scholarly journals Topical Issues of Investigating the Sale of Narcotic Drugs and Highly Potent Substances on the Information and Telecommunication Network Internet

Author(s):  
Karina Malyanova

The authors analyze the criminalistic methodology of investigating the sales of narcotic drugs and potent substances on the information and telecommunication network Internet. They present statistical data and examples of the new ways and means of distributing narcotics and potent substances through Internet platforms. The authors have analyzed the causes and conditions for the mass dissemination and use of narcotics and potent substances in the situation of modern society’s transition to the new era of innovative technologies. They examined the issue of the development of the sales of narcotics and potent substances using the platforms RAMP and HYDRA, and the possibilities of bulk phone text messaging of links to these sites. The authors suggest measures on improving the cooperation of the law enforcement bodies with other agencies with the goal of preventing the distribution and sales of narcotics and potent substances on the Internet.

2021 ◽  
Vol 16 (1) ◽  
pp. 46
Author(s):  
Ni Luh Gede Yogi Arthani ◽  
Made Emy Andayani Citra

<p><em>Ilicit Traffic in Narcotic Drugs is carried out by international networks operating in several countries. Ilicit traffic in narcotic drugs results in huge financial and wealth gains that enable transnational crime organizations to penetrate, pollute and undermine the structure of government, legitimate commercial and financial business, and society at all levels. In dealing with this situation, Indonesia harmonizes the law through mutual legal assistance arrangements. In this study two issues will be discussed namely legal reform through mutual legal assistance and mutual legal assistance in narcotics crimes.</em></p><p><em>Legal reform is a policy carried out by a country to deal with the situation that occurs in the country. The development of transnational crime was responded by the state through a policy of mutual legal assistance as outlined in the Law of the Republic of Indonesia Number 1 of 2006 concerning Reciprocal Assistance in Criminal Matters. Cooperation between countries in the process of law enforcement needs to be done to tackle the crime of trafficking in narcotics. Ilicit traffic in narcotic drugs is carried out by involving several countries. Reciprocal legal assistance in narcotics crimes can be implemented in three ways, namely diplomatic channels, through central authorities and through direct cooperation between law enforcement agencies.</em></p><p><strong>Keywords</strong>: <em>Mutual legal assistance, Ilicit Traffic, Narcotic Drugs</em></p>


Author(s):  
Dan Jerker B. Svantesson

This chapter seeks to set the scene and make some proposals for how we may make progress in the field of internet jurisdiction. For this purpose, the chapter will focus on three examples where the matter of internet jurisdiction is a major concern for internet intermediaries. The first relates to the validity of the terms of service that internet intermediaries typically impose on their users, and which typically contain important provisions regarding jurisdiction and applicable law. The second example relates to situations in which law enforcement agencies seek access to user data held by internet intermediaries. Such situations give rise to important matters of jurisdiction, not only where the requesting law enforcement agency and the internet intermediary are based in different countries, but may also—as was illustrated in the well-known Microsoft Warrant case—give rise to such issues where the requested data is stored outside the country in which both the law enforcement agency and the internet intermediary are based. The third example relates to the matter of geographical scope where an internet intermediary is required to remove, block, take down, delist, de-index, or de-reference content.


2020 ◽  
Vol 2 (2) ◽  
pp. 1-8
Author(s):  
Karen Paullet ◽  
Adnan Chawdhry

The internet has become a medium for people to communicate locally or globally in business, education, and their social lives. The increased use of the internet has created an impact on the number of online harassing/cyberstalking cases. This exploratory study of 121 undergraduate students seeks to examine the extent to which cyberstalking is prevalent. This study argues that cyberstalking and harassment will only decrease when the extent of the problem is fully understood and potential victims and law enforcement understand the protections necessary under the law.


Author(s):  
Loo Seng Neo ◽  
Priscilla Shi ◽  
Leevia Dillon ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Since the Islamic State in Iraq and Syria (ISIS) became prominent after the release of beheading videos of its prisoners, many have been confused over how to describe this development in relation to the way the Internet is exploited by violent extremists. While the element of surprise and horror lingered on the minds of many observers, a more pressing question facing the law enforcement is: how does ISIS attract foreign fighters using such videos and online propaganda? As countries around the globe grapple with the security threat posed by their nationals travelling to join ISIS, the need to be au fait with the appeal of ISIS and its ability to use the Internet to recruit new members and sympathisers becomes even more apparent. This chapter uses a behavioural sciences lens to explicate how individual and organisational motivational factors may contribute to the overall appeal of joining ISIS.


Author(s):  
Dinda Dinanti ◽  
Dwi Desi Yayi Tarina

Corruption in Indonesia stick on all aspects or areas of life in society. Corruption not only happens among regions, but also present a centre where the Center is the highest level. The growing crime of corruption in Indonesia, making the community more and do not believe in the law enforcement performance filled with the intervention of interest, the lack of good faith and far from independence and seriousness in dealing with the cases of corruption. With the juridical sociological approach, which includes aspects of norms or rules, guided by rules or regulations that underpin the process of eradicating corruption. Whereas, for his sociological social involved within the context of an alternative model of criminal in Indonesia. Some of the data required from the Corruption Eradication Commission, Indonesia Corruption Watch and State Court criminal acts of Corruption is absolutely required. The data in the form of annual statistical data on Indonesia, as well as alternative models criminal for perpetrators of corruption. The judgment of people who authorities have been set up in Act No. 31 of the year 1999 has been amended by Act No. 20 of 2001 year of the eradication of criminal acts of corruption. However, it still needs to be examined again an alternative model of criminal in Indonesia so that it will not pose a deterrent effect.  


2020 ◽  
pp. 1123-1141
Author(s):  
Loo Seng Neo ◽  
Priscilla Shi ◽  
Leevia Dillon ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Since the Islamic State in Iraq and Syria (ISIS) became prominent after the release of beheading videos of its prisoners, many have been confused over how to describe this development in relation to the way the Internet is exploited by violent extremists. While the element of surprise and horror lingered on the minds of many observers, a more pressing question facing the law enforcement is: how does ISIS attract foreign fighters using such videos and online propaganda? As countries around the globe grapple with the security threat posed by their nationals travelling to join ISIS, the need to be au fait with the appeal of ISIS and its ability to use the Internet to recruit new members and sympathisers becomes even more apparent. This chapter uses a behavioural sciences lens to explicate how individual and organisational motivational factors may contribute to the overall appeal of joining ISIS.


2018 ◽  
Vol 1 (2) ◽  
Author(s):  
Muhammad Zulfan Hakim

AbstractLaw enforcement in environmental law especially in forestry sector has been living in a new era since the birth of some regulations in environemntal law. Since then, sectoral regulations also emerging and of course this regulations need to be uphold, in order to maintain thefunction of our environment. Beside the Law No. 41/1999 about Forestry, there is also Law No. 18/ 2013 about Prevention and Protection From  Forest Destruction. In the other hand, this law are conflicting with the natives that already living in forest area, long before that region stated as a protected forest by the government. This paper tries to explain how to handle such confilct between indigenous people that already living in the forest and the law enforcement agent since they have been living their way since long time ago like their anchestors.  


2021 ◽  
Vol 5 (S3) ◽  
Author(s):  
Anatolii V. Movchan ◽  
Mykola O. Yankovyi ◽  
Karen Yu. Ismailov ◽  
Elena O. Melnikova ◽  
Oleksandr M. Zaiets

The relevance of the study is due to the change of activity of organized criminal groups involved in the circulation of psychoactive substances towards the organization of the mentioned activity through the Internet. The purpose of this work is to investigate the current problems of combating drug trafficking by using the worldwide web through contactless sale of narcotic drugs and psychotropic substances. It is necessary to strengthen the analytical component of law enforcement activities in the detection and analysis of content on the Internet through the introduction of information technology in law enforcement activities, the dissemination of knowledge about OSINT. The materials of the article are of practical value for the higher education graduates of police specialties, police officers of the criminal block and specialists in the field of operational search activities.


Author(s):  
Kirill Ozerov

This article discusses the problems associated with the disclosure of information and telecommunications fraud, such as the identification and location of perpetrators. Statistical data on the analyzed issues are reflected. The research conducted on the main means used to ensure the anonymity of cybercriminals. The main methods in which information and telecommunications technologies, including the Internet, can be used for fraud are clearly demonstrated. The article also notes the opinions of various government officials, scientists and researchers in the field of countering acts of cyber fraud in the field of information and telecommunications technologies. As part of the study, a survey of practical employees was conducted, which reflects a clear picture of the issues under consideration in the daily life of a citizen and the practical work of employees of internal Affairs bodies, information security services of various organizations. The influence of Covid-19 and its consequences on the crime we investigate is demonstrative. At the conclusion of the scientific work, suggestions were made for the most effective counteraction against fraudulent acts in the field of information technology, in particular the necessary preventive measures, are taken with regard to cooperation between the Internal Affairs agencies and other law enforcement agencies and that ensure security in the cyber environment.


Sign in / Sign up

Export Citation Format

Share Document