The Emerging Police Complex: Hoogenboom and Australian Inter Agency Cooperation†

1994 ◽  
Vol 27 (2) ◽  
pp. 111-132
Author(s):  
Peter Fairchild

Explanations of cooperation between law enforcement agencies have primarily relied upon Old Boy Network' arguments. These are insufficient in an era which continues to juggle the conflicting pressures of traditional rights with the intrusive capabilities of Information Technology. This article draws expressly on Bob Hoogenboom's concept of ‘grey policing’ and constructs a structural understanding of Australian agency cooperation. In so doing it analyses the inherent tensions associated with the investigative need for in-depth and timely information, legal protection and agency organisational goals. Recognition is also given to the influence of contemporary political initiatives relating to organised crime and privacy. By highlighting the contemporary moves to increased data-matching it is argued that the trend towards intensive cooperation between police and other agencies has been established. — The trend towards what Hoogenboom refers to as the ‘police complex’. These findings draw attention to the merits and social harms associated with greater agency cooperation.

1992 ◽  
Vol 25 (2) ◽  
pp. 169-185 ◽  
Author(s):  
Chris Corns

This article critiques the argument that poor relationships between law enforcement agencies inAustralia has actedas a majorbarrier to combating organised crime. Thesignificance oflegislativesecrecy provisions restricting the communication of information between agencies is examined aswellas the role oforganisational ‘subculture’.


2021 ◽  
Vol 6 ◽  
Author(s):  
David Gilbert ◽  
Georgina Heydon

Nation states increasingly apply electronic surveillance techniques to combat serious and organised crime after broadening and deepening their national security agendas. Covertly obtained recordings from telephone interception and listening devices of conversations related to suspected criminal activity in Languages Other Than English (LOTE) frequently contain jargon and/or code words. Community translators and interpreters are routinely called upon to transcribe intercepted conversations into English for evidentiary purposes. This paper examines the language capabilities of community translators and interpreters undertaking this work for law enforcement agencies in the Australian state of Victoria. Using data collected during the observation of public court trials, this paper presents a detailed analysis of Vietnamese-to-English translated transcripts submitted as evidence by the Prosecution in drug-related criminal cases. The data analysis reveals that translated transcripts presented for use as evidence in drug-related trials contain frequent and significant errors. However, these discrepancies are difficult to detect in the complex environment of a court trial without the expert skills of an independent discourse analyst fluent in both languages involved. As a result, trials tend to proceed without the reliability of the translated transcript being adequately tested.


2018 ◽  
Vol 54 ◽  
pp. 06003 ◽  
Author(s):  
Sulistyandari

The growth of FinTech companies in Indonesia is very rapid, currently, there are 142 FinTech Companies in Indonesia. The Financial Services Authority (OJK) continues to encourage the development of information technology-based financial service provider company (FinTech). OJK considers that the more number of FinTech companies, the better it would be. It is important to pay attention to legal protection for FinTech Users, because lending and borrowing services-based information technology has the potential to cause harm to FinTech users, besides being done online, the lender and recipient of the loan do not know each other, and there is no collateral in information technology-based lending and borrowing services. This paper discusses the legal protection of FinTech Users in information technology-based lending and borrowing services, and settlement of dispute in the event of a dispute between FinTech Companies and FinTech Indonesia Users. Legal protection for FinTech Users is provided in agreements made between FinTech Indonesia Companies and FinTech Users and law enforcement OJK Regulation No. 77/POJK.01/2016 The settlement of disputes by complaining to the FinTech Company, to the Financial Services Authority (OJK) or claiming through the General Court.


2018 ◽  
Vol 52 (1) ◽  
pp. 3-22 ◽  
Author(s):  
Anna Sergi

While attention to the ‘ndrangheta, the Calabrian mafia, in Australia, has significantly increased in the past two decades, historical records referring to this peculiar manifestation of organised crime in the country date back almost a century. This research is situated in between studies on mafia mobility and studies on the nature of mafia-type organised crime in Italy and in Australia. Relying on archival research, fieldwork and focus groups with law enforcement agencies across most Australian jurisdictions, this paper will essentially argue that there is in Australia an on-going criminal system that is made of ethnically hybrid criminal networks – predominantly made of, but not limited to, Calabrian ethnicity. Ethnic solidarity and traditional norms and values of the ‘ndrangheta, embedded in Calabrian migrant culture, provide the roof to these networks’ behaviours and organisation. This paper will discuss how the resilience of this mafia in Australia is linked to the capacity of ‘ndrangheta clans to maintain different heads – to be polycephalous – all differently and equally important: their organisational head is stable and culturally homogeneous, their (mafia-type) behaviours are constant, flexible and rooted in ethnic solidarity, and their activities are very dynamic, but hybrid in their ethnic composition.


2020 ◽  
pp. 283-290
Author(s):  
M. Dumchykov ◽  
V. Pakhomov ◽  
O. Bondarenko

The article deals with the main forensic issues in the fight against cybercrime, as a new threat to modern society. The statistics of cybercrime and the relevance of this problem in Ukraine and other countries of the world are given. The problems of applying the concept of computer crime and the need to amend the legal framework, as well as attracting the help of international organizations, companies and specialists in the field of information technology is examined. It analyzes the rapid increase in cybercrime in modern conditions. The interpretation of concepts related to crimes in cyberspace, both in national and international legislation, is considered. When considering the problem of combating cybercrime, the works of such scientists as L.P. Zverianskaia, M.A. Vinokurova, A.P. Kireenko, S.V. Chuprova. The main problems that arise in the study of such crimes are identified: – the lack of an agreed theoretical base, and as a result, legislative regulation suffers; – lack of specialists in the field of information technology in law enforcement agencies; Криміналістика і судова експертиза. Випуск 65 290 The issues of prevention and combating cybercrime, and the solution of these problems are investigated. The main measures to combat and minimize existing problems, namely: – technical and theoretical improvement: the need to justify a single concept of cyberspace in all national legislation, from the point of view of forensics, which will allow a new legislative regulation of this area; – new approaches based on a wider use of the achievements of scientific and technological progress that will help to successfully identify and investigate such crimes; – the need to provide law enforcement with highly qualified specialists in the field of information technology; – attracting international support in the form of international organizations, companies and specialists.


Legal Concept ◽  
2020 ◽  
pp. 154-163
Author(s):  
Ivan Arkhiptsev ◽  
Alexander Sarychev ◽  
Roman Krasnikov

Introduction: according to the official statistics, the number of acts involving information technology is increasing every year in Russia. In particular, currently, the types of crimes in the field of information technology are changing qualitatively and continue to evolve continuously, becoming highly organized and more sophisticated. Through the use of information technologies in Russia, such crimes as hacking, illegal data acquisition (information espionage), theft of other people’s property from payment (settlement) cards and accounts of citizens, trafficking of drugs, arms, human beings are committed; the extremist literature is distributed, new members of terrorist groups are recruited; pornography, including children, is spread, illegal gambling and online games are conducted; fraud through the use of cellular and IP-telephony services, theft of personal data in large amount and selling them, and other crimes are committed using information technologies. The current type of computer fraud – phishing – is gaining momentum. Its essence is that cybercriminals seek to get hold of the data of ordinary people through computer technology, and using this data, get hold of their funds, including financial ones. It seems that such actions can neither contribute to the development of Russian society, nor to the development of civilized relations in society, nor to the development of information networks themselves. After all, any technology can be used for both constructive and non-constructive technologies. And when these goals are destructive, the law enforcement agencies, in our opinion, should have an effective level of training to deal with such violations. We believe that it is not enough to calculate, detect, and establish. We still need to be able to bring the culprit to criminal responsibility. In this regard, the most important thing is to ensure that anonymity not only creates the illusion of impunity, but also that the law enforcement agencies have a sufficient legal, organizational and, first of all, personnel basis to expose the criminal. In order to successfully thwart crimes in the field of information technology, the availability of implementation of the adopted standards and the key to the implementation of the state policy in the field of information security is the training and education of appropriate personnel who would provide “breakthrough” results in this area. The purpose of the research is to study the issues of improving the training of the law enforcement officers in countering crimes committed through the use of information technologies. Methods: the research uses a comparative analysis and generalization of the examples of the educational methods used in the educational organizations of the Ministry of Internal Affairs in the field of information security. The authors study, in particular, the general theoretical and practical orientation of the educational process in this area, synthesizing the results obtained, whose purpose is to improve the training of highly qualified specialists for the Internal Affairs bodies capable of countering crimes in the field of information technologies. Results: the authors formulate the main directions for improving the training of the law enforcement officers to counter crimes committed using information technologies, in particular, on the example of the educational organizations used in the educational process of the Ministry of Internal Affairs of Russia. Thus, one of the measures proposed by the authors in this direction is the opening of a new specialty – cyber-investigator or cyber-criminalist. The entry of developed countries into the sixth technological order and the further active digitalization of the world economy predict a huge scale and replication of crimes using information technologies. This circumstance actualizes the need to popularize the profession of a cyber-investigator – a specialist with an interdisciplinary education, i.e. experience in the investigative agencies will have to be combined with the skills of a criminalist and a specialist in the field of information protection.


2019 ◽  
Vol 8 (2) ◽  
pp. 330
Author(s):  
Devi Rahayu ◽  
Syamsul Fatoni

<p>This article examines efforts to protect and deal with government, law enforcement agencies and assistants or NGOs in preventing and eradicating commercial sexual exploitation of children (CSEC). In Indonesia there are many child trafficking in border areas and cities like Surabaya, which are identified as sending, transit and destination cities. The research type used is  the juridical empirical study namely the effectiveness research of regulations enforcement on child protection. Primary data obtained from experience experienced by children and the family, law enforcement, government and companion Non Governmental Organization (NGO). Data collection techniques carried out by the interview method and FGD. The results showed that the commercial sexual exploitation of children is an act of human trafficking because the purpose of sexual action is to obtain money or other goods with the children, sex service users, liaison and related parties. The highest educated victims of Commercial Sexual Exploitation of Children (CSEC) are high school and are in an economically inadequate condition, broken home, and the influence of uncontrolled social media.</p><p> </p>


2020 ◽  
Vol 136 (4) ◽  
pp. 290-305
Author(s):  
MARIUSZ WOJTALEWICZ ◽  
BEATA SPEICHERT-ZALEWSKA

Criminal analysis in law enforcement agencies’ work has been around for many years. Initially, it was used by police offi cers in a nonformalised way, its main purpose being to try to understand and systematise crimes. Attempts to draw conclusions from the collected data contributed to greater effectiveness of the detection process. Nowadays, the need for effi ciency in processing the increasing amount of data, and the far-reaching professionalisation of criminal groups have resulted in the fact that criminal analysis is no longer a cure-all for a lack of thinking, but an indispensable tool in the effective fi ght against crime. Considering the above, the article presents the need for the effective use of criminal analysis in combatting mainly organised crime of an economic nature.


Legal Studies ◽  
2014 ◽  
Vol 34 (3) ◽  
pp. 371-394 ◽  
Author(s):  
Colin King

Civil forfeiture is playing an increasingly prominent role in the fight against organised crime. While this tool is attractive to law enforcement agencies, it does give rise to concerns under Art 6 of the ECHR. Such proceedings ought to attract the full range of enhanced procedural protections inherent in the criminal process. Even if the Strasbourg Court decides otherwise, there is an argument that the presumption of innocence ought to apply where civil forfeiture proceedings are instituted against a person subsequent to that person being acquitted in criminal proceedings. The Strasbourg jurisprudence, though, is permeated by confusion and inconsistency, which does not inspire confidence that the rights of the individual will be protected. The final section of this paper, then, considers whether civil forfeiture represents a proportionate response in the fight against organised crime. Ultimately, though, given lack of information on such crime, we cannot provide an answer either way – what can be said, though, is that civil forfeiture has had a significant impact on the rights of the individual.


2019 ◽  
Vol 85 (2) ◽  
pp. 95-104
Author(s):  
V. M. Davydiuk

The organizational and legal provision of security of confidential cooperation in Ukraine has been analyzed. The information on modern problems of ensuring security of the Institution of confidential cooperation has been systematized. The risks arising during the confidential cooperation have been outlined. The author has raised the issue of keeping the balance in ensuring security of a confidant’s personality on the one hand and the need of procedural recording of the information obtained from the confidant on the other hand. Normative and legal regulation of protecting confidants in Ukraine and abroad has been compared. The problematic issues of guarantees for the protection of confidants in the Ukrainian legislation have been revealed; the ways to solve them have been offered. The protective mechanisms that in one form or another should be applied to the confidants have been analyzed: guarantees of social and legal protection, restrictions on the use of certain categories of persons as confidants, etc. The issue of ensuring the safety of the confidants after the cooperation with law enforcement agencies has been raised. The author has offered to establish appropriate security measures for such confidants, to determine the reasons and grounds for the application of such measures, and to outline the mechanism of the implementation of such measures at the regulatory level. The limits of permissible behavior of confidants during the fulfillment of crime counteraction tasks have been studied. It has been offered to supplement the Art. 43 of the Criminal Code of Ukraine with the norm that would extend the rights of persons who under the law, perform a special task by participating in an organized group or criminal organization, to confidants, who assist law enforcement agencies in preventing and/or investigating a serious or particularly serious crime. In the context of involving a confidant in accomplishing the tasks of criminal investigation, the author has offered to provide a separate, secret investigative (search) action, which, by analogy with the norm of the Art. 272 of the Criminal Procedural Code of Ukraine should be conducted according to the resolution of an investigator, agreed with the head of the pre-trial investigation agency, and the decision of a prosecutor.


Sign in / Sign up

Export Citation Format

Share Document