cases of possible incarceration), an impartial jury, and the requirement of a unanimous verdict. Defends the use of plea bargaining as essential to an efficient criminal justice system. (MJP)

  5. Drug Use and Criminal Behavior

    Science.gov (United States)

    Fink, Ludwig; Hyatt, Murray P.

    1978-01-01

    An overview of addiction and crime is presented. Crimes of violence and sex crimes are contrasted with non-violent criminal behavior when drug-connected. It is suggested that alternative methods of dealing with drug abuse and criminal behavior be explored, and that several previously discarded methods be re-examined. (Author)

  6. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  7. The "FTO List" and Congress: Sanctioning Designated Foreign Terrorist Organizations

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    .... It centers on the list of terrorist groups that are formally designated by the Secretary of State pursuant to section 219 of the Immigration and Nationality Act, as amended under the Antiterrorism...

  8. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  9. An inappropriate tool: criminal law and HIV in Asia.

    Science.gov (United States)

    Csete, Joanne; Dube, Siddharth

    2010-09-01

    Asian countries have applied criminal sanctions widely in areas directly relevant to national HIV programmes and policies, including criminalization of HIV transmission, sex work, homosexuality and drug injection. This criminalization may impede universal access to HIV prevention and treatment services in Asia and undermine vulnerable people's ability to be part of the HIV response. To review the status of application of criminal law in key HIV-related areas in Asia and analyze its impact. Review of literature and application of human rights norms to analysis of criminal law measures. Criminal laws in the areas considered here and their enforcement, while intended to reduce HIV transmission, are inappropriate and counterproductive with respect to health and human rights. Governments should remove punitive laws that impede the HIV response and should ensure meaningful participation of people living with HIV, people who use illicit drugs, sex workers and men who have sex with men in combating stigma and discrimination and developing rights-centered approaches to HIV.

  10. Predicting criminality from child maltreatment typologies and posttraumatic stress symptoms

    Directory of Open Access Journals (Sweden)

    Ask Elklit

    2013-04-01

    Full Text Available Background: The associations between childhood abuse and subsequent criminality and posttraumatic stress disorder (PTSD are well known. However, a major limitation of research related to childhood abuse and its effects is the focus on one particular type of abuse at the expense of others. Recent work has established that childhood abuse rarely occurs as a unidimensional phenomenon. Therefore, a number of studies have investigated the existence of abuse typologies. Methods: The study is based on a Danish stratified random probability survey including 2980 interviews of 24-year-old people. The sample was constructed to include an oversampling of child protection cases. Building on a previous latent class analysis of four types of childhood maltreatment, three maltreatment typologies were used in the current analyses. A criminality scale was constructed based on seven types of criminal behavior. PTSD symptoms were assessed by the PC-PTSD Screen. Results: Significant differences were found between the two genders with males reporting heightened rates of criminality. Furthermore, all three maltreatment typologies were associated with criminal behavior with odds ratios (ORs from 2.90 to 5.32. Female gender had an OR of 0.53 and possible PTSD an OR of 1.84. Conclusion: The independent association of participants at risk for PTSD and three types of maltreatment with criminality should be studied to determine if it can be replicated, and considered in social policy and prevention and rehabilitation interventions.

  11. Predicting criminality from child maltreatment typologies and posttraumatic stress symptoms

    Science.gov (United States)

    Elklit, Ask; Karstoft, Karen-Inge; Armour, Cherie; Feddern, Dagmar; Christoffersen, Mogens

    2013-01-01

    Background The associations between childhood abuse and subsequent criminality and posttraumatic stress disorder (PTSD) are well known. However, a major limitation of research related to childhood abuse and its effects is the focus on one particular type of abuse at the expense of others. Recent work has established that childhood abuse rarely occurs as a unidimensional phenomenon. Therefore, a number of studies have investigated the existence of abuse typologies. Methods The study is based on a Danish stratified random probability survey including 2980 interviews of 24-year-old people. The sample was constructed to include an oversampling of child protection cases. Building on a previous latent class analysis of four types of childhood maltreatment, three maltreatment typologies were used in the current analyses. A criminality scale was constructed based on seven types of criminal behavior. PTSD symptoms were assessed by the PC-PTSD Screen. Results Significant differences were found between the two genders with males reporting heightened rates of criminality. Furthermore, all three maltreatment typologies were associated with criminal behavior with odds ratios (ORs) from 2.90 to 5.32. Female gender had an OR of 0.53 and possible PTSD an OR of 1.84. Conclusion The independent association of participants at risk for PTSD and three types of maltreatment with criminality should be studied to determine if it can be replicated, and considered in social policy and prevention and rehabilitation interventions. PMID:23626869

  12. Why Terrorists Overestimate the Odds of Victory 

    Directory of Open Access Journals (Sweden)

    Max Abrahms

    2012-10-01

    Full Text Available Terrorism is puzzling behavior for political scientists. On one hand, terrorist attacks generally hail from the politically aggrieved. On the other hand, a growing body of scholarship finds the tactic politically counterproductive. Unlike guerrilla attacks on military targets, terrorist attacks on civilian targets lower the odds of governments making  concessions. This article proposes and tests a psychological theory to account for why militant groups engage in terrorism, given the political costs of attacking civilians.

  13. Alternatives to retaliation in response to state sponsored terrorist attacks

    OpenAIRE

    Evans, Paul James

    2014-01-01

    Approved for public release; distribution is unlimited We consider a game played between a state sponsor of international terrorism, a terrorist organization and the victim of a terrorist attack. The state sponsor wishes to inflict as much damage to the victim as possible without risking retaliation. The victim state wishes to end these attacks as soon as possible, through non-retaliatory means if possible in order to avoid the penalty associated with retaliation. In this thesis we compare...

  14. Rethinking Conceptual Definitions of the Criminal Career and Serial Criminality.

    Science.gov (United States)

    Edelstein, Arnon

    2016-01-01

    Since Cesare Lombroso's days, criminology seeks to define, explain, and categorize the various types of criminals, their behaviors, and motives. This aim has theoretical as well as policy-related implications. One of the important areas in criminological thinking focuses chiefly on recidivist offenders who perform large numbers of crimes and/or commit the most dangerous crimes in society (rape, murder, arson, and armed robbery). These criminals have been defined as "habitual offenders," "professional criminals," "career criminals," and "serial offenders." The interest in these criminals is a rational one, given the perception that they present a severe threat to society. The main challenge in this area of research is a conceptual problem that has significant effects across the field. To this day, scholars have reused and misused titles to define and explain different concepts. The aim of this article is 3-fold. First, to review the concepts of criminal career, professional crime, habitual offenses, and seriality with a critical attitude on confusing terms. Second, to propose the redefinition of concepts mentioned previously, mainly on the criminal career. Third, to propose a theoretical model to enable a better understanding of, and serve as a basis for, further research in this important area of criminology. © The Author(s) 2015.

  15. CONCEPTUAL AGGREGATION OF CRIMINAL OFFENCES SEPARATION FROM COLLISION OF THE CRIMINAL LAW NORMS

    OpenAIRE

    Persidskis, Ainārs

    2017-01-01

    The topic of the paper is the conceptual aggregation of criminal offences separation from collision of the Criminal Law norms. The conceptual aggregation of criminal offences is the most difficult type of all multiplicity types of criminal offences. This research paper provides an overview of the conceptual aggregation of criminal offences separation from collision of the Criminal Law norms. In the paper is given analyses of conceptual aggregation of criminal offences separation from collisio...

  16. The reaction to femicide in criminal law

    Directory of Open Access Journals (Sweden)

    Batrićević Ana

    2016-01-01

    Full Text Available Misogynous and sexist violence against women, which often results in death, represents a global problem. Numerous international and national legal instruments are dedicated to the prevention and sanctioning of violence against women. However, the reality implies that existing mechanisms of penal reaction to femicide, as its most extreme and brutal form, should be re-examined. Having in mind the frequency and severe consequences of this criminal offence and the discriminatory character of the message that the state sends by tolerating it or inadequately punishing its perpetrators, the author attempts to define femicide, to present basic forms of state reaction to femicide in comparative law as well as to analyze the features of femicide as an independent criminal offence. Arguing for the incrimination of femicide as an independent criminal offence, or as a special form of aggravated murder, the author points out that such solution could contribute to more precise observation of this form of crime, to a better estimation of the quality of the state‘ s reaction to it and to its more efficient suppression.

  17. CRIMINAL PROTECTION OF PRIVATE LIFE

    Directory of Open Access Journals (Sweden)

    RADU SLAVOIU

    2012-05-01

    Full Text Available This study is meant, first of all, to analyze the incriminations that the new Romanian Criminal Code sets for the protection of a person’s private life as a social value of maximum significance both for the human being and for any democratic society as a whole.There are two criminal offences treated in this study that are not to be found in the current criminal legislation: violation of private life and criminal trespassing of a legal person’s property. Likewise, the study will bring forth the novelties and the differences regarding the offences of criminal trespassing of a natural person’s property, disclosure of professional secret, violation of secret correspondence, illegal access to computerized system and illegal interception of electronic data transfer – acts that when, directly or indirectly, committed can cause harm to the intimacy of a person’s life.As an expression of the interdisciplinary nature of this subject, the study also sets out, as a subsidiary aspect, an evaluation of the circumstances under which the new criminal proceeding legislation allows public authorities to interfere with an individual’s private life. Thus, the emphasis is on the analysis of the circumstances under which special surveillance and investigation techniques can be used as evidence proceedings regulated by the new Romanian Criminal Procedure Code.

  18. Constitutional collisions of criminal law

    Directory of Open Access Journals (Sweden)

    Sergey M. Inshakov

    2016-12-01

    Full Text Available Objective to identify and resolve conflicts between the norms of constitutional and criminal law which regulate the issue of legal liability of senior officials of the state. Methods formallogical systematic comparativelegal. Results the article analyzes the embodiment of the principle of citizensrsquo equality under the law regarding the criminal responsibility of the President of the Russian Federation as one of the segments of the elite right other criminal and legal conflicts are considered associated with the creation of conditions for derogation from the principle of equality. Basing on this analysis the means of overcoming collisions between the norms of constitutional and criminal law are formulated. Scientific novelty in the article for the first time it has been shown that in the Russian criminal law there are exceptions to the principle of citizensrsquo equality under the law relating to the President of the Russian Federation the conflicts are identified between the norms of constitutional and criminal law regulating the issue of legal liability of senior officials of the state ways of overcoming conflicts are suggested. Practical significance the main provisions and conclusions of the article can be used in research and teaching in the consideration of issues of senior state officialsrsquo criminal liability.

  19. Objective Truth Institution in Criminal Procedure

    Directory of Open Access Journals (Sweden)

    Voltornist O. A.

    2012-11-01

    Full Text Available The article deals with the category of objective truth in criminal procedure, its importance for correct determination of criminal court procedure aims. The author analyzes also the bill draft offered by the RF Committee of Inquiry “On amending in the RF Criminal Procedure Code due to the implementation ofobjective truth institution in criminal procedure”

  20. Criminal Law of the Enemy X Criminal Law Citizen

    Directory of Open Access Journals (Sweden)

    Déa Carla Pereira Nery

    2016-06-01

    Full Text Available The article analyzes the Criminal Law of the Enemy opposed to criminal law in the Citizen, emphasizing the need for the state to recognize the author of the fact tortious as an enemy that must be destroyed, but as an individual who presented a behavior that hurt the norm, not yet lost its status as citizens and their right to reintegrate into society.

  1. Debt as a Criminal Risk Factor in Denmark

    DEFF Research Database (Denmark)

    Olesen, Annette

    2016-01-01

    and informal punishment, as unintended consequences of indebtedness, were still poorly explored. This research indicates that legal regulation and informal punishment based on indebtedness may serve as an argument for considering debt as a criminal risk factor which has made the preventive factors less...

  2. Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action

    Directory of Open Access Journals (Sweden)

    Daniel P. Hepworth

    2013-04-01

    Full Text Available Many studies have been conducted to demonstrate the collective rationality of traditional terrorist groups; this study seeks to expand this and apply collective rationality to Islamic terrorist groups. A series of statistical analyses were conducted on terrorist attacks carried out by Al-Qaeda and affiliated terrorist organization; these were then compared to two more conventional terrorist groups: the Euskadi Ta Askatasuna (ETA and the Liberation Tigers of Tamil Eelam (LTTE. When viewed through the context of the groups’ various motivations and objectives, the results of these analyses demonstrates collective rationality for those terrorist groups examined. 

  3. Criminal Law Study Guide (Revision)

    National Research Council Canada - National Science Library

    1998-01-01

    .... Correct application of principles of military criminal law. This study guide is the is the primary text for students in the course and may be also useful to practicing judge advocates as a starting point for research...

  4. Criminal Aspects of Artificial Abortion

    OpenAIRE

    Hartmanová, Leona

    2016-01-01

    Criminal Aspects of Artificial Abortion This diploma thesis deals with the issue of artificial abortion, especially its criminal aspects. Legal aspects are not the most important aspects of artificial abortion. Social, ethical or ideological aspects are of the same importance but this diploma thesis cannot analyse all of them. The main issue with artificial abortion is whether it is possible to force a pregnant woman to carry a child and give birth to a child when she cannot or does not want ...

  5. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  6. Legal protection of victims under criminal law in the Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    Bačanović Oliver

    2008-01-01

    Full Text Available The author tried to outline the status of crime victims in Macedonian criminal and juvenile legislation by analyzing three legal texts referring to legal protection of victims under criminal law in the Republic of Macedonia (the Criminal Code, the Law on Criminal Procedure Act and the Law on Juvenile Justice. The basic questions which have been analyzed from the criminal substantial aspect include: the rights and interests of the victims as a consistent part of contemporary criminal policy and Criminal Code reforms, the elements of diversion model based on concept of restorative justice in criminal legislation and victimology aspects of some significant novelties in the special part of criminal law. In this article two dimensions dealing with a change of status of damaged person in criminal procedure of the Republic of Macedonia have been analyzed, while taking into consideration new trends and comparative experiences in this field. One dimension is the role of the damaged person and incorporation of elements of restorative justice in the criminal procedure, while the other dimension includes help and support of the victims and prevention of their secondary victimization. While analyzing suitable provisions of the Law on Juvenile Justice, the author focuses on its solutions that deserve more attention because of its innovations. The consequent realization of the concept on which this law is based on, and in which the victim, at the same time, has a significant role is another confirmation of the rule that the changes of juvenile legislation creates good basis for future reforms of criminal legislation regarding the adult offenders.

  7. 'Insane criminals' and the 'criminally insane': criminal asylums in Norway, 1895-1940.

    Science.gov (United States)

    Dahl, Hilde

    2017-06-01

    This article looks into the establishment and development of two criminal asylums in Norway. Influenced by international psychiatry and a European reorientation of penal law, the country chose to institutionalize insane criminals and criminally insane in separate asylums. Norway's first criminal asylum was opened in 1895, and a second in 1923, both in Trondheim. Both asylums quickly filled up with patients who often stayed for many years, and some for their entire lives. The official aim of these asylums was to confine and treat dangerous and disruptive lunatics. Goffman postulates that total institutions typically fall short of their official aims. This study examines records of the patients who were admitted to the two Trondheim asylums, in order to see if the official aims were achieved.

  8. Prevention

    Science.gov (United States)

    ... Error processing SSI file About Heart Disease & Stroke Prevention Heart disease and stroke are an epidemic in ... secondhand smoke. Barriers to Effective Heart Disease & Stroke Prevention Many people with key risk factors for heart ...

  9. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  10. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  11. Gambling and Impulsivity Traits: A Recipe for Criminal Behavior?

    Science.gov (United States)

    Mestre-Bach, Gemma; Steward, Trevor; Granero, Roser; Fernández-Aranda, Fernando; Talón-Navarro, María Teresa; Cuquerella, Àngel; Baño, Marta; Moragas, Laura; Del Pino-Gutiérrez, Amparo; Aymamí, Neus; Gómez-Peña, Mónica; Mallorquí-Bagué, Núria; Vintró-Alcaraz, Cristina; Magaña, Pablo; Menchón, José Manuel; Jiménez-Murcia, Susana

    2018-01-01

    Gambling disorder (GD) is a psychiatric condition that was recently recategorized as a non-substance-related addiction in the Diagnostic and Statistical Manual of Mental Health Disorders. Criminal activity is commonly associated with gambling; however, few empirical studies to date have examined sociodemographic and psychological variables in this population. In this study, we explored criminal behavior history in a sample of consecutively recruited treatment-seeking gamblers ( n  = 382) and compared subjects with a history of illegal acts ( n  = 103, 26.9%) to those with no criminal record ( n  = 279, 73.1%). Impulsivity and personality traits were specifically explored, along with other gambling-related severity factors. We found that gamblers who engaged in illegal activity were more likely to endorse high levels of urgency (i.e., the tendency to act out when experiencing heightened emotional states) and increased lack of premeditation. Gamblers with a history of criminal behavior also had greater GD severity levels and gambling-related debts. Additionally, these gamblers reported lower levels of self-directedness, which is characterized by difficulty in establishing and redirecting behavior toward one's goals. Likewise, gamblers who had conducted criminal acts showed a tendency to engage in greater risk-taking behavior. These results shed new light on this understudied population and provide insights for developing targeted harm-prevention interventions and treatment protocols.

  12. Gambling and Impulsivity Traits: A Recipe for Criminal Behavior?

    Directory of Open Access Journals (Sweden)

    Gemma Mestre-Bach

    2018-01-01

    Full Text Available Gambling disorder (GD is a psychiatric condition that was recently recategorized as a non-substance-related addiction in the Diagnostic and Statistical Manual of Mental Health Disorders. Criminal activity is commonly associated with gambling; however, few empirical studies to date have examined sociodemographic and psychological variables in this population. In this study, we explored criminal behavior history in a sample of consecutively recruited treatment-seeking gamblers (n = 382 and compared subjects with a history of illegal acts (n = 103, 26.9% to those with no criminal record (n = 279, 73.1%. Impulsivity and personality traits were specifically explored, along with other gambling-related severity factors. We found that gamblers who engaged in illegal activity were more likely to endorse high levels of urgency (i.e., the tendency to act out when experiencing heightened emotional states and increased lack of premeditation. Gamblers with a history of criminal behavior also had greater GD severity levels and gambling-related debts. Additionally, these gamblers reported lower levels of self-directedness, which is characterized by difficulty in establishing and redirecting behavior toward one’s goals. Likewise, gamblers who had conducted criminal acts showed a tendency to engage in greater risk-taking behavior. These results shed new light on this understudied population and provide insights for developing targeted harm-prevention interventions and treatment protocols.

  13. [Civil, criminal and ethical liability of medical doctors].

    Science.gov (United States)

    Udelsmann, Artur

    2002-01-01

    In the last years doctors have been the target of a growing number of civil, criminal law suits, as well as ethical procedures. Medicine is a widely targeted career, not only owing to its inherent risks, but also owing to a mistaken approach of the Judiciary Power about the obligations of medical doctors. Decisions of the Medical Board in ethical procedures have an impact in civil and criminal justice and therefore should be followed closely. The purpose of this review is to provide a wide view from a doctor-lawyer perspective of cases involving civil, criminal liability of anesthesiologists as well as ethical procedures against them, in an effort to make them comprehensible to doctors. After a brief historical introduction civil liability foundations and legal articles are examined. Responsibilities of doctors, hospitals and health insurance providers are discussed separately, as well as reparation mechanisms. Crimes possible to occur during medical practice and respective penalties are described; the direct relationship between crime and civil reparation is demonstrated. The administrative nature of ethical procedure is described, emphasizing that the legal character of its penalties often serve as grounds for civil and criminal justice decisions. Prevention is still the best medicine. Good medical practice and a good medical-patient relationship are still the best ways to minimize lawsuits and their repercussions. Doctors should have some knowledge of juridical mechanisms in lawsuits and ethical procedures, but should not take defense initiatives without prior consultation of an attorney. Civil, criminal and ethical liability of physicians.

  14. Counterinsurgency Meets Soft Power: An Alternative Approach to Deterring Terrorist Recruitment in Mindanao

    National Research Council Canada - National Science Library

    Smith, Jason; Stroh, Rieka; Williams, John

    2008-01-01

    Terrorist activity in Southeast Asia remains a challenge to U.S. national security. In particular, terrorist organizations in the Philippines continue to conduct deadly attacks and attract more recruits despite...

  15. Holy Terror, Batman! Frank Miller’s Dark Knight and the Superhero as Hardboiled Terrorist

    Directory of Open Access Journals (Sweden)

    Daniele Croci

    2016-05-01

    Full Text Available Conceived in the late thirties as “bold humanist response to Depression-era fears of runaway scientific advance and soulless industrialism” (Morrison 2012, 6, the superhero has flourished as one of the most resilient archetypes of American popular culture. This essay analyses the literary and cultural contaminations that have engendered an unprecedented revision of the paradigm since the 1980s. In particular, it will take into account three graphic novels by American cartoonist Frank Miller (1957 - , one of leading figures of the mainstream comics renaissance, whose ideas have indelibly influenced the artistic development of both medium and genre. The Dark Knight Returns (1986, The Dark Knight Strikes Again (2002 and Holy Terror (2011 constitute an ideal Batman trilogy that charts the character’s evolution as political counterpoint to the perceived crisis of American identity. In this regard, Reaganism and 9/11 are polarized as historical discontinuities triggering the need for a new kind of a criminal (superhero. It will be in fact demonstrated how the novels hybridise the latent generic links to hardboiled pulp novels (R. Chandler, D. Hammet with narrative and aesthetics elements appropriated from the culturally-received concepts of terrorism and terrorists. This fruitful contamination on the one hand “play[s] with reader assumptions about genre” (Baetens and Frey 2015, 46, while on the other hand deconstructs the ideological underpinnings of the archetype, as the moral dichotomy and the alienation of justice from the law.

  16. REFLECTION ON THE REVISION OF THE BOOK OF THE LAW OF CRIMINAL LAW AND LAW OF CRIMINAL PROCEDURE OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Marwan Mas

    2015-05-01

    Full Text Available The Principle of the plan revision or amendment Of the Criminal Law Act and LAW No. 8 of 1981 on the law of criminal procedure (Criminal Code is something that necessarily, because a number of judgments were not in accordance with the conditions of the present. Criminal Code which came into effect in 1915 during colonial times, many judgments which are not in line with people's lives today. For example, the ban showed, offering, or broadcast a preventive tool is pregnant, regulated in article 534 Criminal Code, although that provision had never been repealed as opposed to family planning programs. It's just that, those changes also should look at the reality of the needs of the community, particularly on corruption eradication efforts which should not be weakened. One of the crucial second revision of draft laws that are a number of provisions which could potentially undermine the spirit of the eradication of corruption, including the weakening of the authority of the corruption eradication Commission (KPK in dealing with corruption cases.

  17. [And if it happened to children? Adapting medical care during terrorist attacks with multiple pediatric victims].

    Science.gov (United States)

    Alix-Séguin, L; Lodé, N; Orliaguet, G; Chamorro, E; Kerroué, F; Lorge, C; Moreira, A

    2017-03-01

    In light of the recent terrorist attacks in Europe, we need to reconsider the organization of rescue and medical management and plan for an attack involving multiple pediatric victims. To ensure quick surgical management, but also to minimize risk for on-site teams (direct threats from secondary terrorist attacks targeting deployed emergency services), it is crucial to evacuate patients in a swift but orderly fashion. Children are vulnerable targets in terrorist attacks. Their anatomical and physiological characteristics make it likely that pediatric victims will suffer more brain injuries and require more, often advanced, airway management. Care of multiple pediatric victims would also prove to be a difficult emotional challenge. Civilian medical teams have adapted the military-medicine principles of damage control in their medical practice using the MARCHE algorithm (Massive hemorrhage, Airway, Respiration [breathing], Circulation, Head/Hypothermia, Evacuation). They have also learned to adapt the level of care to the level of safety at the scene. Prehospital damage control principles should now be tailored to the treatment of pediatric patients in extraordinary circumstances. Priorities are given to hemorrhage control and preventing the lethal triad (coagulopathy, hypothermia, and acidosis). Managing hemorrhagic shock involves quickly controlling external bleeding (tourniquets, hemostatic dressing), using small volumes for fluid resuscitation (10-20ml/kg of normal saline), quickly introducing a vasopressor (noradrenaline 0.1μg/kg/min then titrate) after one or two fluid boluses, and using tranexamic acid (15mg/kg over 10min for loading dose, maximum 1g over 10min). Prehospital resources specifically dedicated to children are limited, and it is therefore important that everyone be trained and prepared for a scene with multiple pediatric patients. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  18. Selection, Availability, and Opportunity: The Conditional Effect of Poverty on Terrorist Group Participation

    Science.gov (United States)

    Kavanagh, Jennifer

    2011-01-01

    Poverty is often identified as a determinant of terrorist group participation, but existing research reveals mixed support for this relationship. Some studies find that macroeconomic decline is associated with increased production of terrorists, but micro-level research suggests terrorists have above average socioeconomic status and educational…

  19. 77 FR 56515 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2012-09-12

    ... With Respect to Certain Terrorist Attacks Notice of September 11, 2012--Continuation of the National... the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of the... declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11...

  20. 78 FR 56579 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2013-09-12

    ... Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... to Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C..., in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing...

  1. 3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-01-01

    ... to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2009 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent... national emergency declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist...

  2. 76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2011-09-13

    ... With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies Act, 50 U.S.C. 1622(d... Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and...

  3. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  4. Criminal Policy Challenges under Conditions of Hybrid War: Some Issues and Solutions from Ukraine

    Directory of Open Access Journals (Sweden)

    Pysmenskyy Yevhen

    2016-12-01

    Full Text Available This article studies the specifics of national criminal policy implementation under the influence of extraordinary geopolitical factors on it. Such policy will be reviewed with Ukraine serving as an appropriate example. This country has been recently forced to adjust its own ways of implementation of the state policy against crime based on atypical modern challenges and threats. This refers to the special nature of a hybrid war, which has been actively fought on the territory of Ukraine since 2014. The author examines two key areas of criminal policy (definition of the limits of criminal behavior and establishing criminal law consequences of the committed offenses, implemented under the extraordinary circumstances of hybrid war. Symptomatic features of the hybrid form of foreign aggression are defined in the piece. At the same time, options of criminal law in combating and preventing such aggression are researched.

  5. Criminal Liability for Human Abduction​

    Directory of Open Access Journals (Sweden)

    Vyacheslav N. Voronin

    2017-08-01

    Full Text Available The Author considers the quality of the construction of the criminal law provision which is stipulated in article 126 of the Criminal Code of Russian Federation (Kidnapping. The Author signifies some application problems of the concerned article, researches judicial interpretations of the elements of crime characteristics and opinions of contemporary scientists who propose to redraft the article. The Author also analyses the law of Armenia, Belarus, Kyrgyzstan, Turkmenistan, Tajikistan and Latvia. On the basis of the research the Author concludes that a primitive disposition which doesn’t include elements of a criminal conduct doesn’t meet the requirements of legality and legal certainty, and, because of the above-mentioned reason, the Author proposes his own definition of the disposition of kidnapping.

  6. Neurologic disorder and criminal responsibility.

    Science.gov (United States)

    Yaffe, Gideon

    2013-01-01

    Sufferers from neurologic and psychiatric disorders are not uncommonly defendants in criminal trials. This chapter surveys a variety of different ways in which neurologic disorder bears on criminal responsibility. It discusses the way in which a neurologic disorder might bear on the questions of whether or not the defendant acted voluntarily; whether or not he or she was in the mental state that is required for guilt for the crime; and whether or not he or she is deserving of an insanity defense. The discussion demonstrates that a just determination of whether a sufferer from a neurologic disorder is diminished in his or her criminal responsibility for harmful conduct requires equal appreciation of the nature of the relevant disorder and its impact on behavior, on the one hand, and of the legal import of facts about the psychologic mechanisms through which behavior is generated, on the other. © 2013 Elsevier B.V. All rights reserved.

  7. Complicity in International Criminal Law

    DEFF Research Database (Denmark)

    Aksenova, Marina

    2014-01-01

    Complicity is a criminal law doctrine that attributes responsibility to those who do not physically perpetrate the crime. It is an essential mode of liability for core international crimes because it reaches out to senior political and military leadership. These persons do not usually engage...... in direct offending, yet in the context of mass atrocities they are often more culpable than foot soldiers. The Statutes of the ad hoc tribunals, hybrid courts and the International Criminal Court expressly provide for different forms of complicity, and domestic legal systems recognize it in one form...... or another. This is in contrast with alternative modes of liability implied from the Statutes to address the situations with multiple accused removed from the scene of the crime / (in)direct co-perpetration, extended perpetration and the joint criminal enterprise....

  8. Vertical HIV transmission should be excluded from criminal prosecution.

    Science.gov (United States)

    Csete, Joanne; Pearshouse, Richard; Symington, Alison

    2009-11-01

    Prevention of mother-to-child transmission of HIV (PMTCT) is an important part of global and national responses to HIV and AIDS. In recent years, many countries have adopted laws to criminalise HIV transmission and exposure. Many of these laws are broadly written and have provisions that enable criminal prosecution of vertical transmission in some circumstances. Even if prosecutions have not yet materialised, the use of these laws against HIV-positive pregnant women could compound the stigma already faced by them and have a chilling effect on women's utilisation of prevention of mother-to-child transmission programmes. Although criminal laws targeting HIV transmission have often been proposed and adopted with the intent of protecting women, such laws may disadvantage women instead. Criminal laws on HIV transmission and exposure should be reviewed and revised to ensure that vertical transmission is explicitly excluded as an object of criminal prosecution. Scaling up PMTCT services and ensuring that they are affordable, accessible, welcoming and of good quality is the most effective strategy for reducing vertical transmission of HIV and should be the primary strategy in all countries.

  9. Terrorist Use of the Internet: The Real Story

    Science.gov (United States)

    2007-01-01

    majority of cyber attacks , even viruses that cause billions of dollars of damage to an economy, are not going to cause the levels of fear desired by...influence operations. Terrorists use the Internet to harm U.S. national security interests, but not by conduct- ing large-scale cyber attacks . Instead

  10. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...intersection of prisoner reentry and civil society” are the issues of “public health, families and children, employment, housing and homelessness , youth

  11. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  12. [Preclinical and intrahospital management of mass casualties and terrorist incidents].

    Science.gov (United States)

    Franke, A; Bieler, D; Friemert, B; Kollig, E; Flohe, S

    2017-10-01

    Due to the recent terrorist attacks in Paris, Brussels, Ansbach, Munich, Berlin and more recently Manchester and London, terrorism is realized as a present threat to our society and social life, as well as a challenge for the health care system. Without fueling anxiety, there is a need for sensitization to this subject and to familiarize all concerned with the special kind of terrorist attack-related injuries, the operational priorities and tactics and the individual basic principles of preclinical and hospital care. There is a need to adapt the known established medical structure for a conventional mass casualty situation to the special requirements that are raised by this new kind of terrorist threat to our social life. It is the aim of this article, from a surgical point of view, to depict the tactics and challenges of preclinical care of the special kind of terrorist attack-related injuries from the site of the incident, via the advanced medical post or casualty collecting point, to the triage point at the hospital. The special needs of medical care and organizational aspects of the primary treatment in the hospital are highlighted and possible decisional options and different approaches are discussed.

  13. Nigeria as a Potential Terrorist Haven Explaining the Convergence ...

    African Journals Online (AJOL)

    Is Nigeria a possible terrorist haven? This article aims to answer this question from two perspectives: international and domestic terrorism. From the perspective of international terrorism and in the standpoint of Western liberalism, for a foreseeable future Nigeria cannot be a haven for terrorism. This is the impossibility ...

  14. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  15. An Analysis of Modern State-Level Terrorist Deradicalization Campaigns

    Science.gov (United States)

    2012-12-01

    of achieving temporary 68 disengagement through instant gratification , Det 88’s use of selective incentives achieves its desired effects. The...convince individuals to renounce their radical beliefs. However, this program works through the Internet . This program uses credible religious personnel...they all seek to moderate violent behavior of the individual terrorist through immediate gratification and material compensation. These mechanisms

  16. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  17. Threat Barometer. Ten Years of Terrorist Threat Assessment Netherlands

    NARCIS (Netherlands)

    Bakker, E.; Roy, de van Zuijdewijn J.

    2015-01-01

    In this essay, which was commissioned by the NCTV to mark the occasion of the conference “Threat Barometer. Ten years of Terrorist Threat Assessments for the Netherlands 2005-2015”, we address this and other aspects of the DTN and consider how this instrument has developed over the past decade. We

  18. Queen leads tributes to nurses in wake of terrorist attacks.

    Science.gov (United States)

    Allen, Daniel

    2017-06-15

    The Queen and the prime minister led tributes to nurses and other NHS staff caring for people injured in the recent terrorist attacks in Manchester and London. Emergency services worked through the night to assist in the immediate aftermath of the explosion at the Manchester arena, which killed 22 people and left many more injured, who were treated at hospitals across the city.

  19. [The hospital care of victims of terrorist attacks].

    Science.gov (United States)

    Bouhaddou, Assena; Nion, Nathalie; Riou, Bruno; Blandeau, Fanny; Moreau, Pilar; Guemache, Sofia

    2017-04-01

    The treatment of victims of terrorist attacks in a trauma centre requires the putting in place of plans, training and simulation exercises. Previous experiences have highlighted the areas which require improvement. As exceptional health situations are unpredictable, it is essential to always be vigilant and prepared for an unforeseen event. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  20. Are Risk Assessments of a Terrorist Attack Coherent?

    Science.gov (United States)

    Mandel, David R.

    2005-01-01

    Four experiments examined 3 types of violations of coherence criteria in risk assessments of a terrorist attack. First, the requirement that extensionally equivalent descriptions be assigned the same probability (i.e., additivity) was violated. Unpacking descriptions of an attack into subtypes led to an increase in assessed risk. Second,…

  1. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  2. The European Union and National Criminal Law

    DEFF Research Database (Denmark)

    Greve, Vagn

    1995-01-01

    Beware of Punishment. Annika Snare (ed.) Beware of Punishment. On the Utility and Futility of Criminal Law......Beware of Punishment. Annika Snare (ed.) Beware of Punishment. On the Utility and Futility of Criminal Law...

  3. International Criminal Procedure: Principles and Rules

    NARCIS (Netherlands)

    Sluiter, G.; Friman, H.; Linton, S; Vasiliev, S.V.; Zappalà, S.

    2013-01-01

    Identifies and crystallizes the rules and principles of international criminal procedure, based on painstaking analysis of existing case law and practice Provides a comprehensive overview of the procedural law of international criminal tribunals from Nuremberg to the recently established Cambodian

  4. Defence counsel in international criminal law

    NARCIS (Netherlands)

    Temminck Tuinstra, J.P.W.

    2009-01-01

    The field of international criminal law is relatively new and rapidly developing. This dissertation examines whether international criminal courts enable defence counsel to conduct an effective defence. When the International Criminal Tribunals for the former Yugoslavia and Rwanda (the ad hoc

  5. 32 CFR 1801.52 - Criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1801.52 Criminal penalties. (a) Unauthorized disclosure. Criminal penalties may be imposed against any officer or employee of NACIC who, by virtue of... 32 National Defense 6 2010-07-01 2010-07-01 false Criminal penalties. 1801.52 Section 1801.52...

  6. International criminal trials: A normative theory

    NARCIS (Netherlands)

    Vasiliev, S.

    2014-01-01

    Among the numerous works on international criminal procedure, there has been no study focusing on the international criminal trial as a socio-legal phenomenon and a phase of international criminal proceedings. This book seeks to cover this gap by systematically examining and analyzing the nature and

  7. PROCEDURAL ASPECTS REGARDING CORRUPTION CRIMES AS STIPULATED IN THE CRIMINAL CODE OF LAW AND LAW NO. 78/2000

    Directory of Open Access Journals (Sweden)

    Anca Lelia Lorincz

    2012-11-01

    Full Text Available The intensification of the European political and economic integration also requires that our country contributes to continuing the tradition of incriminating criminal deeds perpetrated in the business field. Romanian authorities display their constant interest in expanding their knowledge of the crime phenomenon in this field, while looking to identify effective means to control it. Within this context, corruption crimes approached in the Criminal Code of Law and in Law no. 78/2000 take a distinct place within the group of crimes for which prevention and combating is regulated under the Business Criminal Code of Law. In order to ensure celerity in solving criminal cases involving corruption crimes, certain derogations from the usual procedure were required, as well as enforcement of a special procedure; also, specific procedural aspects regarding corruption crimes need to be retained as we look at the coming into force of the new criminal and criminal procedure legislation.

  8. Women Behind Terrorists (Religiousity, Self Adaptation and Husband-Wife Relationship within Suspected Terrorists Family in Pekalongan

    Directory of Open Access Journals (Sweden)

    Maghfur Maghfur

    2013-12-01

    Full Text Available Women and their religiosity are questioned along with the proliferation of conflict, violence, and religion-based riots which allegedly involving ‘husband’  suspected  terrorists. This article discusses the religiosity of the wives, the adjustment of wives of suspected terrorists against psychological and social burden, and the patterns of marital relations of terrorist suspects in Pekalongan-Central Java. The result of this phenomenological study revealed that the religiosity of terrorist-suspects’ wives are more dominant is exclusive patterned- if it is compared to moderate or inclusive ones. In terms of adjustment, the wives are just accept the fate and tend to be indifferent to the activities of their husbands. The wives also nullifying the public’s negative perception and judgment, but some are closed to the social interaction. While the pattern of relationships that were frequently built tent to be more owner property and head-complement in characteristics. Wives are positioned as husband’s complement for all activities in the fields of social, religious and political.

  9. Prevention

    Science.gov (United States)

    ... Contact Aging & Health A to Z Find a Geriatrics Healthcare Professional Medications & Older Adults Making Your Wishes ... Prevention Hearing Loss Heart Attack High Blood Pressure Nutrition Osteoporosis Shingles Skin Cancer Related News Quitting Smoking, ...

  10. Public health preparedness for maritime terrorist attacks on ports and coastal waters.

    Science.gov (United States)

    Wassel, John J

    2008-01-01

    To assess the risk of mass casualties and necessary public health and provider preparation relating to maritime terrorist attacks on the US ports. Articles were obtained by searching PubMed database, Google, and Google Scholar search engines using terms such as "maritime security," "maritime terrorism,"port security," "terrorist attacks on the U.S. ports," "terrorist nuclear attacks," "terrorist attacks on liquefied natural gas tankers," and "terrorist attack on high occupancy ships." U.S. ports and coastal waters. Seventy-six journal articles were reviewed. Morbidity and mortality high for nuclear terrorist attack; mortality low but morbidity potentially high for radiological attacks. It would be more difficult for terrorist attack on natural gas tankers to cause high mortality and/or morbidity.

  11. Professionalism Among Criminal Justice Educators.

    Science.gov (United States)

    Regoli, Robert M.; Miracle, Andrew W., Jr.

    Professionalism and its relationship to scholarly productivity was studied. Specific areas of analysis were the degree of professionalism of criminal justice educators, rankings of a series of selected publications, and the relationship between professionalism level and journal productivity. Data were derived from responses by 1,028 of 1,274…

  12. Cultural Cleavage and Criminal Justice.

    Science.gov (United States)

    Scheingold, Stuart A.

    1978-01-01

    Reviews major theories of criminal justice, proposes an alternative analytic framework which focuses on cultural factors, applies this framework to several cases, and discusses implications of a cultural perspective for rule of law values. Journal available from Office of Publication, Department of Political Science, University of Florida,…

  13. Possibilities for improvement of the position of victims of trafficking in people within criminal procedure

    Directory of Open Access Journals (Sweden)

    Škulić Milan Z.

    2002-01-01

    Full Text Available In this paper main possibilities for improvement of the position of victims of trafficking in people within criminal procedure are discussed. The special focus of the analysis is on the issues regarding theoretical base for improvement of the position of victim in criminal procedure. Also, the analysis of international documents related to the protection of victims within criminal procedure, review of laws which allow for organized crime to be proved easier and of legal possibilities (within Yugoslav and comparative law for prevention of secondary victimization, i.e. for protection of victims, is done.

  14. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  15. The application of informal measures in juvenile Criminal Law of Serbia

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2014-01-01

    Full Text Available The new juvenile criminal justice system of the Republic of Serbia completely follows the goals of criminal policy - i.e. education and re-education of juvenile perpetrators of criminal offences. In that way, the preventive character of this branch of law is particularly emphasized. In theory, it is pointed out that juvenile criminal sanctions are primarily measures of assistance and socialization, with a minimal amount of coercion, limitations of rights and freedoms or repression and a high level of assistance, care, supervision and prevention, designed to remove the obstacles for normal and regular development and maturation of juveniles. Such concept is in accordance with a series of international and European standards on the treatment of juveniles in conflict with the law. However, along with and instead of juvenile criminal sanctions, modern criminal legislations are also familiar with different informal measures, application of which is recommended whenever it is possible to avoid the regular course of criminal procedure. These measures include educational orders, guidelines, bans or recommendations the aim of which is to avoid or postpone the conduct of criminal procedure against juvenile offenders. The application of these measures in supposed to replace the criminal procedure against juvenile offenders with procedures prescribed in other branches of law such as family law or social welfare law. The most significant innovation in the field of juvenile criminal justice system is the introduction informal or alternative measures, defined in the form of educational orders (recommendations or guidelines. Perceived and defined in such manner, the replacement of criminal procedure refers to various means, measures and procedures that are intended to protect juvenile offenders from harmful effects of court and criminal sanctions. Educational orders represent specific measures that do not have the character of criminal sanctions. One or more

  16. Money Laundering. Aspects of Legal and Criminal Issues

    Directory of Open Access Journals (Sweden)

    Alina DUMITRACHE

    2011-11-01

    Full Text Available This study aims at analyzing objectively various techniques and methods of money laundering, both in classical and modern ways, by presenting case studies from the legal practice in Romania, in an attempt to clarify a number of issues related to the complexity of this crime, current and future tendencies of financial criminals for laundering proceeds of crime. Also, according to the analysis of comparative law performed in the last chapter, we highlighted a number of similarities and differences between the Romanian legislation and the legislative laws of other states, surprising the forms and effects of money laundering on the studied national systems as well as highlighting the measures for preventing and fighting against these crimes adopted by the analyzed legal systems. The comparative approach of the criminal and legal framework of preventing and combating money laundering is essential for the Romanian legal system efficiency in this matter.

  17. STRUGGLE AGAINST ORGANIZED CRIMINALITY AND CORRUPTION AS SAFETY CONDITION FOR NORT-CAUCASIAN FEDERAL DISTRICT

    Directory of Open Access Journals (Sweden)

    G. V. Startsev

    2011-01-01

    Full Text Available In order to address the problem of safety in the North Caucasian region, suppression of underground gangs’ subversive and terroristic activities have been continuously undertaken for quite a long time within the frames of the military force strategy. Since interrelation of these gangs with common criminal and corruption groups and individuals were not taken into account, the suppression has not proved to be effective. Data cited in the article demonstrate a high level of criminality in this region. Inefficiency is also characteristic for means and ways used by law enforcement bodies in their struggle with organized criminality and corruption obviously resulting in negative influence on the whole system of counteractions with respect of terrorism. There is another essential problem specific in particular to the North Caucasian region, the problem of clans reigning in state, power and other bodies. Solution of tasks put force by the Russian Federation President will make it possible to considerably improve the existing terrorism counteraction policy in the North Caucasian region of Russia.

  18. Forensic geoscience: applications of geology, geomorphology and geophysics to criminal investigations

    Science.gov (United States)

    Ruffell, Alastair; McKinley, Jennifer

    2005-03-01

    One hundred years ago Georg Popp became the first scientist to present in court a case where the geological makeup of soils was used to secure a criminal conviction. Subsequently there have been significant advances in the theory and practice of forensic geoscience: many of them subsequent to the seminal publication of "Forensic Geology" by Murray and Tedrow [Murray, R., Tedrow, J.C.F. 1975 (republished 1986). Forensic Geology: Earth Sciences and Criminal Investigation. Rutgers University Press, New York, 240 pp.]. Our review places historical development in the modern context of how the allied disciplines of geology (mineralogy, sedimentology, microscopy), geophysics, soil science, microbiology, anthropology and geomorphology have been used as tool to aid forensic (domestic, serious, terrorist and international) crime investigations. The latter half of this paper uses the concept of scales of investigation, from large-scale landforms through to microscopic particles as a method of categorising the large number of geoscience applications to criminal investigation. Forensic geoscience has traditionally used established non-forensic techniques: 100 years after Popp's seminal work, research into forensic geoscience is beginning to lead, as opposed to follow other scientific disciplines.

  19. Exploring gender issues in the development from conduct disorder in adolescence to criminal behaviour in adulthood.

    Science.gov (United States)

    Kjelsberg, Ellen; Friestad, Christine

    2009-01-01

    Using results from a large Norwegian follow-up study of former adolescent psychiatric in-patients we have traced the progression from mental disorders requiring hospitalisation in adolescence to registered criminal behaviour in adulthood, particularly highlighting gender differences. A nationwide representative sample of 1095 adolescent psychiatric inpatients (46% females) was followed up 15-33 years after admission to the National Centre for Child and Adolescent Psychiatry in Oslo, Norway. In adolescence 45% fulfilled the DSM-IV criteria for a disruptive behaviour disorder. At follow-up, 63% of the males and 39% of the females had a criminal record. Among females, psychoactive substance use disorder in adolescence seemed to be a sine qua non for later registered criminality, with intravenous drug use a potent risk factor for life-course-persistent criminality. The same strong association between drug use and criminality was not found in males. Factor analysis demonstrated that while the DSM-IV Conduct Disorder criteria structure was similar across genders, the prevalence of the various forms of expression was different in males and females. The differences between individuals with violent and non-violent crimes were more substantial in males than in females. There were marked gender differences in the criminal profiles observed, with the females' criminal career developing in a less serious manner than in males: females had later criminal debut, a lower number of acts on record, less diverse criminal behaviour, and an escalation in the severity of offences over time was less frequently encountered. However, secular trend analyses indicated that gender differences had diminished over the last several decades, with females "catching up" with their male counterparts. Overall, the results demonstrated important qualitative and quantitative gender differences in the criminal behaviour of former adolescent psychiatric in-patients. The results may be of use in prevention.

  20. Prevention

    DEFF Research Database (Denmark)

    Halken, S; Høst, A

    2001-01-01

    , breastfeeding should be encouraged for 4-6 months. In high-risk infants a documented extensively hydrolysed formula is recommended if exclusive breastfeeding is not possible for the first 4 months of life. There is no evidence for preventive dietary intervention neither during pregnancy nor lactation...... populations. These theories remain to be documented in proper, controlled and prospective studies. Breastfeeding and the late introduction of solid foods (>4 months) is associated with a reduced risk of food allergy, atopic dermatitis, and recurrent wheezing and asthma in early childhood. In all infants....... Preventive dietary restrictions after the age of 4-6 months are not scientifically documented....

  1. THE CHILD OFFENDER UNDER THE AGE OF CRIMINAL LIABILITY

    OpenAIRE

    Niculina KARACSONY

    2015-01-01

    At European level crime among children represents a contemporary issue and in Romania, the philosophy of the new penal code approved by Law No 286/2009 is shaped around punishment. Prevention policy in Romania and juvenile justice objectives relative to age criteria outlines two different legal manners to address children's liability under the law. One is targeting the category of children between 0 and 14 years of age, which consideres the absolute inability of criminal responsibility and on...

  2. Criminalizing rape within marriage: perspectives of Ghanaian university students.

    Science.gov (United States)

    Adinkrah, Mensah

    2011-09-01

    Forcing sexual intercourse on an unwilling marital partner, or marital rape, is not a crime in many societies around the world, because of a marital exemption rule that prohibits the prosecution of husbands who rape their wives. Concurrently, marital rape is one of the least studied phenomena in sexual violence research. This is particularly true for societies in the non-Western world. The current study examined the general attitudes of a sample of university students in Ghana, a West African country, toward marital rape. Respondents were also asked whether an ongoing legislative effort to criminalize marital rape in the country was warranted. The results indicated strong opposition toward criminalization. The results also indicated no marked differences between male and female respondents in attitudes toward marital rape and the need for a legislative response to the phenomenon. Patriarchal ideologies such as wifely submission to the husband and an implicit duty to provide sex in marriage provided some of the justifications furnished for why marital rape should remain noncriminalized. Advocates of criminalization mentioned the social, physical, and psychological effects of rape and how the enactment of marital rape legislation and the imposition of severe criminal sanctions would help prevent the incidence of marital rape and other forms of violence against women in the society.

  3. Understanding criminal behavior: Empathic impairment in criminal offenders.

    Science.gov (United States)

    Mariano, Melania; Pino, Maria Chiara; Peretti, Sara; Valenti, Marco; Mazza, Monica

    2017-08-01

    Criminal offenders (CO) are characterized by antisocial and impulsive lifestyles and reduced empathy competence. According to Zaki and Ochsner, empathy is a process that can be divided into three components: mentalizing, emotional sharing and prosocial concern. The aim of our study was to evaluate these competences in 74 criminal subjects compared to 65 controls. The CO group demonstrated a lower ability in measures of mentalizing and sharing, especially in recognizing the mental and emotional states of other people by observing their eyes and sharing other people's emotions. Conversely, CO subjects showed better abilities in prosocial concern measures, such as judging and predicting the emotions and behavior of other people, but they were not able to evaluate the gravity of violations of social rules as well as the control group. In addition, logistic regression results show that the higher the deficits in the mentalizing component are, the higher the probability of committing a crime against another person. Taken together, our results suggest that criminal subjects are able to judge and recognize other people's behavior as right or wrong in a social context, but they are not able to recognize and share the suffering of other people.

  4. Criminality or Monopoly?

    DEFF Research Database (Denmark)

    Vigneswaran, Darshan; Araia, Tesfalem; Hoag, Colin Brewster

    2010-01-01

    Zimbabwean displacement has significant implications for the evolution of state forms in Southern Africa. In South Africa, Zimbabwean migrants’ claims to residence confront exclusionary immigration laws. The South African government officials who are responsible for enforcing these laws have helped...... migrants to circumvent protocols and procedures while simultaneously overstepping the bounds of their authority to prevent migrants from entering the nation’s borders and residing within. Drawing upon a range of ethnographic and survey data, this study explores these two tendencies in government efforts...... dynamic: the state’s monopolisation of legitimate movement. The ‘state’ is not being captured but is helping to generate parallel and informal orders alongside conventional immigration law....

  5. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  6. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  7. [Blasting damage in manmade disasters and terrorist attacks].

    Science.gov (United States)

    Shapovalov, V M; Samokhvalov, I M

    2012-01-01

    In the present case of explosive injuries in peacetime, when suddenly there are usually accidental or intentional explosions methane in mines, tanks with gas or explosives, fuel tanks or gas content, gas tanks, gas pipelines, product pipelines, as well as the explosion of military ordnance--grenades, mines, fuses, shells, and accidentally found child or maliciously used by terrorists. Collected statistical data on manmade disasters in coal mines and explosive injuries in terrorist attacks, the physical parameters of which were able to identify only approximately and type of damage incurred,mostly multiple and combinative combined and presented significant challenges in health care. The reasons and circumstances of the explosion in peacetime, gave a detailed description of the damaging factors, mechanisms, and characteristics arise from injuries suffered in the blast injuries. We describe the pathogenesis of blast injury, basic and clinical manifestations of lesions in the explosions.

  8. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  9. Burdens on emergency responders after a terrorist attack in Berlin.

    Science.gov (United States)

    Wesemann, U; Zimmermann, P; Mahnke, M; Butler, O; Polk, S; Willmund, G

    2018-02-16

    Terrorist attacks induce various responses in emergency responders. Addressing this range of responses in individual workers is of central interest. To assess the gender- and occupation-specific effects of a terrorist attack, particularly in emergency responders. This was a pilot study. Emergency responders present during the 2016 terrorist attack at Breitscheidplatz in Berlin were asked to participate. Measures for crisis management had been previously implemented. Stress (Patient Health Questionnaire [PHQ]), quality of life (The World Health Organization Quality of Life [WHOQOL-BREF]), post-traumatic stress disorder (PTSD Checklist for DSM-5 [PCL-5]) and current psychological symptoms (Brief Symptom Inventory [BSI]) were assessed. Thirty-seven subjects were included, 11 female and 26 male. The occupational groups included 16 firefighters, six police officers, five psychosocial health care personnel and nine members of aid organizations. Three months after the attack, female workers showed higher scores in stress and paranoid ideation, police officers showed higher scores in hostility and firefighters scored lower quality of life in environment and physical health. The mental health burden identified in this study plays an important role for emergency responders after terrorist attacks. Differences between occupational groups may be attributable to differences in tasks that responders perform during acute incidents. The presence of these differences 3 months after the incident suggests that these are at least medium-term conditions. This study may inform the development of treatments and policies and it thus recommended to develop a multi-level assessment and treatment programme that is gender- and occupation-specific. © The Author(s) 2017. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  10. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  11. Evolution of Terrorist Network using Clustered approach: A Case study

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2011-01-01

    In the paper we present a cluster based approach for terrorist network evolution. We have applied hierarchical agglomerative clustering approach to 9/11 case study. We show that, how individual actors who are initially isolated from each other are converted in small clusters and result in a fully...... evolved network. This method of network evolution can help intelligence security analysts to understand the structure of the network....

  12. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  13. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  14. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  15. The pattern of thoracic trauma after suicide terrorist bombing attacks.

    Science.gov (United States)

    Bala, Miklosh; Shussman, Noam; Rivkind, Avraham I; Izhar, Uzi; Almogy, Gidon

    2010-11-01

    The worldwide escalation in the volume of suicide terrorist bombing attacks warrants special attention to the specific pattern of injury associated with such attacks. The goal of this study was to characterize thoracic injuries inflicted by terrorist-related explosions and compare pattern of injury to penetrating and blunt thoracic trauma. Prospectively collected database of patients with chest injury who were admitted to Hadassah Hospital Level I trauma centre, in Jerusalem, Israel, from October 2000 to December 2005. Patients were divided into three groups according to the mechanism of injury: terrorist explosions (n = 55), gunshot wounds (GSW; n = 78), and blunt trauma (n = 747). There were many female victims after suicide bombing attacks (49.1%) compared with GSW (21.8%) and blunt trauma (24.6%; p = 0.009). The number of body regions injured was significantly higher in the terror group compared with the GSW and blunt groups (median, 4, 2, and 3, respectively, p attacks was caused by a unique combination of the effects of the blast wave and penetrating shrapnel. More than half (52.7%) of the terror victims suffered from lung contusion and 25 (45.5%) required tube thoracostomy. Five patients (9.1%) underwent thoracotomy for lung lacerations (n = 3), injury to great vessels (n = 2), cardiac lacerations (n = 1), and esophageal injury (n = 1). Penetrating shrapnel was the mechanism of injury in all these cases. Injury inflicted by terrorist bombings causes a unique pattern of thoracic wounds. Victims are exposed to a combination of lung injury caused by the blast wave and penetrating injury caused by metallic objects.

  16. Emotional intelligence and criminal behavior.

    Science.gov (United States)

    Megreya, Ahmed M

    2015-01-01

    A large body of research links criminality to cognitive intelligence and personality traits. This study examined the link between emotional intelligence (EI) and criminal behavior. One hundred Egyptian adult male offenders who have been sentenced for theft, drug dealing or murder and 100 nonoffenders were administered the Bar-On Emotional Quotient Inventory (EQ-i). The offenders had lower levels of EI than the nonoffenders. In addition, EI varied as a function of the types of offenses. Namely, it decreased in magnitude with crime severity (lowest for murder, higher for drug dealing, and highest for theft). These results converged with the direct/ indirect aggression theory suggesting that indirect aggression requires more social intelligence than physical aggression. Forensic intervention programs should therefore include EI training, especially when violence is involved. © 2014 American Academy of Forensic Sciences.

  17. Childhood antecedents of incarceration and criminal justice involvement among homeless veterans.

    Science.gov (United States)

    Tsai, Jack; Rosenheck, Robert A

    2013-10-01

    Although criminal justice involvement and incarceration are common problems for homeless veterans, few studies have examined childhood risk factors for criminal justice involvement among veterans. This study examined the association between three types of childhood problems, family instability, conduct disorder behaviors, and childhood abuse, and criminal justice involvement and incarceration in adulthood. Data from 1,161 homeless veterans across 19 sites participating in the Housing and Urban Development-Veterans Affairs Supportive Housing program were examined. After controlling for sociodemographics and mental health diagnoses, veterans who reported more conduct disorder behaviors during childhood tended to report more criminal charges of all types, more convictions, and longer periods of incarceration during adulthood. However, the variance explained in criminal behavior by childhood was not large, suggesting that there are other factors that affect the trajectory by which homeless veterans become involved in the criminal justice system. Further research is needed to intervene in the pathway to the criminal justice system and guide efforts to prevent incarceration among veterans. Published 2013. This article is a U.S. Government work and is in the public domain in the USA.

  18. Warranties of Albanian criminal law for children protection from “pornography”

    Directory of Open Access Journals (Sweden)

    Marilda Menkshi

    2016-11-01

    Full Text Available This paper will focus on the Analysis of current Albanian Criminal Law regarding criminal acts of pornography. This paper will analyze Albanian Criminal Law, under the perspective of the Convention on the Rights of the Child, to reflect the alignment of criminal law with Convention, as a minimum guarantee to be provided by the States. Another element of this paper is the approach of criminal law in the context of the defence of children from pornography with judicial practice. In this way the effectiveness of Criminal Law, on prevention and protection of society, family and especially children, from pornography will be identified. This paper considers the judicial practice in other European countries, but also from the United States and other countries on other continents, as a source of the definition of pornography and its application. This analysis is conducted through the prism of Criminological and criminal policy, to identify the current state of the Albanian legislation to protect minors from pornography, challenges and its prospects, both in legislative and practical terms.

  19. Consequences of Criminals in Economy

    Directory of Open Access Journals (Sweden)

    Shaban Sulejmani

    2018-03-01

    Full Text Available The criminal in all its forms is not an occurrence which is connected to a particular country, territory, religion or civilization; however the truth witnessed by events in every moment is that the occurrence of criminal activities does not have a nation, confession, religious beliefs or identity. They are initiated by the hands of the individual who plans it, especially emphasizing the ones who finance it and input ‘rented’ elements with the initial intention to destroy, damage and ruin the economy and kill and shed blood as well, followed by the intention to deceit people through focusing on specific religious beliefs sometimes, as well as human rights some other time. Thus, every problem can be observed through collecting a number of important elements which are presented below: - Manifestation of the topic of the problem, which involves the type of activity around which the problem is developing, in order to stop its progress and development and finally, to end the efforts which are being spent for it; - Manifestation of the size of the problem, which involves highlighting the fields affected by the problem, starting from the economic, social, political and other dangers that it involves; - Manifestation of the direct consequence of criminal activities problem, observing it from an objective point of view.

  20. Countering health threats by chemicals with a potential terrorist background--creating a rapid alert system for Europe.

    Science.gov (United States)

    Schaper, A; Desel, H; Wyke, S; Orford, R; Griffiths, M R; Edwards, N; Kupferschmidt, H; Mathieu, M; Pelclova, D; Duarte-Davidson, R

    2012-03-01

    The acronym "ASHT" stands for "Alerting System and Development of a Health Surveillance System for the Deliberate Release of Chemicals by Terrorists". Imagine this scenario: 15 patients with respiratory symptoms following a concert in Rome and 12 patients coughing after lunch in a cafeteria in the Czech Republic; are these events related? Today these events would never be connected as there is no mechanism to allow EU Member States to share this type of information effectively. The main objective of the ASHT project was to improve data sharing between EU Member States. In part, this was achieved by an internet accessible EU-wide alerting system with the aim to detect the deliberate (i.e. criminal or terrorist) or accidental release of chemicals. Nevertheless more information from police, fire brigades and health professionals is needed. Description of the design, development, functionality and testing of the relational database system called "RAS-CHEM" (Rapid Alert System for Chemicals). A database structure appropriate for the description of "events" with sophisticated retrieval functions was developed. For evaluation purposes 37 events were entered into the database including 29 scenarios and 8 historical mass intoxications. The alert level was "background information" for 21 events, "suspected mass intoxication" for 6 cases and "confirmed mass intoxication" for 10 events. The RAS-CHEM database works and will be integrated into the Health Emergency Operations Facility (HEOF) with other European Rapid Alert Systems. Poisons centres receive a large number of enquiries and could be important sentinels in this field of toxicovigilance. Copyright © 2011 European Federation of Internal Medicine. Published by Elsevier B.V. All rights reserved.

  1. Born criminal? Differences in structural, functional and behavioural lateralization between criminals and noncriminals.

    Science.gov (United States)

    Savopoulos, Priscilla; Lindell, Annukka K

    2018-02-15

    Over 100 years ago Lombroso [(1876/2006). Criminal man. Durham: Duke University Press] proposed a biological basis for criminality. Based on inspection of criminals' skulls he theorized that an imbalance of the cerebral hemispheres was amongst 18 distinguishing features of the criminal brain. Specifically, criminals were less lateralized than noncriminals. As the advent of neuroscientific techniques makes more fine-grained inspection of differences in brain structure and function possible, we review criminals' and noncriminals' structural, functional, and behavioural lateralization to evaluate the merits of Lombroso's thesis and investigate the evidence for the biological underpinning of criminal behaviour. Although the body of research is presently small, it appears consistent with Lombroso's proposal: criminal psychopaths' brains show atypical structural asymmetries, with reduced right hemisphere grey and white matter volumes, and abnormal interhemispheric connectivity. Functional asymmetries are also atypical, with criminal psychopaths showing a less lateralized cortical response than noncriminals across verbal, visuo-spatial, and emotional tasks. Finally, the incidence of non-right-handedness is higher in criminal than non-criminal populations, consistent with reduced cortical lateralization. Thus despite Lombroso's comparatively primitive and inferential research methods, his conclusion that criminals' lateralization differs from that of noncriminals is borne out by the neuroscientific research. How atypical cortical asymmetries predispose criminal behaviour remains to be determined.

  2. Sex offender risk assessment: the need to place recidivism research in the context of attrition in the criminal justice system.

    Science.gov (United States)

    Larcombe, Wendy

    2012-04-01

    Jurisdictions in the United States, United Kingdom, and Australia now have laws that enable preventive detention of post-sentence sex offenders based on an assessment of the offender's likely recidivism. Measures of recidivism, or risk assessments, rely on the criminal justice process to produce the "pool" of sex offenders studied. This article argues that recidivism research needs to be placed in the context of attrition studies that document the disproportionate and patterned attrition of sexual offenses and sexual offenders from the criminal justice process. Understanding the common biases that affect criminal prosecution of sex offenses would improve sexual violence prevention policies.

  3. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    Science.gov (United States)

    2007-01-01

    approximate such decisions here by assuming that terrorist groups make rational decisions over the long run using these group sur- 73 Orson Welles ’ War of...surveillance, and reconnais- sance (C4ISR) technologies in military parlance, as well as the consumer-oriented technologies that can often provide the...canonical military command, control, communication, computer, intelligence, surveil- lance, and reconnaissance (C4ISR) technologies1 as well as the

  4. Forms of the criminal environment counteraction to performing the function of state protection of participants in criminal proceedings and measures of its neutralization

    Directory of Open Access Journals (Sweden)

    Dubonosov E.S.

    2014-12-01

    Full Text Available Criminal environment’s counteraction is considered as purposeful, active and intentional influence of its representatives on participants in criminal proceedings. It is directed at persons who, due to their professional duties, are involved in detection and investigation of crimes as well as court proceedings, or who possess evidentiary information (witnesses, victims, etc.. Counteraction may be expressed in different ways: discrediting operatives, investigators and judges; pressure on persons involved in the investigation and the trial through bribery, blackmail, threats to life and health of themselves and their family, etc. The administration of justice becomes inefficient due to the variety of forms and purposes of counteraction. The importance of operational units’ awareness of the activities of criminal environment representatives is shown. The importance of revealing the facts of unlawful influence on witnesses and victims of crime, who subsequently acquire procedural status of witnesses and victims, in order to prevent such facts is also stressed. It is proposed to suppress the counteraction of criminal environment by following ways: 1 identifying (with the help of informants and by crime detection actions the persons attempting to influence the preliminary investigation; 2 documenting the suspects actions aimed at illegal influence on participants in criminal proceedings for the purpose of conducting the procedural actions and decision making; 3 “in cell” (using an agent crime detection actions against detainees and arrestees throughout the whole process of covert operation; 4 creating investigative team to develop a common mechanism to neutralize criminal environment’s counteraction to crime investigation.

  5. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  6. The debate on expanding criminal law towards upper class criminality and minimal criminal law

    Directory of Open Access Journals (Sweden)

    Julio César Montáñez-Ruiz

    2010-06-01

    Full Text Available Hoy en día el debate sobre la pregunta de cuáles conflictos sociales deben ser castigados desde la óptica de la política criminal aún continúa. La batalla para imponer un particular discurso de criminalidad está relacionada con el hecho de que el marco de la criminalización depende del legislador que refleja la expansión punitiva. El propósito de este artículo es discutir sobre la lucha entre modelos de criminalización, los cuales, de una parte, tienden a la aplicación del sistema criminal persiguiendo a la criminalidad de las clases poderosas y, de otra, buscan el criterio de intervención mínima para prevenir la excesiva intervención del derecho penal.

  7. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    of the requirements for the degree of MASTER OF ARTS IN NATIONAL SECURITY AFFAIRS from the NAVAL POSTGRADUATE SCHOOL March 1994 Author...Revolutionary Cell and Palestinian PFLP operation that was led by the international terrorist "Carlos." Urbano . 26 terrorist network. but does imply some...violence. In order to retain the media’s and the public’s attention, a terrorist group continually must raise "Interview with Urbano ," in Urban

  8. Association and Centrality in Criminal Networks

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    Network-based techniques are widely used in criminal investigations because patterns of association are actionable and understandable. Existing network models with nodes as first class entities and their related measures (e.g., social networks and centrality measures) are unable to capture and an...... three of these associations and extend and test two centrality measures using CrimeFighter Investigator, a novel tool for criminal network investigation. Our findings show that the extended centrality measures offer new insights into criminal networks....

  9. How Terrorist Groups End: Lessons for Countering al Qa'ida

    National Research Council Canada - National Science Library

    Jones, Seth G; Libicki, Martin C

    2008-01-01

    .... counterterrorism strategy. The ending of most terrorist groups requires a range of policy instruments, such as careful police and intelligence work, military force, political negotiations, and economic...

  10. Guarantee of Criminal Policy as Limited to Criminal Decisionism

    Directory of Open Access Journals (Sweden)

    María Belén Bonilla Albán

    2016-06-01

    Full Text Available The essay explains how the inclusion of the security of public policy in the 2008 Constitution of Ecuador as part of the constitutional state of law and justice or “guarantor state” can become a substantial limit for criminal decisionism, which is usually behind the penal policy in Latin America. Thus, the function of this collateral is to eliminate the huge space of discretion in the management of the most sensitive policy of modern state penal policy. However, the guarantee of public policy is not clear in determining the limits of punitive power; therefore, this paper seeks to explore some of the international human rights.

  11. Guarantee of Criminal Policy as Limited to Criminal Decisionism

    OpenAIRE

    María Belén Bonilla Albán

    2016-01-01

    The essay explains how the inclusion of the security of public policy in the 2008 Constitution of Ecuador as part of the constitutional state of law and justice or “guarantor state” can become a substantial limit for criminal decisionism, which is usually behind the penal policy in Latin America. Thus, the function of this collateral is to eliminate the huge space of discretion in the management of the most sensitive policy of modern state penal policy. However, the guarantee of public policy...

  12. The Importance of International Law in Counter-Terrorism: The Need for New Guidelines in International Law to Assist States Responding to Terrorist Attacks

    OpenAIRE

    Schlagheck, Heidi Michelle

    2006-01-01

    Terrorism, in one way or another, touches everyone's lives. Its affect could be as small as watching media stories on the nightly news and waiting longer in a security line at the airport or as significant as losing a loved one in an attack. As individuals come to grips with living with increased terrorist violence, individual nation-states and the international community have to prepare themselves to prevent, react to, and counter terrorism. This thesis examines whether international law ...

  13. THE CHILD OFFENDER UNDER THE AGE OF CRIMINAL LIABILITY

    Directory of Open Access Journals (Sweden)

    Niculina KARACSONY

    2015-04-01

    Full Text Available At European level crime among children represents a contemporary issue and in Romania, the philosophy of the new penal code approved by Law No 286/2009 is shaped around punishment. Prevention policy in Romania and juvenile justice objectives relative to age criteria outlines two different legal manners to address children's liability under the law. One is targeting the category of children between 0 and 14 years of age, which consideres the absolute inability of criminal responsibility and one that provides criminal liability starting from the age of 14. The sensitivity of the issue of children involved in unlawfull acts and the inventory of responses to it brought me to the necessity of research the types of approach and diversity of social services built around this target group.

  14. ‘The Very Foundations of Any System of Criminal Justice’: Criminal Responsibility in the Australian Model Criminal Code

    Directory of Open Access Journals (Sweden)

    Arlie Loughnan

    2017-08-01

    Full Text Available The Model Criminal Code (MCC was intended to be a Code for all Australian jurisdictions. It represents a high point of faith in the value and possibility of systematising, rationalising and modernising criminal law. The core of the MCC is Chapter 2, the ‘general principles of criminal responsibility’, which outlines the ‘physical’ and ‘fault’ elements of criminal offences, and defines concepts such as recklessness. This paper assesses the MCC as a criminal law reform project and explores questions of how the MCC came into being, and why it took shape in certain ways at a particular point in time. The paper tackles these questions from two different perspectives—‘external’ and ‘internal’ (looking at the MCC from the ‘outside’ and the ‘inside’. I make two main arguments. First, I argue that, driven by a ‘top down’ law reform process, the MCC came into being at a time when changes in crime and criminal justice were occurring, and that it may be understood as an attempt to achieve stability in a time of change. Second, I argue that the significance of the principles of criminal responsibility, which formed the central pivot of the MCC, lies on the conceptual level—in relation to the language through which the criminal law is thought about, organised and reformed.

  15. Reducing the age of criminal

    Directory of Open Access Journals (Sweden)

    Fabiana Gonçalves

    2000-01-01

    Full Text Available Article 228 of the Constitution provides that children under 18 can not be treated as criminals. In 1993 he was presented a draft Constitutional Amendment (PEC to allow the penalty to 16 years. Increasing violence among teenagers and the controversy over whether the topic should be of constitutional fact has led to the presentation of seven PEC's, ongoing in the House and Senate. Among the population and the media the issue gained momentum especially after the rebellions in Febem in 1999.

  16. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  17. Psycho-Sociological Review of Criminal Thinking Style

    OpenAIRE

    Boduszek, Daniel; Hyland, Philip

    2012-01-01

    Criminal thinking has been long established as a very important predictor of criminal behaviour, however far less research effort has been undertaken to understand what variables can predict the emergence of criminal thinking. Considering the importance of criminal thinking, we feel it necessary to conduct a systematic review of the literature on criminal thinking in order to bring together what is currently known regarding the factors that relate to, and predict, habitual criminal thinking s...

  18. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  19. Dogmatic Analysis of The Constitucional Criminalizing Commandments and of the Constitutional Criminal Principles

    Directory of Open Access Journals (Sweden)

    Alberto Jorge Correia de Barros Lima

    2016-10-01

    Full Text Available The Brazilian Federal Constitution throws inflows directed to all of the fields of the Law, including the Criminal Law, which must comply the constitutional rules, that conditions the legislator’s and the judge’s work, since the public force holds the power-duty to punish the transgressors of the law. The Constitutional Criminal Law, therefore, provides content levies both to the making and to the enforcement of the Criminal Laws, through the implicit or explicit constitutional principles and the constitutional criminalizing commandments, of hindering and prescriptive content. Both must be taken in consideration, in the Criminal Law of the Democratic State of Law.

  20. MEXICAN DRUG CARTELS AND TERRORIST ORGANIZATIONS, A NEW ALLIANCE

    Science.gov (United States)

    2016-02-16

    the United States and partner nations.5 Corruption refers to dishonest or fraudulent conduct by those in power, typically involving bribery . It is...violence, corruption , exploitation of country differences, and legally through legitimate businesses.4 Transnational criminal organizations (TCOs...forging alliances with corrupt foreign government officials and some foreign intelligence services; destabilizing political, financial, and security

  1. Striking at the Underbelly: Influencing Would-Be Terrorists

    Science.gov (United States)

    2013-12-01

    value unless he fights for what is right. … I did not want to be an eternal foreigner, a displaced person, a landless, homeless , stateless, shamed...ran dpa’s Islam was for elderly people.”159 According to Scot Atran, people behind most of the terrorist attacks in Indonesia, Malaysia and...being part of a group of youngsters. He writes, “We played soccer and remained brothers—in Malaysia , when I worked on the chicken farm … then back

  2. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  3. Terrorist Attacks: Do We Know How to Assess the Results?

    Directory of Open Access Journals (Sweden)

    William J. Manning

    2001-01-01

    Full Text Available On September 11, 2001, terrorists destroyed the World Trade Center (WTC in New York City. Explosions and fires resulted in the complete collapse of the two WTC towers. The collapsing towers served as enormous point sources of gaseous and particulate air pollution, seen as huge plumes of smoke and dust. The smoke contained volatile organic compounds and fine particles and aerosols. The dust fraction contained parts of ceiling tiles, carpets, concrete, adhesives, asbestos, chromium, lead, titanium, and many other elements and materials. Whether there were unusually toxic ingredients in the plumes is largely unknown.

  4. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  5. Criminal Misdemeanor: Novels of the Russian Criminal Legislation and Questions of Its Improvement​

    Directory of Open Access Journals (Sweden)

    Yurchenko Irina A.

    2018-03-01

    Full Text Available The article is devoted to the problem of legally securing in the Criminal Code of the Russian Federation the concept of a criminal misdemeanor. On the basis of doctrinal provisions, Russian and foreign criminal legislation, the concept of a criminal misdemeanor is investigated, its relation to an insignificant act is analyzed, and the category of administrative prejudice is analyzed. The Author justifies the position according to which criminal misdemeanor cannot be a kind of crime of little gravity. It is concluded that a group of crimes with administrative prejudice, regardless of their category, should be classified as a criminal misdemeanor. With regard to this type of socially dangerous acts, the criminal law proposes to use the term “criminal misdemeanor”. An approach is presented to the establishment in the Criminal Code of the Russian Federation of a preferential criminal law regime for criminal misdemeanor: the unpunishable assassination and complicity in such a crime, the absence of aggregate and relapse, if one of the crimes is small, the reduction of the statute of limitations, the recognition of the person who committed such an act is unacceptable.

  6. Criminal sanctions: does imprisonment strategy reduce crimes ...

    African Journals Online (AJOL)

    Careful reading of the literature on psychology of criminal conduct and of prior reviews of studies of treatment effects suggested that neither criminal sanctioning without provision of rehabilitative treatment will succeed in reducing recidivism. What works, in our views, is the delivery of appropriate correctional treatment, and ...

  7. critical assessment of nigeria criminal justice system

    African Journals Online (AJOL)

    Global Journal

    This study therefore assessed the Nigeria criminal justice system and the problem of awaiting trial in Port Harcourt Maximum Prison, Rivers State. Three research questions were raised to guide the study. The study adopted the survey research design. An 18-item questionnaire captioned. “Questionnaire on Nigeria criminal ...

  8. Criminal Trajectories of White-collar Offenders

    NARCIS (Netherlands)

    van Onna, J.; van der Geest, V.R.; Huisman, W.; Denkers, A.J.M.

    2014-01-01

    Objectives:This article analyzes the criminal development and sociodemographic and criminal profile of a sample of prosecuted white-collar offenders. It identifies trajectory groups and describes their profiles based on crime, sociodemographic, and selection offence characteristics.Methods:The

  9. 10 CFR 60.183 - Criminal penalties.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Criminal penalties. 60.183 Section 60.183 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) DISPOSAL OF HIGH-LEVEL RADIOACTIVE WASTES IN GEOLOGIC REPOSITORIES Violations § 60.183 Criminal penalties. (a) Section 223 of the Atomic Energy Act of 1954, as amended...

  10. 31 CFR 103.59 - Criminal penalty.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Criminal penalty. 103.59 Section 103.59 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.59 Criminal penalty. (a) Any person...

  11. 10 CFR 75.53 - Criminal penalties.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Criminal penalties. 75.53 Section 75.53 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) SAFEGUARDS ON NUCLEAR MATERIAL-IMPLEMENTATION OF US/IAEA AGREEMENT Enforcement § 75.53 Criminal penalties. (a) Section 223 of the Atomic Energy Act of 1954, as amended, provides...

  12. 10 CFR 150.33 - Criminal penalties.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Criminal penalties. 150.33 Section 150.33 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXEMPTIONS AND CONTINUED REGULATORY AUTHORITY IN AGREEMENT STATES AND IN OFFSHORE WATERS UNDER SECTION 274 Enforcement § 150.33 Criminal penalties. (a) Section 223 of the Atomic...

  13. The Relative Ineffectiveness of Criminal Network Disruption

    Science.gov (United States)

    Duijn, Paul A. C.; Kashirin, Victor; Sloot, Peter M. A.

    2014-01-01

    Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become ‘stronger’, after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort. PMID:24577374

  14. Male Psychopaths and Their Criminal Careers.

    Science.gov (United States)

    Hare, Robert D.; And Others

    1988-01-01

    Examined criminal histories of male psychopaths and nonpsychopaths, exploring time in prison and conviction rates for five-year periods between ages of 16 and 45. Criminal activities of nonpsychopaths were relatively constant over years; activities of psychopaths remained high until around age 40, then declined dramatically. Results are consistent…

  15. Child maltreatment and adult criminal behavior: does criminal thinking explain the association?

    Science.gov (United States)

    Cuadra, Lorraine E; Jaffe, Anna E; Thomas, Renu; DiLillo, David

    2014-08-01

    Criminal thinking styles were examined as mediational links between different forms of child maltreatment (i.e., sexual abuse, physical abuse, and physical neglect) and adult criminal behaviors in 338 recently adjudicated men. Analyses revealed positive associations between child sexual abuse and sexual offenses as an adult, and between child physical abuse/neglect and endorsing proactive and reactive criminal thinking styles. Mediation analyses showed that associations between overall maltreatment history and adult criminal behaviors were accounted for by general criminal thinking styles and both proactive and reactive criminal thinking. These findings suggest a potential psychological pathway to criminal behavior associated with child maltreatment. Limitations of the study as well as research and clinical implications of the results are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. Crime and Criminal Policy Foundation

    Directory of Open Access Journals (Sweden)

    Néstor Juan Sanabria Landazábal

    2015-12-01

    Full Text Available Theoretically the construction of legitimacy or border crime is admitted as a dynamic cultural result, able to feed off itself and with temporal and geographical boundaries. In this paper it is argued that the problem of criminal policy or design that marks the boundary between legal and illegal cannot circumscribe the penal and criminal procedure code, but requires: understanding crime as an illegitimate market keeping close relations with the legitimate as both exist in the communications space and the social construction of civilization and this is a result of cultural dynamics. Methodologically proceeded with: a theoretical discussion of these issues and statistical modeling and reports from different agencies working in this field in Bogotá, DC management. The contrasting theory and evidence shed light on the problem is complex, the assumptions of economic motivations theories, among others are not met and is not easily solvable in a linear relationship expressed in the trinomial crime - delinquent - penalty. Your solution may be the anthropological and schemes proposed as solution game theory.

  17. What Defines an International Criminal Court?

    DEFF Research Database (Denmark)

    Kjeldgaard-Pedersen, Astrid

    2015-01-01

    Since the post-World War II tribunals, only few scholars have attempted to draw a definitional distinction between international and national criminal courts. Remarkable exceptions include Robert Woetzel, who in 1962 categorized criminal courts according to ‘the involvement of the international...... community’, and Sarah Williams, who 50 years later relied on the same factor in her definitions of ‘hybrid’ and ‘internationalized’ criminal tribunals. Through examples of rulings by the Special Court for Sierra Leone and the Extraordinary Chambers in the Courts of Cambodia, this article will demonstrate...... that only criminal tribunals deriving their authority from international law should be labelled ‘international’, while the term ‘national criminal court’ should apply to tribunals set up under national law. This terminology would underline that issues concerning jurisdiction and applicable law must...

  18. Judicial Functions in the Criminal Trial

    Directory of Open Access Journals (Sweden)

    Constantin Tănase

    2014-05-01

    Full Text Available The separation of judicial functions falls, indisputably, in the news gallery of the Romanian criminal trial current rules. The previous Criminal Procedure Code, namely that of 1968, as well as the older ones, hadn‟t enrolled in their content such a principle. However, the doctrine identified, under mentioned legal regulations, the existence of distinct procedural functions and their need to separate, in the idea of genuine criminal justice accomplishment. These procedural functions were: the indictment function (or charges, the defense function the trial function. In the new code, this principle proclaims the existence of four judicial functions that aim the efficiency and speed of the criminal trial, but also guarantee the presumption of innocence, equal opportunity of parties, protection of rights and fundamental freedoms. This research try to explain this principle and its connections with other institutions of the criminal trial.

  19. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  20. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  1. 3 CFR - Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the...

    Science.gov (United States)

    2010-01-01

    ... to Terrorists Who Threaten to Disrupt the Middle East Peace Process Presidential Documents Other... Terrorists Who Threaten to Disrupt the Middle East Peace Process On January 23, 1995, by Executive Order... security, foreign policy, and economy of the United States constituted by grave acts of violence committed...

  2. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  3. 31 CFR 595.408 - Charitable contributions to specially designated terrorists.

    Science.gov (United States)

    2010-07-01

    ... designated terrorists. 595.408 Section 595.408 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS Interpretations § 595.408 Charitable contributions to specially designated terrorists. (a) Unless...

  4. The Scope of Definition of a Terrorist Act under Ethiopian Law ...

    African Journals Online (AJOL)

    While regional and international human rights institutions claim that the definition of a terrorist act under the Anti-terrorism Proclamation No. 652/2009 is overly broad as a result of which citizens not involved in a genuinely terrorist act are prosecuted and jailed, the Ethiopian government defends the law pointing that it is ...

  5. 28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.

    Science.gov (United States)

    2010-07-01

    ... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from 5... Candidates File System (JUSTICE/FTTTF-001). This exemption applies only to the extent that information is... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking...

  6. Help-Seeking Behaviours of Adolescents in Relation to Terrorist Attacks: The Perceptions of Israeli Parents

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima; Kelman, Talia

    2011-01-01

    Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…

  7. 75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Science.gov (United States)

    2010-09-13

    ..., 2010 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent with... Notice of September 10, 2010--Continuation of the National Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75 , No. 176 / Monday...

  8. Terrorist Decision-Making: Insights from Economics and Political Science

    Directory of Open Access Journals (Sweden)

    Jacob N. Shapiro

    2012-10-01

    Full Text Available Terrorist groups repeatedly take actions that are ultimately politically counter-productive. Sometimes these are the result of deliberate calculations that happen to be mistaken - Al-Qaeda’s decision to conduct the 9/11 attacks is the most obvious example of an ultimately self-defeating operation. Sometimes they reflect the challenges groups face in controlling their operatives: Al-Qaeda in Iraq’s excessive public violence against other Sunni organisations stand out. At other times they appear to steer difficult political waters quite effectively despite of deep internal divisions—Hamas is the exemplar here. This article reviews recent developments in the literature on terrorist decision-making in economics and political science. Overall, tremendous advances have been made in the last 10 years, but much work remains to be done. In particular, it is  argued that the literature needs to do better at testing its theories in inferentially credible ways and at considering terrorism as one tactical option among many for opposition political groups.

  9. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  10. Killing Range: Explaining Lethality Variance within a Terrorist Organization.

    Science.gov (United States)

    Asal, Victor; Gill, Paul; Rethemeyer, R Karl; Horgan, John

    2015-04-01

    This paper presents an analysis of the Provisional Irish Republican Army's (PIRA) brigade level behavior during the Northern Ireland Conflict (1970-1998) and identifies the organizational factors that impact a brigade's lethality as measured via terrorist attacks. Key independent variables include levels of technical expertise, cadre age, counter-terrorism policies experienced, brigade size, and IED components and delivery methods. We find that technical expertise within a brigade allows for careful IED usage, which significantly minimizes civilian casualties (a specific strategic goal of PIRA) while increasing the ability to kill more high value targets with IEDs. Lethal counter-terrorism events also significantly affect a brigade's likelihood of killing both civilians and high-value targets but in different ways. Killing PIRA members significantly decreases IED fatalities but also significantly decreases the possibility of zero civilian IED-related deaths in a given year. Killing innocent Catholics in a Brigade's county significantly increases total and civilian IED fatalities. Together the results suggest the necessity to analyze dynamic situational variables that impact terrorist group behavior at the sub-unit level.

  11. Mortality salience, political orientation and minimization of terrorists' secondary emotions.

    Science.gov (United States)

    Piñuela Sánchez, Raúl; Yela García, Carlos

    2016-01-01

    From the framework of Terror Management Theory, the objective of the present research is to analyze the effect of mortality salience (MS) on the minimization of Muslim terrorists’ secondary emotions (MSE, which can be understood as a particular kind of dehumanization), as a function of political orientation. An experimental design was used, in which the participants (university students, N= 293) were randomly assigned to a control or experimental group, their political orientation was taken note of, and they were asked to attribute emotions to Muslim terrorists. In accordance with the hypotheses, the results indicate that, among those supporting tenets of the political left, MS originates less minimization of secondary emotions of the terrorists (MSE). However, among people who stand on the right, MS inspires greater MSE (that is, a lower attribution of these emotions). These results support the thesis that the effects of MS are not to be found exclusively in conservative people, and that they do not necessarily imply a conservative shift, but constitute a polarization in previous ideological tendencies or cultural worldview.

  12. Research reactors compared with power reactors as terrorist targets

    International Nuclear Information System (INIS)

    Bunn, G.; Zaitseva, L.; Steinhaeusler, F.

    2002-01-01

    Full text: Concerns about nuclear terrorism have focused on nuclear power reactors more than research reactors. Yet fuel from many research reactors could be used to make nuclear weapons, and the same is not true of power reactors. Radioactive materials from both could be used by terrorists to make 'dirty bombs'. But the used fuel from research reactors is typically easier to transport and easier to use in making a dirty bomb without becoming overcome by its radiation. Moreover, research reactors tend to be less well protected than power reactors from thieves and terrorists by guards, barriers, locks and sensors. The well-intended 'Atoms for Peace Program' initiated by US president Eisenhower in 1953 provided research reactors with weapon-usable highly-enriched uranium to countries all around the world. At the end of the Gulf War, Iraqi scientists were making a nuclear weapon from highly-enriched uranium from a research reactor supplied pursuant to a Soviet research reactor program modeled after the American one. An American program to bring home the US-supplied weapon-usable uranium from around the world has made great progress but is only about half completed. A comparable Russian return program is just beginning. Research reactors with weapon-usable uranium remain in many countries around the world. (author)

  13. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  14. Intoxication and criminal responsibility in Dutch criminal Law.

    Science.gov (United States)

    van Kalmthout, A

    1998-09-01

    This article deals with the question in how far an offence committed in the Netherlands under the influence of alcohol or other drugs can be imputed to the offender. Unlike many other countries the Dutch Penal Code does not contain specific provisions with respect to the criminal liability of addicted or intoxicated offenders. In principle, they are held responsible for their offences, even when the dolus or culpa is absent at the moment they commit their offence. Doctrine and jurisprudence found this liability on the principle of 'culpa/dolus in causa', by accepting an anterior dolus or culpa, which is situated at the moment the offender takes alcohol or other drugs. As is shown in this article, the - nondogmatic - interpretation of this culpa in causa doctrine leaves hardly any space for a claim to impunity.

  15. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    families the ability to pay ransoms. With lives at stake, it is important to understand relevant material concerning the topic of negotiating with...7 Isabelle Duyvesteyn and Bart Schuurman, “The Paradoxes of Negotiating with Terrorist and Insurgent Organisations ,” Journal of...terrorists?—it is important to understand the dynamics of negotiating with terrorists. There are many different types of terrorists, and much of the

  16. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  17. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  18. Panel: challenging criminal charges for HIV transmission and exposure.

    Science.gov (United States)

    Edwardh, Marlys; Adam, Barry; Joncas, Lucie; Clayton, Michaela

    2009-12-01

    Justice Edwin Cameron, of the Constitutional Court of South Africa, served as moderator. He said that this topic was particularly relevant for "an African/Canadian setting" because African countries may use Canadian developments as justification for their efforts to address HIV transmission and exposure through criminal law. Justice Cameron said that Canada is internationally perceived as a human rights-respecting state and, thus, sets an example, particularly for African nations, on how to comply with human rights issues. He added that in this particular case, however, Canada was sending the wrong message. This article contains summaries of the four presentations made during this panel. Marlys Edwardh reviews how the Supreme Court of Canada in Cuerrier interpreted the concepts of "endangering life" and "fraud". Barry Adam discusses the notion of a "duty to disclose" and how this affects HIV prevention. Lucie Joncas examines how the Supreme Court defined "fraud" in Cuerrier and describes a case before the Quebec Court of Appeal which may turn on whether the use of a condom or having a low viral load is considered not to constitute a significant risk of transmission. Finally, Michaela Clayton describes the trend in Southern African countries to adopt laws criminalizing HIV transmission or exposure, and explains that criminalization endangers women's health and lives.

  19. The Role of Family in Responding to Juvenile Delinquents by Emphasizing the Islamic Criminal Code (2013

    Directory of Open Access Journals (Sweden)

    محمد روشن

    2016-03-01

    Full Text Available Family plays the most important role in children’s socialization and formation of their personality. The initial aim of the juvenile criminal justice system is educating and intervening to prevent the development of personality pathologies resulting in delinquency. Therefore, it is important to have an appropriate family response to achieve this aim. In addition, family intervention has a crucial role in developmental prevention in juvenile criminal justice. Iran’s Islamic Criminal Code (2013 has taken these key issues into consideration and has paid attention to the family as a solution. In other words, at the outset and in accordance with custody regulations, the first choice is to place the child in the custody of the family, and in the next step, the family is committed to the implementation of  the courtordered rehabilitative measures in order to realize the main objectives of corrective and rehabilitative functions of the system.

  20. 76 FR 3007 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2011-01-18

    ... Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process #0; #0; #0; Presidential... the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace... constituted by grave acts of violence committed by foreign terrorists who threaten to disrupt the Middle East...

  1. 77 FR 54944 - Designation of the Communist Party of Nepal (Maoist) as a Specially Designated Global Terrorist...

    Science.gov (United States)

    2012-09-06

    ... Designation of the Communist Party of Nepal (Maoist) as a Specially Designated Global Terrorist; In the Matter... Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended Acting under the...(M), as a Specially Designated Global Terrorist pursuant to Section 1(b) of the Order. This notice...

  2. 31 CFR 597.201 - Prohibited transactions involving blocked assets or funds of foreign terrorist organizations or...

    Science.gov (United States)

    2010-07-01

    ... blocked assets or funds of foreign terrorist organizations or their agents. 597.201 Section 597.201 Money... CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Prohibitions § 597.201 Prohibited transactions involving blocked assets or funds of foreign terrorist organizations...

  3. Child and adolescent psychiatric patients and later criminality

    Directory of Open Access Journals (Sweden)

    Rydelius Per-Anders

    2007-08-01

    Full Text Available Abstract Background Sweden has an extensive child and adolescent psychiatric (CAP research tradition in which longitudinal methods are used to study juvenile delinquency. Up to the 1980s, results from descriptions and follow-ups of cohorts of CAP patients showed that children's behavioural disturbances or disorders and school problems, together with dysfunctional family situations, were the main reasons for families, children, and youth to seek help from CAP units. Such factors were also related to registered criminality and registered alcohol and drug abuse in former CAP patients as adults. This study investigated the risk for patients treated 1975–1990 to be registered as criminals until the end of 2003. Methods A regional sample of 1,400 former CAP patients, whose treatment occurred between 1975 and 1990, was followed to 2003, using database-record links to the Register of Persons Convicted of Offences at the National Council for Crime Prevention (NCCP. Results Every third CAP patient treated between 1975 and 1990 (every second man and every fifth woman had entered the Register of Persons Convicted of Offences during the observation period, which is a significantly higher rate than the general population. Conclusion Results were compared to published results for CAP patients who were treated between 1953 and 1955 and followed over 20 years. Compared to the group of CAP patients from the 1950s, the results indicate that the risk for boys to enter the register for criminality has doubled and for girls, the risk seems to have increased sevenfold. The reasons for this change are discussed. Although hypothetical and perhaps speculative this higher risk of later criminality may be the result of lack of social control due to (1 rising consumption of alcohol, (2 changes in organisation of child social welfare work, (3 the school system, and (4 CAP methods that were implemented since 1970.

  4. Personality correlates of criminals: A comparative study between normal controls and criminals.

    Science.gov (United States)

    Sinha, Sudhinta

    2016-01-01

    Personality is a major factor in many kinds of behavior, one of which is criminal behavior. To determine what makes a criminal "a criminal," we must understand his/her personality. This study tries to identify different personality traits which link criminals to their personality. In the present study, 37 male criminals of district jail of Dhanbad (Jharkhand) and 36 normal controls were included on a purposive sampling basis. Each criminal was given a personal datasheet and Cattel's 16 personality factors (PFs) scale for assessing their sociodemographic variables and different personality traits. The objective of this study was to examine the relation between personality traits and criminal behavior, and to determine whether such factors are predictive of future recidivism. Results indicated high scores on intelligence, impulsiveness, suspicion, self-sufficient, spontaneity, self-concept control factors, and very low scores on emotionally less stable on Cattel's 16 PFs scale in criminals as compared with normal. Criminals differ from general population or non criminals in terms of personality traits.

  5. Personality correlates of criminals: A comparative study between normal controls and criminals

    Directory of Open Access Journals (Sweden)

    Sudhinta Sinha

    2016-01-01

    Full Text Available Background: Personality is a major factor in many kinds of behavior, one of which is criminal behavior. To determine what makes a criminal “a criminal,” we must understand his/her personality. This study tries to identify different personality traits which link criminals to their personality. Materials and Methods: In the present study, 37 male criminals of district jail of Dhanbad (Jharkhand and 36 normal controls were included on a purposive sampling basis. Each criminal was given a personal datasheet and Cattel's 16 personality factors (PFs scale for assessing their sociodemographic variables and different personality traits. Objective: The objective of this study was to examine the relation between personality traits and criminal behavior, and to determine whether such factors are predictive of future recidivism. Results: Results indicated high scores on intelligence, impulsiveness, suspicion, self-sufficient, spontaneity, self-concept control factors, and very low scores on emotionally less stable on Cattel's 16 PFs scale in criminals as compared with normal. Conclusion: Criminals differ from general population or non criminals in terms of personality traits.

  6. Personality correlates of criminals: A comparative study between normal controls and criminals

    Science.gov (United States)

    Sinha, Sudhinta

    2016-01-01

    Background: Personality is a major factor in many kinds of behavior, one of which is criminal behavior. To determine what makes a criminal “a criminal,” we must understand his/her personality. This study tries to identify different personality traits which link criminals to their personality. Materials and Methods: In the present study, 37 male criminals of district jail of Dhanbad (Jharkhand) and 36 normal controls were included on a purposive sampling basis. Each criminal was given a personal datasheet and Cattel's 16 personality factors (PFs) scale for assessing their sociodemographic variables and different personality traits. Objective: The objective of this study was to examine the relation between personality traits and criminal behavior, and to determine whether such factors are predictive of future recidivism. Results: Results indicated high scores on intelligence, impulsiveness, suspicion, self-sufficient, spontaneity, self-concept control factors, and very low scores on emotionally less stable on Cattel's 16 PFs scale in criminals as compared with normal. Conclusion: Criminals differ from general population or non criminals in terms of personality traits. PMID:28163407

  7. Rehabilitation and Re-socialization of Criminals in Iranian Criminal Law.

    Science.gov (United States)

    Mollaei, Mohammad; Ghayoomzadeh, Mahmood; Mirkhalili, Seyed Mahmoud

    2018-02-08

    One of the concerns that always remain for the repentant criminal is the condition for his return to society. This concern may be so strong and effective that the criminal may seclude from the society due to the fear of its consequences and may return to crime. Therefore, paying attention to eliminating the social effect of the criminal conviction of criminals can return security to society and return the repentant criminals to normal life. So, all military and social institutions are effective in the re-socialization, in such a way that the re-socialization of criminals requires the provision of social platforms that starts with their own family and expands to society. The main concern of this research is how we can provide the favorable conditions for the re-socialization of repentant criminals that effectively realize the socialization goals. The Islamic Penal Code initiatives in 2013, despite the gaps in this regard, partly help to achieve such goals, but they are not enough. Therefore, the present article focused on the criminals' re-socialization and tried to raise the criminals' re-socialization both socially and criminally. The method was descriptive analytical. The result showed that the Islamic Penal Code, adopted in 2013 on the period of the subsequent effects, needs to be reformed, and the effective social institutions should be raised orderly in such a case.

  8. Protecting Children Rights under International Criminal Justice

    Directory of Open Access Journals (Sweden)

    Erinda Duraj (Male

    2015-03-01

    Full Text Available Children are a central concern of international criminal justice. International crimes and other forms of violence and the abuse of children are disturbing daily realities in today’s world. Children and young persons are increasingly being targeted for the purposes of murder, rape, abduction, mutilation, recruitment as child soldiers, trafficking, sexual exploitation and other abuses. Sierra Leone, the Democratic Republic of Congo, Rwanda, Colombia, and many others illustrate this. The participation of children in international criminal justice and other accountability mechanisms is now one of the major issues facing criminal justice today. In this sense, this paper presents a short overview on the issue of children and their participation in international criminal justice. The paper thus focuses on giving a definition of “child/children” according to international norms, which are the key principles of children’s rights, their participation in the criminal justice system, the different international crimes committed by them or against them etc. Also, this paper briefly addresses the main contours of the normative framework regarding the criminal responsibility of children for their alleged participation in international crimes. It reviews international norms regarding children who may be accused of having participated in the commission of such crimes themselves (as child soldiers and identifies their criminal responsibility for such acts. Finally, this paper acknowledges the obligations of states under international law to prosecute persons accused of genocide, war crimes, crimes against humanity, torture and enforced disappearances, specifically focusing on crimes against children.

  9. Illicit networks targeting the nexus between terrorists, proliferators, and narcotraffickers

    OpenAIRE

    Dietz, Rebekah K.

    2010-01-01

    Approved for public release; distribution is unlimited Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing ...

  10. THE URGENCY OF THE CRIMINAL POLICY IN CRIME MITIGATION POLICE PROFESSION

    Directory of Open Access Journals (Sweden)

    Ridwan Tahir

    2016-12-01

    Full Text Available This article aims to reveal the characteristics of the crimes committed by the police in general, and then continued by asserting the main orientation of the criminal policy in crime prevention. Next, will be discussed more specifically about the urgency of the criminal policy in the prevention of the crimes committed by the police. This paper, presented using data and information from literature sources, then analyzed qualitatively with decomposition descriptive and prescriptive analytics. The focus of the discussion of this article will be directed to the issue of urgency criminal policy in relation to the role of agency compensation and rehabilitation for the abuses of power that are criminogen in the investigation process established through pretrial agencies that the results are only set compensation and rehabilitation as a result of misuse of the police profession. To that end, the weakness of the criminal law policy, need to be updated, ie, by adding the authority to institute pretrial may also recommend its findings to be prosecuted and criminal sanctions

  11. India: Delhi high court annuls law criminalizing adult homosexual relations.

    Science.gov (United States)

    Skanland, Celeste A

    2009-12-01

    In what is considered by many to be a landmark decision on equality and non-discrimination in India, the Delhi High Court declared in July 2009 that Section 377 of the Indian Penal Code, which criminalizes people who engage in "unnatural offences", violates the rights to equality, freedom from discrimination, and life and personal liberty, pursuant to the India Constitution (Constitution). The court also agreed with the petitioner in the case that the law severely impairs HIV/AIDS prevention efforts by discouraging men who have sex with men (MSM) from participating for fear of stigma, discrimination and police abuse under the guise of enforcing the Section.

  12. CRIMINAL LIABILITY FOR CERTAIN ECONOMIC ACTIVITIES-TAX EVASIOAN

    Directory of Open Access Journals (Sweden)

    Alexandrina Fodor

    2010-12-01

    Full Text Available Evasion is equivalent to the offense or crime, and what is civil or criminal depending on the seriousness and rufnesse. Reasons for this phenomenon in Romania is difficult to quantify and are prevented complex and numerous, among them may be mentioned: many imperfections and speculiarities in the tax laws, the business tax accounting method, not using the national macroeconomic record, massive tax evasion carried out by various interest groups and economic agents only appear to take advantage of loopholes laws lack of a tax code, the principle of confidentiality.

  13. The suspended sentence in French Criminal Law

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2016-01-01

    Full Text Available From the ancient times until today, criminal law has provided different criminal sanctions as measures of social control. These coercive measures are imposed on the criminal offender by the competent court and aimed at limitting the offender's rights and freedoms or depriving the offender of certain rights and freedoms. These sanctions are applied to the natural or legal persons who violate the norms of the legal order and injure or endanger other legal goods that enjoy legal protection. In order to effectively protect social values, criminal legislations in all countries predict a number of criminal sanctions. These are: 1 imprisonment, 2 precautions, 3 safety measures, 4 penalties for juveniles, and 5 sanctions for legal persons. Apart and instead of punishment, warning measures have a significant role in the jurisprudence. Since they emerged in the early 20th century in the system of criminal sanctions, there has been an increase in their application to criminal offenders, especially when it comes to first-time offenders who committed a negligent or accidental criminal act. Warnings are applied in case of crimes that do not have serious consequences, and whose perpetrators are not hardened and incorrigible criminals. All contemporary criminal legislations (including the French legilation provide a warning measure of suspended sentence. Suspended sentence is a conditional stay of execution of sentence of imprisonment for a specified time, provided that the convicted person does not commit another criminal offense and fulfills other obligations. This sanction applies if the following two conditions are fulfilled: a forma! -which is attached to the sentence of imprisonment; and b material -which is the court assessment that the application of this sanction is justified and necessary in a particular case. In many modern criminal legislations, there are two different types of suspended (conditional sentence: 1 ordinary (classical suspended

  14. Neurotechnological Behavioural Treatment of Criminal Offenders

    DEFF Research Database (Denmark)

    Ryberg, Jesper; Petersen, Thomas Søbirk

    2013-01-01

    Whether it is morally acceptable to offer rehabilitation by CNS-intervention to criminals as a condition for early release constitutes an important neuroethical question. Bomann-Larsen has recently suggested that such interventions are unacceptable if the offered treatment is not narrowly targeted...... at the behaviour for which the criminal is convicted. In this article it is argued that Bomann-Larsen's analysis of the morality of offers does not provide a solid base for this conclusion and that, even if the analysis is assumed to be correct, it still does not follow that voluntary rehabilitation schemes...... targeting behaviour beyond the act for which a criminal is convicted are inappropriate....

  15. Mentally Disordered Non-Psychotic Criminal Offenders

    DEFF Research Database (Denmark)

    Gottlieb, Peter; Gabrielsen, Gorm; Kørner, Alex

    2013-01-01

    as sanctions in criminal cases, the court will request a psychiatric report. They may furthermore ask a medical expert consultation board, the Danish Medico-Legal Council, for an opinion on the mental status of the defendant. Aims: To describe a sample of offenders falling under §69 and the use of the section...... and the final verdicts on socio-demographic, health and criminal items, and the data were computerized. Results: The sample was characterized by severe criminality and mental disorder. Forty-six percent (138/298) were sentenced by the court to a psychiatric measure instead of punishment. Conclusions...

  16. Justifying genetics as a possible legal defence to criminal ...

    African Journals Online (AJOL)

    However, jurisprudence of many criminal cases tends to question whether a person's inherited genes predispose him to violence and further determine his criminal responsibility in law. Under the Nigerian criminal law, the legal test of criminal responsibility is mainly whether the accused person intends the consequence of ...

  17. Methods and manners of interpretation of criminal norms | Assefa ...

    African Journals Online (AJOL)

    The criminal justice system is constituted of criminal norms, institutions and methods, among others. Interpretation of the criminal law is a process that transforms the text of the law into reality. The process is influenced by various factors, such as, the courts' conception of the criminal law, the concept and practice of ...

  18. 32 CFR 26.625 - Criminal drug statute.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Criminal drug statute. 26.625 Section 26.625 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT... Criminal drug statute. Criminal drug statute means a Federal or non-Federal criminal statute involving the...

  19. The Value Of Justice In Child Criminal Justice System A Review Of Indonesian Criminal Law

    OpenAIRE

    Andi Sofyan

    2015-01-01

    The value of justice in Act No. 11 of 2012 concerns the Child Criminal Justice System Act No. SPPA confirms the Restorative Justice Approach as a method of disputes resolution. The method of research used was normative-legal research with philosophical approach. The results showed that the value of restorative justice through diversion contained in Act SPPA but the diversion limit for certain types of criminal acts and threats of punishment under seven 7 years and not a repetition criminal re...

  20. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  2. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  3. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  4. Original article Latent classes of criminal intent associated with criminal behaviour

    Directory of Open Access Journals (Sweden)

    Daniel Boduszek

    2014-07-01

    Full Text Available Background This study aimed to examine the number of latent classes of criminal intent that exist among prisoners and to look at the associations with recidivism, number of police arrests, type of offending (robbery, violent offences, murder, and multiple offences, and age. Participants and procedure Latent class analysis was used to identify homogeneous subgroups of prisoners based on their responses to the 10 questions reflecting criminal intent. Participants were 309 male recidivistic prisoners incarcerated in a maximum security prison. Multinomial logistic regression was used to interpret the nature of the latent classes, or groups, by estimating the association between recidivism and latent classes of criminal intent while controlling for offence type (robbery, violent offences, murder, and multiple offences, number of arrests, and age. Results The best fitting latent class model was a three-class solution: ‘High criminal intent’ (49.3%, ‘Intermediate criminal intent’ (41.3%, and ‘Low criminal intent’ (9.4%. The latent classes were differentially related to the external variables (recidivism, violent offences, and age. Conclusions Criminal intent is best explained by three homogeneous classes that appear to represent an underlying continuum. Future work is needed to identify whether these distinct classes of criminal intent may predict engagement in various types of criminal behaviour.

  5. Dynamical analysis of a model of social behavior: Criminal vs non-criminal population

    International Nuclear Information System (INIS)

    Abbas, Syed; Tripathi, Jai Prakash; Neha, A.A.

    2017-01-01

    Highlights: • A new social model of interaction between criminal and non-criminal population is proposed • The effect of law enforcement is studied • Many real life situations are analyzed • List of open problems is given for future work. - Abstract: In this paper, we construct a model motivated by the well known predator-prey model to study the interaction between criminal population and non-criminal population. Our aim is to study various possibilities of interactions between them. First we model it using simple predator-prey model, then we modify it by considering the logistic growth of non-criminal population. We clearly deduce that the model with logistic growth is better than classical one. More precisely, the role of carrying capacity on the dynamics of criminal minded population is discussed. Further, we incorporate law enforcement term in the model and study its effect. The result obtained suggest that by incorporating enforcement law, the criminal population reduces from the very beginning, which resembles with real life situation. Our result indicates that the criminal minded population exist as long as coefficient of enforcement l c does not cross a threshold value and after this value the criminal minded population extinct. In addition, we also discuss the occurrence of saddle-node bifurcation in case of model system with law enforcement. Numerical examples and simulations are presented to illustrate the obtained results.

  6. Mapping the criminal mind: idiographic assessment of criminal belief systems.

    Science.gov (United States)

    Walters, Glenn D

    2005-02-01

    An idiographic procedure designed to assess the belief systems of criminal offenders is described, investigated, and clarified. This measure, the Cognitive Map of Major Belief Systems (CMMBS), assesses the five belief systems (self-view, world-view, past-view, present-view, future-view) held to occupy the higher echelons of human cognition. Modest to moderate test-retest reliability was achieved when 19 inmates, enrolled in one of three drug-counseling groups, completed the CMMBS on two separate occasions, 2 weeks apart. It was also ascertained that the drug treatment specialist who served as therapist for all three groups "blindly" matched the 19 CMMBS records to the inmates who produced them. A case study of one of the 19 participants was used to illustrate how the CMMBS is employed with individual offenders and how belief systems interact with major schematic subnetworks such as attributions, outcome expectancies, efficacy expectancies, goals, values, and thinking styles to create crime-supporting lifestyles.

  7. A Framework for visualization of criminal networks

    DEFF Research Database (Denmark)

    Rasheed, Amer

    This Ph.D. thesis describes research concerning the application of criminal network visualization in the field of investigative analysis. There are number of way with which the investigative analysis can locate the hidden motive behind any criminal activity. Firstly, the investigative analyst must...... have the ability to understand the criminal plot since a comprehensive plot is a pre-requisite to conduct an organized crime. Secondly, the investigator should understand the organization and structure of criminal network. The knowledge about these two aspects is vital in conducting an investigative...... visualization is to let the users put less effort into recognizing the requirements, preferably within a short instance of time. In this way, the investigator focuses on his/her cause rather than using resources on irrelevant details. Much research is being conducted in visual analytics, dynamics in social...

  8. Expert Evidence and International Criminal Justice

    DEFF Research Database (Denmark)

    Appazov, Artur

    The book is a comprehensive narration of the use of expertise in international criminal trials offering reflection on standards concerning the quality and presentation of expert evidence. It analyzes and critiques the rules governing expert evidence in international criminal trials...... and the strategies employed by counsel and courts relying upon expert evidence and challenges that courts face determining its reliability. In particular, the author considers how the procedural and evidentiary architecture of international criminal courts and tribunals influences the courts' ability to meaningfully...... incorporate expert evidence into the rational fact-finding process. The book provides analysis of the unique properties of expert evidence as compared with other forms of evidence and the challenges that these properties present for fact-finding in international criminal trials. It draws conclusions about...

  9. Criminal Network Investigation: Processes, Tools, and Techniques

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    important challenge for criminal network investigation, despite the massive attention it receives from research and media. Challenges such as the investigation process, the context of the investigation, human factors such as thinking and creativity, and political decisions and legal laws are all challenges......Criminal network investigations such as police investigations, intelligence analysis, and investigative journalism involve a range of complex knowledge management processes and tasks. Criminal network investigators collect, process, and analyze information related to a specific target to create...... that could mean the success or failure of criminal network investigations. % include commission reports as indications of process related problems .. to "play a little politics" !! Information, process, and human factors, are challenges we find to be addressable by software system support. Based on those...

  10. The Phenomenology of Specialization of Criminal Suspects

    Science.gov (United States)

    Tumminello, Michele; Edling, Christofer; Liljeros, Fredrik; Mantegna, Rosario N.; Sarnecki, Jerzy

    2013-01-01

    A criminal career can be either general, with the criminal committing different types of crimes, or specialized, with the criminal committing a specific type of crime. A central problem in the study of crime specialization is to determine, from the perspective of the criminal, which crimes should be considered similar and which crimes should be considered distinct. We study a large set of Swedish suspects to empirically investigate generalist and specialist behavior in crime. We show that there is a large group of suspects who can be described as generalists. At the same time, we observe a non-trivial pattern of specialization across age and gender of suspects. Women are less prone to commit crimes of certain types, and, for instance, are more prone to specialize in crimes related to fraud. We also find evidence of temporal specialization of suspects. Older persons are more specialized than younger ones, and some crime types are preferentially committed by suspects of different ages. PMID:23691257

  11. Employers liability to the international criminal court

    Directory of Open Access Journals (Sweden)

    Yenifer Yiseth Suárez Díaz

    2014-01-01

    Full Text Available The constant changes in the social dynamics due to economic and technological development has brought along the need to dispose of a High Court, with competence over International Crimes. The above was the reason to establish the International Criminal Court, destined to prosecute and punish the maximum responsible for crimes of its jurisdiction. Nonetheless, despite the existence of individual criminal responsibility as an accomplice in the case of entrepreneurs who contribute to the crime, there is not an actual investigation or conviction as such in the Court fase for those individuals. Through a criminological study, the actions in the frame of the criminal policy in international law, in order to hold individual criminal responsibility towards entrepreneurs for international crimes, will be evaluated, from the dogmatic categories established in the international guidelines as well as from international doctrine.

  12. Approaching Career Criminals With An Intelligence Cycle

    Science.gov (United States)

    2015-12-01

    adventures. The expected time remaining is a criminal career is five years for active offenders in their late teens while the expected time remaining...intelligence community tool—the intelligence cycle—to deal with career criminals effectively? This thesis studies serious- offender programs and the...use of the intelligence cycle by American intelligence agencies in order to create a model merging serious offender programs and intelligence cycles

  13. Criminal law and psychology: Connection points

    OpenAIRE

    Drakić Dragiša

    2014-01-01

    In the paper the author discovers and analyzes areas which represent points of connection between criminal law and psychology, the areas in which cooperation between these two fields of science is possible and desirable. This article is divided into several sections. Firstly, the author talks about the emergence of psychology as a science and its definition. In the sections that follow the author offers analysis of initial contact between ways of thinking in primeval criminal law and psycholo...

  14. Mental Health Treatment and Criminal Justice Outcomes

    OpenAIRE

    Richard Frank; Thomas G. McGuire

    2010-01-01

    Are many prisoners in jail or prison because of their mental illness? And if so, is mental health treatment a cost-effective way to reduce crime and lower criminal justice costs? This paper reviews and evaluates the evidence assessing the potential of expansion of mental health services for reducing crime. Mental illness and symptoms of mental illness are highly prevalent among adult and child criminal justice populations. The association between serious mental illness and violence and arrest...

  15. Status of Forces and Criminal Jurisdiction

    OpenAIRE

    Voetelink, J.

    2013-01-01

    This article examines the legal status of armed forces present in friendly foreign territory with a special focus on criminal jurisdiction. Traditionally, this issue has been considered from the perspective of public international law in which immunities play an important role. However, this perspective does not fully cover the criminal jurisdiction provisions in the international agreements dealing with the status of visiting forces (Status of Forces Agreements). This article introduces mili...

  16. Eastern Turkistan Islamic Movement: a case study of a new terrorist organization in China.

    Science.gov (United States)

    Wang, John Z

    2003-10-01

    The Eastern Turkistan Islamic Movement (ETIM) was designated a terrorist organization by Afghanistan, Kyrgyzstan, China, the United States, and the United Nations in 2002. However, no systematic studies have been published on the new terrorist organization in Xinjiang, China. Using a case-study approach and interviews, this article attempts to provide information in terms of its historical evaluation, related religious and ethnic issues, organizational agenda, activities, and role in the current international terrorist network. This article argues that better international cooperation and the improvement of social and religious policies will help curtail activities of the ETIM.

  17. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  18. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  19. Criminality and suicide: a longitudinal Swedish cohort study.

    Science.gov (United States)

    Stenbacka, M; Romelsjö, A; Jokinen, J

    2014-02-03

    This study aimed to investigate whether violent and non-violent offending were related to elevated risk of suicide. We also investigated whether the risk was higher among those with repeated offences and how experiences of substance misuse and suicide attempt modified the relationship. A nationwide prospective cohort study. A register study of 48 834 conscripted men in 1969/1970 in Sweden followed up during a 35-year period in official registers. A birth cohort of 48 834 men who were mandatory conscripted for military service in 1969/70 at the age of 18-20 years. Possible confounders were retrieved from psychological assessments at conscription and the cohort was linked to mortality and hospitalisation and crime records from 1970 onwards. Estimates of suicide risks were calculated as HR with 95% CIs using Cox proportional regression analyses with adjustment for potential confounding by family, psychological and behavioural factors including substance use and psychiatric disorders. Of the total cohort, 2671 (5.5%) persons died during the follow-up period. Of these, 615 (23%) persons died due to suicide. Non-violent criminality was evident for 29% and violent criminality for 4.7% of all the participants. In the crude model, the violent offenders had nearly five times higher risk (HR=4.69, 3.56 to 6.19) to die from suicide and non-violent criminals had about two times higher risk (HR=2.08, 1.72 to 2.52). In the fully adjusted model, the HRs were still significant for suicide in the non-violent group. Experiences of violent or non-violent criminality were associated with increased risk of suicide. Comorbidity with alcohol and substance use and psychiatric disorders modified the risk, but the suicide risk remained significantly elevated for non-violent criminals. It is crucial to identify offenders and especially repeated offenders who also suffer from alcohol or substance misuse and psychiatric illness in clinical settings in order to prevent suicide.

  20. THE CONVENTIONS ADOPTED WITHIN THE EUROPEAN UNION WITH REGARD TO THE INTERNATIONAL LEGAL ASSISTANCE IN CRIMINAL MATTERS

    Directory of Open Access Journals (Sweden)

    VICTORIA CRISTIEAN

    2012-05-01

    Full Text Available The study of the legal and penal mechanism by which European Union Member States jointly act for preventing and combating certain categories of crimes, includes the analysis of conventions regarding legal assistance that Member States undertake to grant each other the catching and prosecution of people who commit crimes on their territory, either violating the domestic criminal law or the international criminal law represented by international conventions that require signatory states to incriminate or punish certain categories of crimes, against which they pledged to fight together. Conventions adopted at European Union level concerning international legal assistance in criminal matters, give legal expression to the most complex and most effective form of cooperation between States in the fight against crime, establishing brand new ways of international legal assistance in criminal matters.The importance of the Conventions regarding legal assistance in criminal matters result from the fact that they ensure the correct application of European criminal law relating to combating the worst types of crimes, making possible criminal liability and conviction of various crimes, with the help of other member states of the European conventions.

  1. Criminal sanctions for legal enties: An instrument of crime control

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2016-01-01

    Full Text Available Although contemporary criminal law accepts the system of subjective criminal liability for a committed crime, numerous European legal documents as well as criminal laws, especially those that have been adopted lately, envisage exceptions from this system. Thus, a new form of criminal liability is being introduced: objective liability based on the causation. One of the forms of objective liability is the criminal liability of legal entities, which has been considered disputable for a long time. Obviously, legal entities cannot be held accountable for all types of criminal offences. They cannot be held liable on the grounds of legal provisions regarding mental competence and culpability (as the elements of subjective criminal liability, nor can they be imposed all types of criminal sanctions recognized in criminal legislation in general. In their new or revised criminal legislation, many countries have recognized and inagurated the objective criminal liability of legal persons for committed criminal offences alongside with the predominant system of subjective liability (based on the perpetrator's mental competence and culpability. It is indisputable that some legal entities (such as state authorities cannot be prosecuted and held liable in criminal proceedings; consequently, there are some exemptions from criminal liability (particularly when it comes to the state and state bodies, but it does not exclude criminal liability of responsible officials (natural persons for causing the consequences of a criminal offence. Due to the specific character of legal and contractual capacity of legal entities, law in general and criminal legislations in particular prescribe special legal grounds for establishing criminal liability of legal entities, which differ from the subjective liability of a natural person (perceived as a conscious and reasonable human being acting on his/her own free will where the consequence of a criminal offence is a result of one

  2. ENFORCEMENT PATTERN OF CRIMINAL LAW BASED ON HUMANITY VALUES IN THE UTILITY PRINCIPAL PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Gialdah Tapiansari Batubara

    2018-03-01

    Full Text Available [Enforcement Pattern Of Criminal Law Based On Humanity Values In The Utility Principal Perspective] The current Criminal Code is laden with weaknesses, so it is urgent to be replaced by a law-oriented Criminal Code that is closer to the characteristics of the Muslim law (Custom and Law Family, which features Indonesian characteristics (moving from the collective and personal order, reflecting the nation's political ideology of Pancasila. One of the selected Pancasila values ​​is humanitarian value. Human values ​​are values ​​that show respect for human beings, because they are essentially legal to human beings. In the realm of material criminal law, human values ​​are reflected in the principle of individualization of punishment (the principle of individuality, flexibility, modification, forgiveness, and culpability, as seen in the National Criminal Code Bill. Not accommodating humanitarian values ​​in the formulation stage will be fatal at the law enforcement stage, but it is also fatal if the error in the formulation stage is left at law enforcement stage, so it is necessary to nationalize the pattern of criminal law enforcement one of them based on humanitarian value, less focus on punishment, contain prevention strategies, strategies for imposition of prison criminal sanctions are ultimum remedium, benefit strategy and balance of interest protection and restoration of relations between perpetrators, victims, community and state, social defense strategy with a rational policy approach that includes the use of economic approach , productive action strategies and contribute to national development in order to realize the legal objectives of benefits. Keywords: Value, Humanity, Pancasila, Enforcement, Benefit.

  3. Criminal law repercussions on the Civil Protection System

    Science.gov (United States)

    Altamura, M.; Musso, L.

    2009-09-01

    The legal systems of our Countries provide the citizenship with a high level of protection. Personal safety and the protection of property are guaranteed by the State through organized structures among which we can include the Civil Protection. The progress of science and technology has greatly improved monitoring tools, currently used by the Civil Protection, which allow, to a certain extent, to predict and prevent risk and natural hazards. The assertion of an individual right, which in some cases has reached a constitutional rank, to benefit from Civil Protection services and the widespread perception throughout the citizenship of the competence of the system to prevent disasters, often causes people to take legal action against Civil Protection authorities should they fail in their duties to protect. However, the attempt of having both recognized an economic compensation for the suffered loss and the punishment of those whom misled, frequently undergoes criminal law. This process could have results that may jeopardize the effectiveness of Civil Protection service without meeting citizens’ demands. A dual effort is thus necessary in order to solve such a problem. On the one hand, an interdisciplinary knowledge needs to pervade criminal law in an attempt to relieve its self-referentiality and pretended supremacy. On the other hand an alternative, and more agile, system -such as civil or administrative law- has to be identified in order to respond to the legitimate requests for protection in the case of a faulty behaviour of the authorities.

  4. Administrative prejudgment in the Russian criminal law

    Directory of Open Access Journals (Sweden)

    Akhat Akhnafovich Yunusov

    2015-03-01

    Full Text Available Objective basing on the research of formation and development of the administrative prejudgment in the Russian criminal law and comparativelegal analysis of this institution as well as the longterm experience in crime investigation to trace the problems and trends of administrative prejudgment and prove the necessity to introduce or to be more precise legalize the administrative prejudgment in the Russian criminal law. Methods the research is based on the general dialectic method of cognition comparative historical formaljuridical methods as well as special and privatelegal methods of research. Results analysis of the main problems and collisions of administrative prejudgment in the Russian criminal law the doctrine and the practice of implementation of this institution can become the basis for legalization of the administrative prejudgment in the Russian criminal law and implementing it for the crimes stipulated in the Special part of the Russian Criminal Code if they are of low or middle gravity and committed intentionally those most often occurred. The article studies the institution of the administrative prejudgment in the Russian criminal law since 1922 until present. Various researchersrsquo opinions are given for and against returning of this institution. Taking into account the criminological indicators the authors express their own opinion on legalization of the administrative prejudgment. Scientific novelty having abandoned the formal approach to the institution of the administrative prejudgment both in the Russian criminal law and in the foreign laws the authors believe that the criminal personality should be the central factor of the administrative prejudgment legalization. In this context the authors state the direct connection between the personal features of a criminal including their inclination to immoral and illegal behavior and the crime committed by them. Practical value the theoretical conclusions formulated in the research

  5. The suspended sentence in German criminal law

    Directory of Open Access Journals (Sweden)

    Jovašević Dragan

    2017-01-01

    Full Text Available From the ancient times until today, criminal law in all countries has provided different criminal sanctions as social control measures. These are court-imposed coercive measures that take away or limit certain rights and freedoms of criminal offenders. Sanctions are applied to natural or legal persons who violate the norms of the legal order and cause damage or endanger other legal goods that enjoy legal protection. In order to effectively protect social values jeopardized by the commission of crime, state legislations prescribe several kinds of criminal sanctions: 1 penalties, 2 precautions, 3 safety measures, 4 penalties for juvenile offenders, and 5 sanctions for legal persons. Penalties are the basic, the oldest and the most important type of criminal sanctions. They are prescribed for the largest number of criminal offences. Imposed instead of or alongside with penalties, warning measures have particularly important role in jurisprudence. Since they were introduced in the system of criminal sanctions in the early 20th century, there has been a notable increase in the application of these measures, particularly in cases involving negligent and accidental offences, and minor offences that do not cause serious consequences, whose perpetrators are not persons with criminal characteristics. Warning measures (suspended sentence are envisaged in all contemporary criminal legislations, including the German legislation. Suspended sentence is a conditional stay of execution of the sentence of imprisonment for a specified time, provided that the convicted person fulfills the imposed obligations and does not commit another criminal offense. Two conditions must be fulfilled for the application of these sanctions: a the formal requirement, which is attached to the sentence of imprisonment; and b the substantive requirement, which implies the court assessment that the application of these sanctions is justified and necessary in a particular case. Many

  6. HIV Treatment in the Criminal Justice System: Critical Knowledge and Intervention Gaps

    Directory of Open Access Journals (Sweden)

    Jaimie P. Meyer

    2011-01-01

    Full Text Available The criminal justice system bears a disproportionate burden of the HIV epidemic. Continuity of care is critical for HAART-based prevention of HIV-related morbidity and mortality. This paper describes four major challenges to successful management of HIV in the criminal justice system: relapse to substance use, homelessness, mental illness, and loss of medical and social benefits. Each of these areas constitutes a competing priority upon release that demands immediate attention and diverts time, energy, and valuable resources away from engagement in care and adherence to HAART. Numerous gaps exist in scientific knowledge about these issues and potential solutions. In illuminating these knowledge deficits, we present a contemporary research agenda for the management of HIV in correctional systems. Future empirical research should focus on these critical issues in HIV-infected prisoners and releasees while interventional research should incorporate evidence-based solutions into the criminal justice setting.

  7. HIV Treatment in the Criminal Justice System: Critical Knowledge and Intervention Gaps.

    Science.gov (United States)

    Meyer, Jaimie P; Chen, Nadine E; Springer, Sandra A

    2011-01-01

    The criminal justice system bears a disproportionate burden of the HIV epidemic. Continuity of care is critical for HAART-based prevention of HIV-related morbidity and mortality. This paper describes four major challenges to successful management of HIV in the criminal justice system: relapse to substance use, homelessness, mental illness, and loss of medical and social benefits. Each of these areas constitutes a competing priority upon release that demands immediate attention and diverts time, energy, and valuable resources away from engagement in care and adherence to HAART. Numerous gaps exist in scientific knowledge about these issues and potential solutions. In illuminating these knowledge deficits, we present a contemporary research agenda for the management of HIV in correctional systems. Future empirical research should focus on these critical issues in HIV-infected prisoners and releasees while interventional research should incorporate evidence-based solutions into the criminal justice setting.

  8. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  9. MINIMIZING THE VULNERABILITY OF WATER SUPPLIES TO NATURAL AND TERRORIST THREATS

    Science.gov (United States)

    There is increasing concern that drinking water utilities may be vulnerable to attacks by terrorists. In the US the President's Commission on Critical Infrastructure Protection has concluded the US drinking water utilities are vulnerable to physical, cyber and biological terroris...

  10. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  11. Fandoriana - 3 : terrorist-gossudarstvennik protiv terrorista-revoljutsionera / Boris Tuch

    Index Scriptorium Estoniae

    Tuch, Boris, 1946-

    2005-01-01

    Mängufilm "Riiginõunik" Boriss Akunini romaani järgi : režissöör Filipp Jankovski. Fandorini osas Oleg Menshikov, terrorist Grin - Konstantin Habenski, krahv Pozharski - Nikita Mihhalkov : Venemaa 2005

  12. Carnage interrupted : an analysis of fifteen terrorist plots against public surface transportation.

    Science.gov (United States)

    2012-04-01

    This report examines 13 terrorist plots against public surface transportation that were uncovered and foiled by authorities between 1997 and 2010 and two failed attempts to carry out attacks. Certainly, this is not the total universe of foiled or fai...

  13. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  14. Military Operations Against Terrorist Groups Abroad: Implications for the United States Air Force

    National Research Council Canada - National Science Library

    Ochmanek, David

    2003-01-01

    .... The purpose of this study is to help defense planners anticipate the types of demands that future operations against terrorists will place on the armed forces of the United States, particularly...

  15. Violent and Non-Violent Criminal Behavior among Young Chinese Drug Users: A Mixed Methods Study.

    Science.gov (United States)

    Liu, Liu; Chui, Wing Hong; Chen, Ye

    2018-03-02

    Young drug users are found to be increasingly involved in criminal justice issues. This exploratory and descriptive study aims to analyze the criminal behaviors among young Chinese drug users through a mixed methods research design. Quantitative analysis indicates that young drug users with and without a history of criminality show significant differences in terms of several features. Male drug users, particularly, those who are older, with religious beliefs, and initiated into drug use at younger age were most likely to commit crimes. Among drug users with criminal experiences, those who committed crimes prior to drug initiation have a greater likelihood of committing violent crimes. Furthermore, young drug users with severe depression are more likely to commit crimes, especially violent ones. Qualitative analysis further illustrates that young male drug users often get involved in criminal conduct of the youth gang nature with propensity for engaging in violent crimes as compared to their female counterparts who are more likely to turn into drug dealers and traffickers, in addition to engaging in larceny. The research findings are consistent with developmental theories and "victim to offender cycle". Integrated mental health and substance use services are suggested for crime prevention among young Chinese drug users.

  16. Violent and Non-Violent Criminal Behavior among Young Chinese Drug Users: A Mixed Methods Study

    Directory of Open Access Journals (Sweden)

    Liu Liu

    2018-03-01

    Full Text Available Young drug users are found to be increasingly involved in criminal justice issues. This exploratory and descriptive study aims to analyze the criminal behaviors among young Chinese drug users through a mixed methods research design. Quantitative analysis indicates that young drug users with and without a history of criminality show significant differences in terms of several features. Male drug users, particularly, those who are older, with religious beliefs, and initiated into drug use at younger age were most likely to commit crimes. Among drug users with criminal experiences, those who committed crimes prior to drug initiation have a greater likelihood of committing violent crimes. Furthermore, young drug users with severe depression are more likely to commit crimes, especially violent ones. Qualitative analysis further illustrates that young male drug users often get involved in criminal conduct of the youth gang nature with propensity for engaging in violent crimes as compared to their female counterparts who are more likely to turn into drug dealers and traffickers, in addition to engaging in larceny. The research findings are consistent with developmental theories and “victim to offender cycle”. Integrated mental health and substance use services are suggested for crime prevention among young Chinese drug users.

  17. The Use of Terrorist Tactics as Instruments for Causing Change in Japan: 1920-1936,

    Science.gov (United States)

    1986-01-08

    was the ’different usage’ classically expressed by Hashimoto Sanai (Acquire mechanical arts from others, retain righteouness, sympathy, and filial piety ...AD-Ai65 976 THE USE OF TERRORIST TACTICS AS INSTRUNENTS FOR CAUSING III C4HANGE IN JAPAN: 928-i936(U) DEFENSE INTELLIGENCE COLL WASHINGTON DC J H...FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO * . 11. TITLE (Include Security Classification) The Use of Terrorist Tactics

  18. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  19. Authorities for Military Operations Against Terrorist Groups: The State of the Debate and Options for Congress

    Science.gov (United States)

    2016-01-01

    public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax -deductible...activities by forc- ing terrorists to operate under extreme secrecy and making would-be recruits and supporters risk death to participate. In other words...intent on attacking the West. It is important not to overestimate the ability to describe the tax - onomy of terrorist enemies, however. For example

  20. Drug abuse and criminal family records in the criminal history of prisoners

    Directory of Open Access Journals (Sweden)

    Cristina Estrada

    2011-07-01

    Full Text Available The relationship between criminal behavior and the risk factors, family criminal records and drug use, has been firmly established. With the aim of defining the role of these risk factors in the initiation and evolution of criminal behavior, a field study with prison inmates was designed. A survival analysis with the age at which the first unsanctioned crime was committed and the age at which entered by first instance into prison was applied to the data of 157 prison inmates in Villabona (Asturias, Spain. The results of a survival analysis showed that drug abuse re-offenders initiated in criminal acts at an earlier age (13 years than the primary offenders (16 years; re-offenders from family criminal records began his/her criminal activity earlier (13 years than primary ones (16 years; re-offenders with non-criminal family records, initiate in criminal acts at 14 years, whereas primary at 16; the recidivist drug abusers enter by first instance into prison earlier (19 years than the primary ones; non-drug consuming primary offenders enter prison for the first time at the age of 24 whereas recidivists do so at the age of 19; the first entrance into prison of the recidivist with family criminal records occurs early (19 years, than for the primary offenders (23 years; and the recidivist prisoners of non-family criminal records cross the threshold of the prison by first time youngsters (21 years than the primary inmates (26 years. The implications of these results may lead towards a more effective intervention against crime.

  1. Terrorist Stabbings-Distinctive Characteristics and How to Prepare for Them.

    Science.gov (United States)

    Merin, Ofer; Sonkin, Roman; Yitzhak, Avraham; Frenkel, Hagai; Leiba, Adi; Schwarz, Alon D; Jaffe, Eli

    2017-10-01

    The number of terror attack incidents is on the increase worldwide. The knife is one of the weapons most commonly used among terrorists. Appropriate preparation in trauma units for coping with the increasing numbers of terrorist-inflicted stabbings is different from the preparation suitable for civilian stabbings. Therapeutic and logistic guidelines need to be adjusted to accommodate those differences. Characterize the unique injuries related to terrorist stabbing, and suggest preparedness actions. Retrospective data on all terrorist-inflicted stabbing incidents between September 2015 and May 2016 were retrieved from the database of the national Israeli emergency medical services and from the Israeli Defense Forces Medical Corps records. There were a total of 414 civilian victims (34 fatalities) of terror incidents. Of these, 161 involved stabbings during 106 separate incidents. There was more than 1 stab wound per patient in approximately 60% of cases, and more than 1 victim in approximately 40% of cases. Unlike civilian stabbings, terrorist stabbings were characterized by more commonly occurring to the upper part of the body, being executed by large knives with high force, and involving multiple and more severe injuries. There is a clear distinction between the characteristics of wounds resulting from civilian stabbings and those incurred by acts of terror. Terrorists intend to injure as many random victims as possible, and trauma units need to be prepared to cope with the simultaneous admission of multiple patients with penetrating and often life-threatening knife wounds. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Major depressive disorder following terrorist attacks: a systematic review of prevalence, course and correlates.

    Science.gov (United States)

    Salguero, José M; Fernández-Berrocal, Pablo; Iruarrizaga, Itziar; Cano-Vindel, Antonio; Galea, Sandro

    2011-06-01

    Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed.

  3. Some Common Issues and the Application of more Favorable Criminal Law for Crimes against the Person according to the New Criminal Code

    Directory of Open Access Journals (Sweden)

    Ion Rusu

    2015-12-01

    Full Text Available The paper examines the main common issues of crimes against the person, and some other situations of more favorable criminal law enforcement. The innovations consist in the conducted examination and the views expressed on some situations in which the more favorable criminal law should be applied. The main change with a strong preventive feature is to introduce the two institutions, namely, the renunciation of applying the punishment and postponing the punishment, which generally is given a favoring regime to physical or legal entities being at their first conflict with the law or in the case of committing crimes whose seriousness is reduced. The paper continues other papers published in the field, and it can be useful both to academics and practitioners in the domain of preventing and combating crime of this kind.

  4. China's criminal penalty for medical malpractice: too lenient or not?

    Science.gov (United States)

    Zhu, Sun; Li, Lei; Li, Yuanchao

    2011-05-01

    Although China had greatly improved its health and medical system, the contradiction between arduous medical tasks and insufficient health resources has not been fundamentally resolved. This contradiction raised a large number of legal issues in medical industry. Literatures about these issues are usually published in legal journal, and are not easy accessible to clinicians. We thus provide clinicians a brief introduction to the legal liability of medical malpractice, and describe the debate about the punishment setting of China's medical malpractice crime in detail. Considering the complexity and humanitarian nature of medical practice, legislators set a relative lenient punishment system for medical malpractice crime. But the "aggravating" supporter argued that, judging from criminal jurisprudence, only serious irresponsible medical personnel might face criminal penalty, so severe penalty was not conflict with the humanitarian nature of medical work. They also deemed that, too lenient penalties of this crime had broken the internal harmony of Criminal Law, and violated the basic principles of law. The opponents believed that: although the statutory penalty for medical malpractice crime seemed lenient, the declared sentence was more severe than surrounding areas. And, too severe penalties would not only aggravate the shortage of Chinese medical personnel, but also deteriorate the unbalanced physician-patient relationship. So, they did not agree enhancing the penalty of medical malpractice crime. We propose to add disqualification to the punishment setting of medical malpractice crime, reform the health system more thoroughly. We also hope Chinese governments could encourage medicolegal research. And, from the viewpoint of risk management in health care, we emphasize the role of Medical Professional Liability Insurance system as a powerful tool to prevent medical malpractice. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  5. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  6. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  7. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  8. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  9. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  10. Enhancing public health preparedness for a terrorist attack involving cyanide.

    Science.gov (United States)

    Eckstein, Marc

    2008-07-01

    The US government considers cyanide to be among the most likely agents of chemical terrorism. Cyanide differs from many other biological or chemical agents for which little or no defense is available because its individual and public health effects are largely remediable through appropriate preparedness and response. Because the toxicity of the cyanide antidote currently available in the United States renders it ill-suited for use in terrorist incidents and other situations requiring rapid out-of-hospital treatment, hydroxocobalamin--an effective and safe cyanide antidote being used in other countries--has been introduced in the United States. Unlike the other available cyanide antidote, hydroxocobalamin can be administered at the scene of a cyanide disaster, and it need not be reserved for cases of confirmed cyanide poisoning but can be administered in cases of suspected poisoning. Both of these attributes facilitate the rapid intervention necessary for saving lives. To realize the potential benefits of hydroxocobalamin, progress also needs to be realized in other aspects of readiness, including but not limited to developing plans for ensuring local and regional availability of antidote, educating emergency responders and health care professionals in the recognition and management of cyanide poisoning, and raising public awareness of the potential for a chemical weapons attack and of how to respond.

  11. Posttraumatic Stress Disorder Following the September 11, 2001, Terrorist Attacks

    Science.gov (United States)

    Neria, Yuval; DiGrande, Laura; Adams, Ben G.

    2012-01-01

    The September 11, 2001 (9/11), terrorist attacks were unprecedented in their magnitude and aftermath. In the wake of the attacks, researchers reported a wide range of mental and physical health outcomes, with posttraumatic stress disorder (PTSD) the one most commonly studied. In this review, we aim to assess the evidence about PTSD among highly exposed populations in the first 10 years after the 9/11 attacks. We performed a systematic review. Eligible studies included original reports based on the full Diagnostic and Statistical Manual of Mental Disorders (4th ed., rev.; American Psychiatric Association, 2000) criteria of PTSD among highly exposed populations such as those living or working within close proximity to the World Trade Center (WTC) and the Pentagon in New York City and Washington, DC, respectively, and first responders, including rescue, cleaning, and recovery workers. The large body of research conducted after the 9/11 attacks in the past decade suggests that the burden of PTSD among persons with high exposure to 9/11 was substantial. PTSD that was 9/11-related was associated with a wide range of correlates, including sociodemographic and background factors, event exposure characteristics, loss of life of significant others, and social support factors. Few studies used longitudinal study design or clinical assessments, and no studies reported findings beyond six years post-9/11, thus hindering documentation of the long-term course of confirmed PTSD. Future directions for research are discussed. PMID:21823772

  12. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ training test scores occurred in each of the three groups. There was a clear improvement in the knowledge of the students after the training when pre- and post-training test scores were compared within the three groups. The greatest improvement was seen in the citizens/first responders group. 2017.

  13. Legal access to alcohol and criminality.

    Science.gov (United States)

    Hansen, Benjamin; Waddell, Glen R

    2017-08-14

    Previous research has found strong evidence that legal access to alcohol is associated with sizable increases in criminality. We revisit this relationship using the census of judicial records on criminal charges filed in Oregon Courts, the ability to separately track crimes involving firearms, and to track individuals over time. We find that crime increases at age 21, with increases mostly due to assaults that lack premeditation, and alcohol-related nuisance crimes. We find no evident increases in rape or robbery. Among those with no prior criminal records, increases in crime are 50% larger-still larger for the most socially costly crimes of assault and drunk driving. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Conflicts of Jurisdiction in Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Mihail Silviu Pocora

    2015-05-01

    Full Text Available This paper will consider the practical settlement of conflicts of jurisdiction both in relation to the forum for prosecution and transfer of proceedings. The corollary of free movement of people is free movement of judgments, sentences and related powers of investigation and prosecution. Cross border crime requires to be addressed by equipping law enforcement and prosecution authorities with mechanisms to ensure the public interest in the investigation and prosecution of crime is met. The starting point for any consideration is the place where the criminal conduct took place. Sometimes the crime is such that criminal jurisdiction will be fixed - such as theft of property, crimes of violence - where others have an impact or criminal conduct in more than one jurisdiction - drug importation, major transnational drug dealing, human trafficking, terrorism.

  15. BRIEF CONSIDERATIONS REGARDING MEDIATION IN CRIMINAL MATTERS

    Directory of Open Access Journals (Sweden)

    LUMINITA DRAGNE

    2012-05-01

    Full Text Available Mediation is an alternative means of conflict resolution, is designed as a flexible procedure whose utility was observed in contrast to the deficiencies of the judiciary system. In the field of criminal law, mediation is part of the larger concept of the restorative justice whose aim is restoring the main victim in its rights. From this perspective, to the criminal process is intended, in principal, repairing of the victim's prejudice and, subsequently, to encourage the delinquent in taking responsibility and to acknowledge his guilt, and also to determine him to actively participate in repairing the damage caused. The ultimate goal of the process is giving back the delinquent to society and consequently, reducing the relapse. Romanian legislator has not taken this concept, and how it is regulated mediation in criminal matters is hesitant, cautious and ultimately ineffective. Specifically, in situations that will actually occur, victim-delinquent mediation will only take the form of "assisted reconciliation."

  16. The psychiatric defence and international criminal law.

    Science.gov (United States)

    Tobin, John

    2007-01-01

    Following the development of the International Criminal Court (ICC) the mental state of the perpetrators of genocide, crimes against humanity and war crimes will become a more important issue in regard to defence and mitigating factors. This article examines how the International Criminal Tribunal for the Former Yugoslavia (ICTY) in particular has dealt with the mental illness defence to date, and how its judgements can serve as guidance for the ICC as it becomes the major international court of the future. The absence of a mental health defence in the Statutes of the ICTY and the International Criminal Tribunal for Rwanda has led to a reliance on the Rules of Procedure and Evidence of the two tribunals. There are major difficulties in using the mental health defence as it is defined in the Statutes of the ICC because of a requirement for the destruction of mental capacity as a valid defence. Fitness to plead and the defence of intoxication are also examined.

  17. Violent criminal behavior and perspectives on treatment of criminality in opiate treatment.

    Science.gov (United States)

    Mays, Darren M; Gordon, Adam J; Kelly, Mary E; Forman, Steven D

    2005-06-01

    This study describes and compares the characteristics of patients within a VA Opiate Substitution Therapy Program (OSTP) who report arrests for non-violent and violent crimes and describes patients' attitudes and preferences of criminal treatment within an OSTP. An anonymous survey was distributed to all veterans at one VA-OSTP. Analyses were conducted to describe the sample characteristics and their associations with prior violent and non-violent criminal behavior. A majority of participants were Caucasian, male, middle-aged, unemployed, and had a history of injection drug use. Participants reported arrests for violent (44%), non-violent (47%), and unspecified crimes (16%). There were few significant differences on demographic and drug use characteristics between participants who reported arrests for any violent and only non-violent crimes, and no arrests. Slightly fewer than half the subjects were satisfied with their ability to access treatment for past criminal behavior within or outside of the VA treatment settings. More veterans reporting violent arrests were satisfied with services addressing criminal behavior within the VA-OSTP than were veterans reporting only nonviolent arrests. Nearly equal proportions of veterans reporting violent (45%) and non-violent (44%) arrests reported dissatisfaction with such services received outside of the VA-OSTP. Prior violent criminal behavior is common among participants of a VA-OSTP. Many individuals with criminal histories seek treatment for criminality within VA-OSTP.

  18. Criminal aspect of injuries in sports

    Directory of Open Access Journals (Sweden)

    Mandarić Sanja

    2016-01-01

    Full Text Available In this paper the concept of sports ethics is defined and attention is directed to kinds of behavior which are not considered as fair play, the general conception of criminal offence as well as the elements of general idea of criminal act, unlawfulness and guilt with special attention paid to the basis on which unlawfulness and delict, and with them, the criminal offence itself are excluded. Consent of the injured party as basis for excluding unlawfulness has been carefully considered, with emphasis on the fact that with accepting to participate is a certain sport an athlete does not consent to be hurt outside the frame which rules of a particular sport imply. The attitude is accepted that with his consent an athlete consented to the possibility for his integrity be endangered, which still does not mean that he consented to be injured indeed, i.e. a difference is recognized between the consequence of endangering and the consequence of injuring protected assets. After that, rules which are applied in certain sports are explained and connected with the acceptance of the injured party, and the stand is taken that acceptance of the injured party excludes existence of criminal deed only in a situation when an injury occurred within the rules of a particular sport. If the injury occurred by breaking the rules of the sport, it would be considered as a criminal act. In conclusion, the stand is taken that it is necessary to fight against all harmful occurrences in sports, including the injuries which occurred due to severe violation of rules which should be applied in a particular sport. It is concluded that consent of the injured party must not be an excuse for not applying criminal justice, if the injury occurred by violation of the rules of a particular sport.

  19. International Criminal Justice and the Politics of Compliance

    NARCIS (Netherlands)

    Lamont, Christopher

    2010-01-01

    International Criminal Justice and the Politics of Compliance provides a comprehensive study of compliance with legal obligations derived from the International Criminal Tribunal for the former Yugoslavia's (ICTY) Statute and integrates theoretical debates on compliance into international justice

  20. 76 FR 44757 - Blocking Property of Transnational Criminal Organizations

    Science.gov (United States)

    2011-07-27

    ... Property of Transnational Criminal Organizations By the authority vested in me as President by the... America, find that the activities of significant transnational criminal organizations, such as those... of international political and economic systems. Such organizations are becoming increasingly...

  1. Diagnosis of antisocial personality disorder and criminal responsibility

    NARCIS (Netherlands)

    Spaans, M.; Barendregt, M.; Haan, B.; Nijman, H.L.I.; Beurs, E. de

    2011-01-01

    The present study empirically investigates whether personality disorders and psychopathic traits in criminal suspects are reasons for diminished criminal responsibility or enforced treatment in high security hospitals. Recently, the tenability of the claim that individuals with personality disorders

  2. Criminal Procedural Agreements in China and England and Wales

    NARCIS (Netherlands)

    W. Pei (Wei)

    2015-01-01

    markdownabstract__Abstract__ The past decades have witnessed a marked convergence of various practices alongside conventional criminal proceedings containing negotiations and resulting in agreements between suspects or defendants and criminal justice authorities. These agreements, under the

  3. Criminalization of Homosexuality and Sex Ratios

    OpenAIRE

    Chang, Simon

    2015-01-01

    Sexual activities between consenting adults of the same sex are still criminalized in more than one third of the countries in the world despite a global wave of decriminalization in the past sixty years. This paper empirically investigates the effect of sex ratios, i.e. relative number of men to women, on the criminalization of same-sex sexual conducts. At the individual level, people in high sex ratio countries are found to be more hostile against homosexuality and the homosexuals than their...

  4. SECRECY IN THE SPANISH CRIMINAL PROCEDURE

    Directory of Open Access Journals (Sweden)

    Brenno Gimenes Cesca

    2016-06-01

    Full Text Available This paper analyzes the secrecy in the Spanish Criminal Procedure, explaining, first, its constitutional matrix. Due to the amplitude of the subject, it was decided to focus on specific issues. So, at first, it was studied the secrecy in the criminal procedure phases (sumario and juicio oral, referring also to secrecy in judicial decisions. After, it was researched the secrecy as protection to witnesses and experts. Then, the secrecy in evidence collection means, such as search and seizure; mailing and telephone calls interceptions; undercover agent. Finally, the professional secrecy

  5. Criminal and legal responsibilities in Tourette's syndrome.

    Science.gov (United States)

    Gullucayir, Sibel; Asirdizer, Mahmut; Yavuz, M Sunay; Zeyfeoglu, Yildiray; Ulucay, Tarik

    2009-01-01

    Tourette's Syndrome (TS) is a neuropsychological disorder characterized by the presence of multiple involuntary motor tics accompanied by one or more vocal tics. Articles about TS and criminal responsibility and the restriction of civil rights are limited. A person with TS was evaluated to consider his criminal responsibility after swearing at a referee during a football game. He was also evaluated as to whether or not he was capable of professionally driving a service bus. Additionally, medico-legal situations regarding military service, obtaining a shotgun license and marriages of patients with TS were considered.

  6. Criminal Policy Movements and Legal Education

    Directory of Open Access Journals (Sweden)

    Thula Rafaela de Oliveira Pires

    2016-10-01

    Full Text Available The article's intention is to make an analyse of the emerging criminal policy movements in Brazil, especially after the 1980 decade, and their influence on legal education. Based on empirical research in Law Course UNIFESO (Teresópolis- Rio de Janeiro, it is sought to identify the political and criminal discourses prevalent in positions of hegemonic power among the Law scholars. Beyond the necessity of interdisciplinary approach, it is defended a more radical critique of the knowledge production process, with the affiliation of decolonial perspective, fundamental for the deconstruction of punitive normalization standards adopted by the modern States, of colonial slave matrix.

  7. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  8. The Value Of Justice In Child Criminal Justice System A Review Of Indonesian Criminal Law

    Directory of Open Access Journals (Sweden)

    Andi Sofyan

    2015-08-01

    Full Text Available The value of justice in Act No. 11 of 2012 concerns the Child Criminal Justice System Act No. SPPA confirms the Restorative Justice Approach as a method of disputes resolution. The method of research used was normative-legal research with philosophical approach. The results showed that the value of restorative justice through diversion contained in Act SPPA but the diversion limit for certain types of criminal acts and threats of punishment under seven 7 years and not a repetition criminal recidivists. This indicates that Act SPPA still contained a retributive justice not promote the interests of protection for child.

  9. Criminal Drug Policy: The Role of Public Defense and Criminal Selectiveness

    Directory of Open Access Journals (Sweden)

    Paulo Thiago Fernandes Dias

    2016-12-01

    Full Text Available The present study sought to analyze the importance of the Public Defender's Office in the defense of persons accused of drug trafficking and the study of criminal selectivity in the current Criminal Drug Policy in Brazil. For the clientele of the penal system is usually composed of people belonging to the lowest social levels and these are precisely those assisted by the Public Defender, since they are part of this process of selective and unequal criminalization of people within the total population and are the main targets Of the stereotype pursued as drug trafficker.

  10. The meaning of collective terrorist threat: understanding the subjective causes of terrorism reduces its negative psychological impact.

    Science.gov (United States)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    2011-05-01

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of intellectual meaning (induced by providing additional information about potential economic, cultural, and historical reasons for the terrorist attack) on perceived terrorist threat and associated emotional well-being. Study 1 revealed that pictures of terrorist attacks elicited less experienced terrorist threat when they were presented with background information about the terrorists' motives (meaning provided) rather than without additional background information (no meaning provided). Study 2 replicated this effect with a different manipulation of terrorist threat (i.e., newspaper article) and clarified the underlying psychological process: Participants in the high terror salience condition with meaning provided experienced less terrorist threat and thus more emotional well-being in the face of crisis than participants in the high terror salience condition without meaning provided. Theoretical and practical implications in the context of psychological health and mass media effects are discussed.

  11. Ultima Ratio in European Criminal Law

    Directory of Open Access Journals (Sweden)

    Sakari Melander

    2013-01-01

    Full Text Available The ultima ratio principle is one of the most well known traditional principles of criminal law. The principle has emphasized the repressive nature of the criminal justice system and positioned it as the last resort of the legislator. The principle has been developed mainly in legal scholarship with a national undertone, while criminal law has traditionally been seen as a pronouncedly national branch of law. However, criminal law has recently been strongly internationalized and Europeanized. This development necessarily needs to affect the principles that legitimate the use of the criminal justice system. There is a need for developing principles that could legitimate criminal law (cooperation that surpasses the national level. The article, thus, examines whether there is a role for the ultima ratio principle in European criminal law. The main focus is on EU criminal law. The article suggests that there are several signs of recognizing the ultima ratio principle in EU criminal law. The principle is recognizable in the principle of subsidiarity, within which ultima ratio may have a federal dimension. Most of all, the principle of proportionality shares several similarities with the ultima ratio principle. If these dimensions were fully examined and utilized, there is a possibility that legitimizing principles for EU criminal law could be formulated at considerable depth. El principio de ultima ratio es uno de los principios tradicionales más conocidos del derecho penal. El principio ha puesto en relieve el carácter represivo del sistema de justicia penal y se ha convertido en el último recurso del legislador. El principio se ha desarrollado principalmente en la comunidad académica legal con un trasfondo nacional, mientras que el derecho penal se ha concebido tradicionalmente como una rama marcadamente nacional del derecho. En los últimos años, sin embargo, el derecho penal se ha internacionalizado y europeizado en gran medida. Esta evoluci

  12. Sexual stigma, criminalization, investment, and access to HIV services among men who have sex with men worldwide.

    Science.gov (United States)

    Arreola, Sonya; Santos, Glenn-Milo; Beck, Jack; Sundararaj, Mohan; Wilson, Patrick A; Hebert, Pato; Makofane, Keletso; Do, Tri D; Ayala, George

    2015-02-01

    Globally, HIV disproportionately affects men who have sex with men (MSM). This study explored associations between access to HIV services and (1) individual-level perceived sexual stigma; (2) country-level criminalization of homosexuality; and (3) country-level investment in HIV services for MSM. 3,340 MSM completed an online survey assessing access to HIV services. MSM from over 115 countries were categorized according to criminalization of homosexuality policy and investment in HIV services targeting MSM. Lower access to condoms, lubricants, and HIV testing were each associated with greater perceived sexual stigma, existence of homosexuality criminalization policies, and less investment in HIV services. Lower access to HIV treatment was associated with greater perceived sexual stigma and criminalization. Criminalization of homosexuality and low investment in HIV services were both associated with greater perceived sexual stigma. Efforts to prevent and treat HIV among MSM should be coupled with structural interventions to reduce stigma, overturn homosexuality criminalization policies, and increase investment in MSM-specific HIV services.

  13. Childhood and Adolescent Predictors of Late Onset Criminal Careers

    Science.gov (United States)

    Zara, Georgia; Farrington, David P.

    2009-01-01

    This study explores the emergence of a criminal career in adulthood. The main hypothesis tested is that late criminal onset (at age 21 or later) is influenced by early factors that delay antisocial manifestations. The Cambridge Study in Delinquent Development (CSDD) was used to examine early determinants of criminal behavior. 400 Inner London…

  14. Criminal adjudication by state courts under the FDRE constitution ...

    African Journals Online (AJOL)

    On the one hand, the dualism of the court structure presupposes that the federal courts adjudicate federal criminal matters, where as state courts adjudicate state criminal matters. This principle is accompanied by an exception that the state courts adjudicate federal criminal matters by delegation power. On the other hand, ...

  15. The Criminal Personality: A Dialogue with Stanton Samenow.

    Science.gov (United States)

    Harris, George A.

    1984-01-01

    Interviews Stanton Samenow who explains his belief that environmental conditions and mental illness do not cause criminal behavior, and defends the clinical approach used in his work. Describes his recent book "Inside the Criminal Mind" and its recommendations for change of government policy toward criminals. (LLL)

  16. 33 CFR 1.07-90 - Criminal penalties.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Criminal penalties. 1.07-90... GENERAL PROVISIONS Enforcement; Civil and Criminal Penalty Proceedings § 1.07-90 Criminal penalties. (a... death. (2) Marine Boards (46 CFR part 4). (3) Violations of port security regulations (33 CFR parts 6...

  17. The Productivity of Criminology and Criminal Justice Faculty.

    Science.gov (United States)

    DeZee, Matthew R.

    The scholarly productivity of criminology and criminal justice faculty and programs was investigated. The methodologies that were used to rate journals that publish articles in the criminology/criminal justice field and to select 71 schools with graduate programs in criminology or criminal justice are described. Primary interest focused on…

  18. On the Issue of the Concept "Coercive Criminality"

    Directory of Open Access Journals (Sweden)

    Pestereva Y. S.

    2014-04-01

    Full Text Available The article deals with the actual problems relating to the concept of coercive criminality. Here is determined the lexical scope of the concept "coercion"; the philosophical and criminal law contents of the researched term are compared; the types of the coercive criminality are determined.

  19. Fair Press or Trial Prejudice?: Perceptions of Criminal Defendants.

    Science.gov (United States)

    Sherard, Regina Ganelle

    1987-01-01

    Examines criminal defendants' perceptions of the free press/fair trial issue with respect to perceived influences of media coverage on the disposition of criminal cases and the outcome of criminal trials. Concludes that the press' influence on trials is generally perceived as minimal and fair. (MM)

  20. 32 CFR 635.5 - Police Intelligence/Criminal Information.

    Science.gov (United States)

    2010-07-01

    ..., an investigation by the military police, U.S. Army Criminal Investigation Command (USACIDC) or other... 32 National Defense 4 2010-07-01 2010-07-01 true Police Intelligence/Criminal Information. 635.5... ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Records Administration § 635.5 Police...

  1. Civilisation of Criminal Justice: Restorative Justice amongst other strategies

    NARCIS (Netherlands)

    J.R. Blad (John)

    2013-01-01

    markdownabstract__Abstract__ Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be explained? Could Is criminal justice becoming more and uncivilised if so, how could this be

  2. The criminal sanctions of commercial deceptions in Ethiopia: Could ...

    African Journals Online (AJOL)

    It has been contended that criminalization of commercial wrongs would chill economic activities due to the over-deterrence effect of criminal sanctions. However, a growing amount of legal literature has emerged in this area and it has indicated that deceptive commercial behaviors deserve criminal sanctions since they ...

  3. The right to a fair appeal in international criminal law

    NARCIS (Netherlands)

    Djukic, Drazan

    2017-01-01

    The Right to a Fair Appeal in International Criminal Law – Layman’s Summary A criminal trial does not end after the first judgment of a court. A person is only finally found guilty or innocent after one or more appeals. Appeals thus have an important place in the criminal justice system. However,

  4. 46 CFR 5.69 - Evidence of criminal liability.

    Science.gov (United States)

    2010-10-01

    ... INVESTIGATION REGULATIONS-PERSONNEL ACTION Statement of Policy and Interpretation § 5.69 Evidence of criminal liability. Evidence of criminal liability discovered during an investigation or hearing conducted pursuant... 46 Shipping 1 2010-10-01 2010-10-01 false Evidence of criminal liability. 5.69 Section 5.69...

  5. 21 CFR 1405.625 - Criminal drug statute.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Criminal drug statute. 1405.625 Section 1405.625 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1405.625 Criminal drug statute. Criminal drug statute means a...

  6. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  7. Predicting criminals' personality characteristics by using the Minnesota Multiphasic Personality Inventory (MMPI in committing type of crime

    Directory of Open Access Journals (Sweden)

    Mustafa Mohebbi

    2016-07-01

    Full Text Available Understanding criminals' personality characteristics could engender appropriate solutions for preventing crimes and treating criminals and the aim of the current work is to predict criminals' (robbers, swindlers and smugglers personality characteristics by using the Minnesota Multiphasic Personality Inventory (MMPI in committing type of crime. The research falls under the applied category in terms of goal while in terms of nature it is among surveydescriptive researches. The sample under investigation includes 480 people who were selected by way of classified random sampling method in a systematic form from among the population of criminals in the Central Prison, province of Kermanshah. The tool used in this paper is the Minnesota Multiphasic Personality Inventory (MMPI (short form of 71 questions. The results obtained from the Minnesota Multiphasic Personality Inventory (MMPI indicated that prevalence of anti-social personalitycharacteristics and mental weakness among robbers; depression, anti-social personality and schizophrenia among swindlers as well as anti-social traits, mental weakness and schizophrenia among smugglers are seen significantly. Also, the results of the variance analysis demonstrated that there is a significant difference between the (MMPI clinical scales among three groups of criminals (robbers, swindlers and smugglers on D scales (depression, Pd (Psychopathy deviation, Pt (Anxiety and psychosis, Sc (Schizophrenia and Ma (Hypomania (p<%5. Research findings revealed that criminals enjoy lower level of normal and positive personality dimensions. To sum up, we can infer that all personality characteristics exist in the population of criminals and therapy experts need to pay attention to all sorts of personalities for treating criminals affected with personality disorder.

  8. Page | 14 STATES' CRIMINAL JURISDICTION UNDER ...

    African Journals Online (AJOL)

    Fr. Ikenga

    Over the past few years, the extent to which international law allows States to exercise their jurisdiction .... International law also permits States to exercise criminal jurisdiction over crimes committed on foreign ..... Kourula, 'Universal Jurisdiction for Core International Crimes' in Bergsmo and Yan (eds) State Sovereignty.

  9. Page | 14 STATES' CRIMINAL JURISDICTION UNDER ...

    African Journals Online (AJOL)

    Fr. Ikenga

    Abstract. Over the past few years, the extent to which international law allows States to exercise their jurisdiction in criminal matters has been a subject of diplomatic tensions between States. The purpose of this paper is to shed some light, on the question as to what extent a State, powerful or weak, has a right under.

  10. CRIMINAL PSYCHOLOGY IN SPAIN: PRESENT AND FUTURE

    Directory of Open Access Journals (Sweden)

    José Luis González

    2015-05-01

    Full Text Available As part of legal psychology, as it is understood in Spain, we can distinguish between the applications of psychology in the different steps of the judicial process: in police stations during criminal investigations, in court when the perpetrators have already been identified and arrested, and in prisons where they are eventually sent after being convicted. This paper argues that when psychology assists the criminal investigation in the first step of the judicial process - the police activities-, we are talking about criminal psychology, at two levels: the operational level (mostly pertaining to criminal psychology and the strategic level (shared with other areas of expertise. After describing its peculiarities and specific areas, in analogy with the support provided by other forensic sciences, we explain that in Spain this specialty is carried out professionally from within our own police forces, with a profile that is very different from the more traditional police psychology, and in close collaboration with the academic environment with regard to the scientific development of techniques and procedures.

  11. Hyubris as a factor of individual criminal

    Directory of Open Access Journals (Sweden)

    V. V. Surkov

    2014-04-01

    Full Text Available Criminal personality for thousands of years is the object of philosophical research. For philosophical anthropology, in particular, it is important to understand which components of human nature can be regarded as criminal. The term “hubris” that appears in ancient Greek culture, today received its second wind. It is widely used (especially in the West to refer to the human outlook, which provokes too arrogant, defiant behavior, which is a public danger. The term “hubris” is often used in criticism of certain politicians. However, we propose to expand the scope of its application also in other spheres of public life. Іn the history of criminology there are many examples of people with hubris, especially among dangerous criminals. Therefore hubris can be considered as criminogenic factor that requires research and limitations of the society. In another case, there is a situation, by analogy with the term “intoxication of power”, can be called “intoxication of impunity”. This thesis is confirmed by authoritative theories developed in criminology, sociology, psychology too. It is also consistent with some modern philosophical views on the nature of the criminal personality. Analysis of factors that stimulate the emergence and growth of hubris, suggest that most are present in a mass society. It generates anomie (loss of values that щаеут manifests as hubris that can act as criminogenic factor. Therefore, hubris reducing requires changes in the organization of social life.

  12. Cyber Forensics Ontology for Cyber Criminal Investigation

    Science.gov (United States)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  13. Mapping Criminal Governance in African Cities | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will allow the Institute for Security Studies (ISS), through its Organized Crime and Money Laundering Programme (OCML), to explore the causal links between weak state authority and the emergence of criminal governance structures in two cities: Cape Town, South Africa, and Dakar, Sénégal. Researchers will ...

  14. 28 JURISDICTION OF THE INTERNATIONAL CRIMINAL COURT

    African Journals Online (AJOL)

    Fr. Ikenga

    a result of hard negotiations, it was agreed that the Rome Statute prohibits the criminal responsibility of persons for ... a given court has the power to determine a jurisdictional question is itself a jurisdictional question. ... Legally defined, jurisdiction is the power of a court to adjudicate cases and issue orders. Traditionally, an ...

  15. 22 CFR 1101.16 - Criminal penalties.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Criminal penalties. 1101.16 Section 1101.16 Foreign Relations INTERNATIONAL BOUNDARY AND WATER COMMISSION, UNITED STATES AND MEXICO, UNITED STATES... public notice of a system of records as required by 5 U.S.C. 552a(e)(4). ...

  16. The Hispanic Experience of Criminal Justice.

    Science.gov (United States)

    Sissons, Peter L.

    This monograph explores the Hispanic experience of the criminal justice system by examining statistics provided by Federal, State, and local agencies. A review of the literature provides a theoretical perspective from which to view the data. Examination of the first set of data begins with a description of the experiences of Puerto Ricans in the…

  17. Criminal Justice Research Is about People.

    Science.gov (United States)

    Conrad, John P.

    1982-01-01

    Suggests that the Golden Age of criminal justice research has ended with an impending era of austerity. Reviews the work done in the past forty years and recommends a return to the people-oriented research that characterized the Chicago School of the early '20s rather than systems research. (Author/JAC)

  18. Criminal Justice in America. Third Edition.

    Science.gov (United States)

    Hayes, Bill, Ed.

    This book, a comprehensive and interactive introductory text on criminal justice, consists of six units: (1) Crime: covers victims' rights, gangs, violent crime, white-collar crime, elements of crimes, legal defenses, methods for measuring crime, hate crime, computer crime, and a history of crime in the United States; (2) Police: explores local…

  19. Asset Freezing: Smart Sanction or Criminal Charge?

    Directory of Open Access Journals (Sweden)

    Melissa van den Broek

    2011-02-01

    Full Text Available In this article the question is asked whether asset freezing can be qualified as a criminal charge within the meaning of Article6 ECHR and if yes, what effects this qualification may have on the legislative framework on so called smart sanctions. Byanalysing Community and EU law and case law of the European Court of Human Rights, General Court of Instance andCourt of Justice of the European Communities the authors give an overview of the notion and possible qualification of assetfreezing as a criminal charge. The article further focusses on the consequenses of qualifying asset freezing as a criminal chargeunder ECHR and EC/EU law and concludes by answering the aforementioned question.This article is a rewrite of a research paper written under supervision of prof. dr. J.A.E. Vervaele and prof. dr. C.H. Brants(Willem Pompe Institute for Criminal Law and Criminology, Utrecht University School of Law, whom the authors wouldlike to thank for their useful comments and supervision.

  20. Media-Cultivated Perceptions of Criminal Victimization.

    Science.gov (United States)

    Ogles, Robert M.

    Many television viewers construct their social reality from media content as well as from sensory and interpersonally communicated information. One aspect of this media-influenced social reality is television viewers' estimates of crime in society, or their fear of criminal victimization. Several media-effects studies have demonstrated the…

  1. 25 CFR 41.13 - Criminal penalties.

    Science.gov (United States)

    2010-04-01

    ... INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION GRANTS TO TRIBALLY CONTROLLED COMMUNITY COLLEGES AND NAVAJO COMMUNITY COLLEGE Tribally Controlled Community Colleges § 41.13 Criminal penalties. Persons..., report, or other document, upon which the provision of Federal financial assistance or any other payment...

  2. 25 CFR 41.28 - Criminal penalties.

    Science.gov (United States)

    2010-04-01

    ... INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION GRANTS TO TRIBALLY CONTROLLED COMMUNITY COLLEGES AND NAVAJO COMMUNITY COLLEGE Navajo Community College § 41.28 Criminal penalties. Persons submitting or... other document, upon which the provision of the Federal financial assistance, or any other payment of...

  3. JUDICIAL COOPERATION IN THE CRIMINAL FIELD

    Directory of Open Access Journals (Sweden)

    Sanja Karceva

    2015-10-01

    Full Text Available The expansion of crime throughout the eras has increased at an alarming rate. It has expanded, evolved and gone through many different forms and stages. With the formation of the EU and the expulsion of internal borders, as well as the insurance of greater liberty and freedom of movement, acts of crime and the number of criminals have drastically increased. Its enormous growth and expansion, especially in the form of crime betwixt country borders (within EU territory, has desperately called for change and development within the norms of criminal law. However, with the view that criminal law in most EU nations has its own specific and varied markings, and since a supranational criminal law does not exist, there has arisen a dire need for cooperation within this sphere. The globalization of transnational organized crime and its entry within the legal sector of these member countries has been the reason for the development of court cooperation within Europe. Cooperation between the courts was achieved through a tight collaboration between the court services and other regulatory organs/authorities of the member countries. This court cooperation is conducted through very varied activities carried out by the different countries, which are in turn guaranteed through different conventions, bilateral and multilateral agreements/treaties. There exist many other kinds of legal support when viewing court cooperation that one member country can provide to another member country, for which information will be provided further in the text.

  4. Status of Forces and Criminal Jurisdiction

    NARCIS (Netherlands)

    Joop Voetelink

    2013-01-01

    This article examines the legal status of armed forces present in friendly foreign territory with a special focus on criminal jurisdiction. Traditionally, this issue has been considered from the perspective of public international law in which immunities play an important role. However, this

  5. Russian criminal corporate victimology: notion, subject, prospects

    OpenAIRE

    Kabanov, P.

    2012-01-01

    The article grounds the necessity to elaborate the modern field of victimilogy the Russian criminal corporate victimology, gives its criminological definition, describes the basic structural elements of the suggested scientific field, and marks the prospective directions of its development in the nearest future.

  6. White Collar Criminality: A Prediction Model

    Science.gov (United States)

    1991-01-01

    social disorganization, and conflict; sociological criminology takes a critical stance toward the society itself as generator of criminal conduct (Hagan...According to the theory, the environment contaminates the individual by promoting the internalization of criminalistic patterns, or by failing to...cited in Buikhuisen & Mednick, 1988, p. 9). 3 Psychology can contribute to criminology research by the application of its theories, both the

  7. Women, criminality and multifocal empowerment responses: some ...

    African Journals Online (AJOL)

    ... women constitute a growing subset of the entire prison population whose needs are different from those of men. whereas factors that draw women to criminal activities may not differ markedly for men and women, women's crime is a reaction to the special circumstances of their prolonged victimization and dispossession.

  8. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  9. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  10. Social, psychological, and psychiatric interventions following terrorist attacks: recommendations for practice and research.

    Science.gov (United States)

    Foa, Edna B; Cahill, Shawn P; Boscarino, Joseph A; Hobfoll, Stevan E; Lahad, Mooli; McNally, Richard J; Solomon, Zahava

    2005-10-01

    The terrorist attacks of September 11, 2001, and the constant threat of imminent terrorist activity have brought into the forefront the urgent need to prepare for the consequences of such attacks. Such preparation entails utilization of existing knowledge, identification of crucial gaps in our scientific knowledge, and taking steps to acquire this knowledge. At present, there is little empirical knowledge about interventions following terrorism and absolutely no available empirical knowledge about interventions following bioterrorism. Therefore, this paper reviews knowledge about (1) reactions following the September 11 terrorist attacks in New York City and other places, (2) the practical experiences accumulated in recent years in countries (eg, Israel) that have had to cope with the threat of bioterrorism and the reality of terrorism, and (3) interventions for acute and chronic stress reactions following other types of traumatic events (eg, rape, war, accidents). Our review found several treatments efficacious in treating individuals for acute and chronic post-traumatic stress disorder (PTSD) related to other traumatic events that will likely be efficacious in treating PTSD related to terrorist attacks. However, there were significant gaps in our knowledge about how to prepare populations and individuals for the possibility of a terrorist attack and what interventions to apply in the immediate aftermath of such an attack. Accordingly, we conclude the paper with several questions designed to guide future research.

  11. Abdominal trauma after terrorist bombing attacks exhibits a unique pattern of injury.

    Science.gov (United States)

    Bala, Miklosh; Rivkind, Avraham I; Zamir, Gideon; Hadar, Tal; Gertsenshtein, Iryna; Mintz, Yoav; Pikarsky, Alon J; Amar, Dalit; Shussman, Noam; Abu Gazala, Mahmoud; Almogy, Gidon

    2008-08-01

    The recent growth in the volume of civilian blast trauma caused by terrorist bombings warrants special attention to the specific pattern of injury associated with such attacks. To characterize the abdominal injuries inflicted by terrorist-related explosions and to compare the pattern of injury with civilian, penetrating and blunt, abdominal trauma. Retrospective analysis of prospectively collected data from 181 patients with abdominal trauma requiring laparotomy, who were admitted to the Hadassah Hospital, Jerusalem, Israel, from October 2000 to December 2005. Patients were divided into 3 groups according to mechanism of injury: terror-related blast injury (n = 21), gunshot wounds (GSW) (n = 73) and blunt trauma (n = 87). Median injury severity score in the blast group was significantly higher compared with GSW and blunt groups (34, 18, and 29, respectively, P or = 3) occurred in 85.7% of blast group, 28.8% of GSW group, and 59.7% of blunt group (P Terrorist attacks generate more severe injuries to more body regions than other types of trauma. Abdominal injury inflicted by terrorist bombings causes a unique pattern of wounds, mainly injury to hollow organs. Shrapnel is the leading cause of abdominal injury following terrorist bombings.

  12. Turning Asylum Seekers into ‘Dangerous Criminals’: Experiences of the Criminal Justice System of those Seeking Sanctuary

    Directory of Open Access Journals (Sweden)

    Monish Bhatia

    2015-10-01

    Full Text Available Since the events of 9/11 in the US in 2001 and, four years later, the 7/7 London bombings in the UK, warnings of terrorist attacks are high on the public agenda in many western countries. Politicians and tabloid press in the UK have continued to make direct and indirect connections between asylum seekers, terrorism and crime. This has increasingly resulted in harsh policy responses to restrict the movement of ‘third-world’ nationals, criminalisation of immigration and asylum policy, and making the violation of immigration laws punishable through criminal courts. This paper largely highlights the narratives of five asylum seekers who committed ‘crime’ by breaching immigration laws and were consequently treated as ‘dangerous criminals’ by the state authorities. More importantly it shows how these individuals experienced this treatment. The aim of this paper is to give voice to the victims of state abuse, claim space for victim agency, gather victim testimonies, challenge official explanations and in the process confront criminal and racist state practices.

  13. The Special Criminal Courts and Criminal Transaction: The Unnecessary Freedom of Private Penalty

    Directory of Open Access Journals (Sweden)

    Gleidysson José Brito de Carvalho

    2015-12-01

    Full Text Available This article aims to analyze the historical circumstances that led to the emergence of the Special Criminal Courts as well as the institutes introduced by Law No. 9,099 / 95, it emphasizes the criminal transaction. It can be notice that the inclusion of a new systematic procedural came from the need to give a better response to the petty crime. For this purpose, the paternal legislator inserted in the parental order some institutes, if they do not reformulate, which it aims to grant new possibilities to the criminal justice system, especially the criminal transaction, innovation which privilege the principle of no need deprivation of liberty. This way the composition of civil damages, the conditional suspension of the proceedings and the criminal transaction emerged as a way to introduce a thought turned to the consensual resolution of criminal claims, based on decriminalization. It was used bibliographical research as methodology. It aims to understand the historical moment that they gave the news, as well as the reason that led the legislator to choose this issue.

  14. Criminal proceedings involving children in conflict with the law

    Directory of Open Access Journals (Sweden)

    Bolocan-Holban Augustina

    2017-07-01

    Full Text Available At each stage of criminal procedure involving children (juveniles in conflict with the law, it is important to be ensured the fundamental rights provided by international standards, as well by national criminal legislation. Starting with the first contact of the child with criminal justice system until the pronunciation of the decision by the Court, including the enforcement of the punishment, the juvenile must be supervised by qualified professionals from criminal justice system, who could intervene in each moment with a purpose of providing pertinent information to criminal investigative body and to the Court, in order to establish a proportionate and equitable punishment.

  15. Criminal recidivism of incarcerated male nonviolent offenders in Hong Kong.

    Science.gov (United States)

    Chan, Heng Choon Oliver; Lo, T Wing; Zhong, Lena Y; Chui, Wing Hong

    2015-02-01

    Criminal recidivism of the incarcerated population in Hong Kong has rarely been studied. The purpose of this study is to explore the recidivism rates and to identify significant predictors of reoffending among incarcerated male offenders convicted of a nonviolent offense in Hong Kong. Using a self-reported methodological design, 278 offenders were sampled. These offenders' immediate past incarceration is used as the benchmark for this recidivism study. The 1-, 2-, and 3-year recidivism rates are 21%, 68%, and 87%, respectively. The findings denote that offending history, psychological attributes, interpersonal relationships, and environmental influences are significant reoffending risk factors. These findings, especially the alarming failure rates, highlight the need to seriously assess the effectiveness of intervention strategies used by the Hong Kong correctional system in preventing future offending. Implications for intervention strategies with emphasis on the risk factors for recidivism are discussed. © The Author(s) 2013.

  16. The Expansion of Criminal Control: A Critical to Feather Functions

    Directory of Open Access Journals (Sweden)

    Mariel Muraro

    2015-12-01

    Full Text Available This article aims to relate the theories of punishment, retributive and preventive, with the criminological discourse, and make brief notes about the negative theories and criticism of the sentence. The article begins by making a few notes on the mass incarceration of the phenomenon, then going to discuss and present the form of action of the police state. Then they present the theories of punishment under the critical perspective, and then work the two main critical theories of punishment, thus treating the position Prof. Eugenio Raúl Zaffaroni and Prof. Juarez Cirino dos Santos. These presentations and discussions have left the critical discourse, not taking our work as end revisit the theoretical construction of the functions of the pen, just to demonstrate how the discourse of shame built by criminal law legitimizes selective and violent actions of the penal system.

  17. Criminal thinking styles and emotional intelligence in Egyptian offenders.

    Science.gov (United States)

    Megreya, Ahmed M

    2013-02-01

    The Psychological Inventory of Criminal Thinking Styles (PICTS) has been applied extensively to the study of criminal behaviour and cognition. Increasingly growing evidence indicates that criminal thinking styles vary considerably among individuals, and these individual variations appear to be crucial for a full understanding of criminal behaviour. This study aimed to examine individual differences in criminal thinking as a function of emotional intelligence. A group of 56 Egyptian male prisoners completed the PICTS and Bar-On Emotional Quotient Inventory (EQ-i). The correlations between these assessments were examined using a series of Pearson correlations coefficients, with Bonferroni correction. General criminal thinking, reactive criminal thinking and five criminal thinking styles (mollification, cutoff, power orientation, cognitive indolence and discontinuity) negatively correlated with emotional intelligence. On the other hand, proactive criminal thinking and three criminal thinking styles (entitlement, superoptimism and sentimentality) did not associate with emotional intelligence. Emotional intelligence is an important correlate of individual differences in criminal thinking, especially its reactive aspects. Practical implications of this suggestion were discussed. Copyright © 2013 John Wiley & Sons, Ltd.

  18. Do Demographic Factors Moderate How Well Criminal Thinking Predicts Recidivism?

    Science.gov (United States)

    Folk, Johanna B; Stuewig, Jeffrey B; Blasko, Brandy L; Caudy, Michael; Martinez, Andres G; Maass, Stephanie; Taxman, Faye S; Tangney, June P

    2017-02-01

    Is the relationship between criminal thinking and recidivism the same for criminal justice-involved individuals from varying demographic backgrounds? Relying on two independent samples of offenders and two measures of criminal thinking, the current studies examined whether four demographic factors-gender, race, age, and education-moderated the relationship between criminal thinking and recidivism. Study 1 consisted of 226 drug-involved probationers enrolled in a randomized clinical trial. Study 2 consisted of 346 jail inmates from a longitudinal study. Logistic regression models suggested that the strength of the relationship between criminal thinking and subsequent recidivism did not vary based on participant demographics, regardless of justice system setting or measure of criminal thinking. Criminal thinking predicts recidivism similarly for people who are male, female, Black, White, older, younger, and more or less educated.

  19. Angry at the unjust, scared of the powerful: emotional responses to terrorist threat.

    Science.gov (United States)

    Giner-Sorolla, Roger; Maitner, Angela T

    2013-08-01

    The threat of terrorist attacks motivates emotional reactions that elicit functional behavioral responses to characteristics of a threatening group. We argue that the more the group is seen as unjust, the more anger arises, whereas the more it is seen as powerful, the more fear arises. In Experiment 1, British participants read about terrorist groups with varied levels of injustice and power. As expected, the manipulation of injustice increased anger, and power increased fear. Anger and fear predicted offensive and defensive reactions. Experiment 2 used a representative sample of U.S. residents and again found distinct effects of an injustice manipulation on anger, and a power manipulation on fear. Anger was a primary motivator of support for offensive and defensive measures in both experiments. Willingness to negotiate was reduced with more injustice and anger, but increased with more outgroup power and fear. These findings have implications on public reactions to terrorist organizations.

  20. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  1. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  2. [Approach to liver, spleen and pancreatic injuries including damage control surgery of terrorist attacks].

    Science.gov (United States)

    Stavrou, G A; Lipp, M J; Oldhafer, K J

    2017-10-01

    Terrorist attacks have outreached to Europe with more and more attacks on civilians. Derived from war surgery experience and from lessons learned from major incidents, it seems mandatory for every surgeon to improve understanding of the special circumstances of trauma following a terrorist attack and its' management. A short literature review is followed by outlining the damage control surgery (DCS) principle for each organ system with practical comments from the perspective of a specialized hepatobiliary (HPB) surgery unit. Every surgeon has to become familiar with the new entities of blast injuries and terrorist attack trauma. This concerns not only the medical treatment but also tailoring surgical treatment with a view to a lack of critical resources under these circumstances. For liver and pancreatic trauma, simple treatment strategies are a key to success.

  3. A BRIEF STUDY ABOUT THE LEGAL NATURE OF PRECAUTIONA RY PRISONS (? IN BRAZILIAN CRIMINAL PROCESS

    Directory of Open Access Journals (Sweden)

    Tatiana Paula Cruz de Siqueira

    2015-12-01

    Full Text Available This article analyzes, even if soon, the legal nature of prison said as precautionary, that occur during the police investigation or criminal process. Over this study, prison in the act, preventive prison, according to each of its assumptions and, lastly, temporary prison will bel analyzed. At the end, will be presented the measures, which are effectively considered precautionary, serving to the utility of the final provision, like security measures

  4. Risks to emergency medical responders at terrorist incidents: a narrative review of the medical literature.

    Science.gov (United States)

    Thompson, Julian; Rehn, Marius; Lossius, Hans Morten; Lockey, David

    2014-09-24

    As the threat of international terrorism rises, there is an increasing requirement to provide evidence-based information and training for the emergency personnel who will respond to terrorist incidents. Current major incident training advises that emergency responders prioritize their own personal safety above that of the 'scene and survivors'. However, there is limited information available on the nature of these threats and how they may be accurately evaluated. This study reviews the published medical literature to identify the hazards experienced by emergency responders who have attended previous terrorist incidents. A PubMed literature search identified 10,894 articles on the subject of 'terrorism', and there was a dramatic increase in publications after the 9/11 attacks in 2001. There is heterogeneity in the focus and quality of this literature, and 307 articles addressing the subject of scene safety were assessed for information regarding the threats encountered at terrorist incidents. These articles demonstrate that emergency responders have been exposed to both direct terrorist threats and environmental scene hazards, including airborne particles, structural collapse, fire, and psychological stress. The emphasis of training and preparedness for terrorist incidents has been primarily on the direct threats, but the published literature suggests that the dominant causes of mortality and morbidity in responders after such incidents are the indirect environmental hazards. If the medical response to terrorist incidents is to be based on evidence rather than anecdote, analysis of the current literature should be incorporated into major incident training, and consistent collection of key data from future incidents is required.

  5. Adaptive management: a paradigm for remediation of public facilities following a terrorist attack.

    Science.gov (United States)

    Whicker, Jeffrey J; Janecky, David R; Doerr, Ted B

    2008-10-01

    Terrorist actions are aimed at maximizing harm (health, psychological, economical, and political) through the combined physical impacts of the act and fear. Immediate and effective response to a terrorist act is critical to limit human and environmental harm, effectively restore facility function, and maintain public confidence. Though there have been terrorist attacks in public facilities that we have learned from, overall our experiences in restoration of public facilities following a terrorist attack are limited. Restoration of public facilities following a release of a hazardous material is inherently far more complex than in industrial settings and has many unique technical, economic, social, and political challenges. For example, there may be a great need to quickly restore the facility to full operation and allow public access even though it was not designed for easy or rapid restoration, and critical information is needed for quantitative risk assessment and effective restoration must be anticipated to be incomplete and uncertain. Whereas present planning documents have substantial linearity in their organization, the "adaptive management" paradigm provides a constructive parallel paradigm for restoration of public facilities that anticipates and plans for uncertainty, inefficiencies, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a public facility after a terrorist attack suggest that integration of adaptive management principles explicitly into restoration processes will result in substantially enhanced and flexible responses necessary to meet the uncertainties of potential terrorist attacks.

  6. The Essence Of The Legal Culture In Achieving The Purpose Of Criminalization For Corruptor

    Directory of Open Access Journals (Sweden)

    Halila Rama Purnama

    2015-08-01

    Full Text Available Abstract Nowadays efforts to eradicate corruption become a global problem and not only as a national or regional issues. For a developing country like Indonesia has almost become a condition sine qua non. This research reviews the role of legal culture in formulating the legal awareness of the public in an effort to prevent corruption. This research is a sociolegal research leading to search ontologically. The type of research combines the empirical and normative studies. The outcomes of the research indicate that as an extraordinary crime corruption cases should be carried out in an extraordinary way. The consequence it is not only the financial loss of state but a crime that violates the rights of social and economic at large and systemic. Observing the criminal sanctions applicable in the law of corruption linked to the purpose of criminalization against perpetrators of corruption corruptor it can be seen that the essence of criminalization is intended as an attempt to eradicate corruption. But these efforts to date cannot be said to achieve its goals because that looks just taking measure have not been effective to minimize corruption. Criminalization efforts have not actually created the states role in protecting people against the corruption.

  7. Making Immigrants into Criminals: Legal Processes of Criminalization in the Post-IIRIRA Era

    Directory of Open Access Journals (Sweden)

    Leisy Abrego

    2017-09-01

    Full Text Available During a post-election TV interview that aired mid-November 2016, then President-Elect Donald Trump claimed that there are millions of so-called “criminal aliens” living in the United States: “What we are going to do is get the people that are criminal and have criminal records, gang members, drug dealers, we have a lot of these people, probably two million, it could be even three million, we are getting them out of our country or we are going to incarcerate.” This claim is a blatant misrepresentation of the facts. A recent report by the Migration Policy Institute suggests that just over 800,000 (or 7 percent of the 11 million undocumented individuals in the United States have criminal records. Of this population, 300,000 individuals are felony offenders and 390,000 are serious misdemeanor offenders — tallies which exclude more than 93 percent of the resident undocumented population (Rosenblum 2015, 22-24.[1] Moreover, the Congressional Research Service found that 140,000 undocumented migrants — or slightly more than 1 percent of the undocumented population — are currently serving time in prison in the United States (Kandel 2016. The facts, therefore, are closer to what Doris Meissner, former Immigration and Naturalization Service (INS Commissioner, argues: that the number of “criminal aliens” arrested as a percentage of all fugitive immigration cases is “modest” (Meissner et al. 2013, 102-03. The facts notwithstanding, President Trump’s fictional tally is important to consider because it conveys an intent to produce at least this many people who — through discourse and policy — can be criminalized and incarcerated or deported as “criminal aliens.” In this article, we critically review the literature on immigrant criminalization and trace the specific laws that first linked and then solidified the association between undocumented immigrants and criminality. To move beyond a legal, abstract context, we also draw on

  8. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  9. 77 FR 3065 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2012-01-20

    ...--Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace... the Middle East Peace Process On January 23, 1995, by Executive Order 12947, the President declared a... the United States constituted by grave acts of violence committed by foreign terrorists who threaten...

  10. 75 FR 3845 - Continuation of the National Emergency With Respect To Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2010-01-22

    ... the National Emergency With Respect To Terrorists Who Threaten To Disrupt the Middle East Peace... constituted by grave acts of violence committed by foreign terrorists who threaten to disrupt the Middle East peace process. On August 20, 1998, by Executive Order 13099, the President modified the Annex to...

  11. 78 FR 4303 - Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the...

    Science.gov (United States)

    2013-01-22

    ... the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace... constituted by grave acts of violence committed by foreign terrorists who threaten to disrupt the Middle East peace process. On August 20, 1998, by Executive Order 13099, the President modified the Annex to...

  12. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  13. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

    of Investigative Data Mining (IDM). In addition, we present iMiner Information Harvesting System and describe how intelligence agencies could be benefited from detecting hierarchy in non-hierarchical terrorist networks.  In this paper we present results of detection of hidden hierarchy of Riyadh Bombing Terrorist...

  14. 78 FR 59751 - Designation of Badruddin Haqqani as a Specially Designated Global Terrorist Pursuant to Section 1...

    Science.gov (United States)

    2013-09-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Designation of Badruddin Haqqani as a Specially Designated Global Terrorist Pursuant to Section 1(b) of... Specially Designated Global Terrorist pursuant to section 1(b) of the Order. This notice shall be published...

  15. 78 FR 39057 - In the Matter of the Designation of Eric Breininger as a Specially Designated Global Terrorist...

    Science.gov (United States)

    2013-06-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE In the Matter of the Designation of Eric Breininger as a Specially Designated Global Terrorist Pursuant To... aforementioned individual as a Specially Designated Global Terrorist pursuant to section 1(b) of the Order. This...

  16. The Financial Impact of Terrorist Attacks on the Value of the Oil and Gas Industry: An International Review

    NARCIS (Netherlands)

    Holwerda, David; Scholtens, Bert; Dorsman, André; Arslan-Ayaydin, Özgür; Baha Karan, Mehmet

    2016-01-01

    Energy firms operate in a strategic industry and their operations are vulnerable to terrorist attacks. We investigate how terrorism impacts stock returns of these firms. We analyze the effect of 105 terrorist attacks on oil and gas companies during 2001–2012. We find that there is no evidence that

  17. To the Question of Legal Defects of Article 354.1 of the Criminal Code of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Yuliya S. Pestereva

    2017-08-01

    Full Text Available The main problems of art. 354.1 “Rehabilitation of Nazism” of the Criminal Code of the Russian Federation, designed to prevent the spread of Nazi ideology, both in terms of legal technique and competition with other compounds are analyzed. The Authors suggest possible ways of solving the problems found.

  18. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  19. Elements of the terrorism reviewed through instrumentum operandi, organizational setup and phases of realization of the terrorist act

    Directory of Open Access Journals (Sweden)

    Zlate Dimovski

    2016-03-01

    Full Text Available Terrorism is a global threat to all countries regardless their social, economic and religious setting. For the realization of their activities, terrorists use different models. As funds for realization of the terrorist act they use different types of weapons, mainly firearms. Terrorist organizations that practice modern forms of terrorism also use weapons of mass destruction. According to that, they improve the ways of getting funds for the realization of the terrorist acts, its internal organization and the ways of practicing terrorism. In this article, we will give a brief overview of the instrumentum operandi, organizational setup and phases of realization of the terrorist act, with special emphasis on the situation in the Republic of Macedonia.

  20. The interaction of criminal procedure and outcome.

    Science.gov (United States)

    Laxminarayan, Malini; Pemberton, Antony

    2014-01-01

    Procedural quality is an important aspect of crime victims' experiences in criminal proceedings and consists of different dimensions. Two of these dimensions are procedural justice (voice) and interpersonal justice (respectful treatment). Social psychological research has suggested that both voice and respectful treatment are moderated by the impact of outcomes of justice procedures on individuals' reactions. To add to this research, we extend this assertion to the criminal justice context, examining the interaction between the assessment of procedural quality and outcome favorability with victim's trust in the legal system and self-esteem. Hierarchical regression analyses reveal that voice, respectful treatment and outcome favorability are predictive of trust in the legal system and self-esteem. Further investigation reveals that being treated with respect is only related to trust in the legal system when outcome favorability is high. Copyright © 2014 Elsevier Ltd. All rights reserved.