SPECIFIC FEATURES OF PREVENTION OF ROBBERY

2021 ◽  
Vol 6 (3) ◽  
pp. 61-67
Author(s):  
Jahongir Mirzaev ◽  

The article focuses on the behavior of law enforcement agencies inthe prevention of robbery over the past 3 years and its consequences.It also analyzes the changes that take place in thepsyche of the perpetrator and the victim of the robbery. At the same time, it was noted that the videos prepared to prevent this crime could have the opposite effect. Suggestions and recommendations were made to increase the effectiveness of work on the prevention of robbery

Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 49
Author(s):  
Miloš Stanković ◽  
Mohammad Meraj Mirza ◽  
Umit Karabiyik

Rapid technology advancements, especially in the past decade, have allowed off-the-shelf unmanned aerial vehicles (UAVs) that weigh less than 250 g to become available for recreational use by the general population. Many well-known manufacturers (e.g., DJI) are now focusing on this segment of UAVs, and the new DJI Mini 2 drone is one of many that falls under this category, which enables easy access to be purchased and used without any Part 107 certification and Remote ID registration. The versatility of drones and drone models is appealing for customers, but they pose many challenges to forensic tools and digital forensics investigators due to numerous hardware and software variations. In addition, different devices can be associated and used for controlling these drones (e.g., Android and iOS smartphones). Moreover, according to the Federal Aviation Administration (FAA), the adoption of Remote ID is not going to be required for people without the 107 certifications for this segment at least until 2023, which creates finding personally identifiable information a necessity in these types of investigations. In this research, we conducted a comprehensive investigation of DJI Mini 2 and its data stored across multiple devices (e.g., SD cards and mobile devices) that are associated with the drone. The aim of this paper is to (1) create several criminal-like scenarios, (2) acquire and analyze the created scenarios using leading forensics software (e.g., Cellebrite and Magnet Axiom) that are commonly used by law enforcement agencies, (3) and present findings associated with potential criminal activities.


2020 ◽  
Vol 22 (2) ◽  
pp. 208-218
Author(s):  
Seth Wyatt Fallik ◽  
Ross Deuchar ◽  
Vaughn J Crichlow ◽  
Hannah Hodges

Social media, in the past decade, has been used to hold police accountable for their actions. There has been, however, a paucity of empirical research into how law enforcement uses social media. To explore this issue, this paper uses qualitative data emerging from ethnographic research conducted in a Southern American state. Participant observations of police officer deployments were paired with semi-structured interviews with officers from three law enforcement agencies. The extent and ways in which these officers used social media is explored. Findings indicate that social media is used to bring positive attention to law enforcement agencies and aid criminal investigations. Although the positive impact of social media was highlighted in these experiences, persistent problems and challenges also featured in the data. Finally, officer insights were drawn upon to make recommendations for future policing policy and research.


2018 ◽  
Vol 52 (1) ◽  
pp. 3-22 ◽  
Author(s):  
Anna Sergi

While attention to the ‘ndrangheta, the Calabrian mafia, in Australia, has significantly increased in the past two decades, historical records referring to this peculiar manifestation of organised crime in the country date back almost a century. This research is situated in between studies on mafia mobility and studies on the nature of mafia-type organised crime in Italy and in Australia. Relying on archival research, fieldwork and focus groups with law enforcement agencies across most Australian jurisdictions, this paper will essentially argue that there is in Australia an on-going criminal system that is made of ethnically hybrid criminal networks – predominantly made of, but not limited to, Calabrian ethnicity. Ethnic solidarity and traditional norms and values of the ‘ndrangheta, embedded in Calabrian migrant culture, provide the roof to these networks’ behaviours and organisation. This paper will discuss how the resilience of this mafia in Australia is linked to the capacity of ‘ndrangheta clans to maintain different heads – to be polycephalous – all differently and equally important: their organisational head is stable and culturally homogeneous, their (mafia-type) behaviours are constant, flexible and rooted in ethnic solidarity, and their activities are very dynamic, but hybrid in their ethnic composition.


2021 ◽  
Vol 90 (1) ◽  
pp. 5-21
Author(s):  
MH Prodanchuk ◽  
GM Balan ◽  
OP Kravchuk ◽  
PG Zhminko ◽  
IM Maksymchuk ◽  
...  

ABSTRACT. The Aim of the Research. Based on an analytical review of literature data, to identify a group of highly toxic chemicals which over the past decades are most often used in deliberate criminal and suicidal incidents, sabotage and terrorist act; the traffic, storage, use and disposal of which must be especially carefully monitored by law enforcement agencies. Materials and Methods. An analytical review of scientific publications was carried out using the abstract databases of scientific libraries Pub Med, Medline and text databases of scientific publishing houses Elsevier, Pub Med, Central, BMJ group as well as other VIP databases. Methods of systemic, comparative, and content analysis were used. Results and Conclusions. The scientific publications on hazardous highly toxic chemicals, which over the past quarter century are most often used in the world, notably in deliberate criminal and suicidal incidents, sabotage, and terrorist acts, are being analysed. It was found that these chemicals mainly include ricin, thallium compounds, organophosphorus compounds, as well as chemical warfare agents, arsenic and its compounds, cyanides, and inorganic water-soluble mercury compounds (mercury bichloride, sodium merthiolate), as well as paraquat and diquat pesticides. Based on the analysis of their toxicity, clinical and morphological expression of intoxication with various routes of entry into the body, the need to include them in the List of Highly Hazardous Chemicals, whose traffic, storage, use, and disposal require stricter control of law enforcement agencies, is justified. The first part of this article presents ricin, thallium compounds, organophosphorus compounds, and chemical warfare agents. Key Words: hazardous highly toxic chemicals, ricin, thallium compounds, organophosphorus compounds.


2021 ◽  
pp. 975-982
Author(s):  
K. Dikevych

This article examines the experience of foreign practice over the past several decades in the field of creating a scientific basis for forensic examination of handwriting, as well as software and software systems that automate some of the examination processes. Shared with: tools that compute functions and provide visualizations to assist the handwriting researcher; verification methods that ensure the degree of consistency between the questioned and the sample documents; identification methods that narrow the search in the electronic document repository with the authors available in it. Various methods of computer scanning and pattern recognition, which have been developed over the past 40 years, are investigated to the problems of identification of the writer and the authenticity/personality of handwriting. It has been established that the ability to use handwriting to identify a person is of great importance for the justice systems and law enforcement agencies. Over the past 30 years, there has been a limited amount of research on the use of computers to improve and automate the analysis performed by forensic handwriting experts. Based on the study, the need for further research is emphasized to obtain new tools in the form of computer programs for solving identification and diagnostic problems, obtaining new tools in the form of computer programs to identify disguised handwriting, as well as to help restore or decipher damaged or partially destroyed documents


Author(s):  
Marcelo Bergman

This chapter focuses on the limited success of the police in improving public safety in most countries of the region, showing that in most countries law enforcement agencies have been unable to lead effective anti-crime programs. Police structures and crime-fighting strategies are surveyed, and it is argued that police forces generally reacted slowly and erratically against rising crime, that they did not develop strong information systems to fight organized crime, and that they have lacked the support of citizens due to the past repression and corruption. Using arrest, survey, and administrative data this text underscores two variables that correlate with rising criminality: a) the failure to incorporate modern, large-scale policing techniques, particularly those that make use of information and intelligence, and b) the failure of police to adjust to new standards after transitions to democracies, undermining bonds of trust between police and citizens.


Rechtsidee ◽  
2015 ◽  
Vol 2 (2) ◽  
pp. 157
Author(s):  
Sri Ayu Astuti

Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015). Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2), 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82


2015 ◽  
Vol 1 (1) ◽  
pp. 2-11 ◽  
Author(s):  
Rebecca Ledingham ◽  
Richard Mills

Purpose – The purpose of this paper is to explore the association of cybercrime, autistic spectrum conditions and international law enforcement, the past decade having seen a significant growth in reported cybercrimes involving autistic individuals. Design/methodology/approach – Interest in the profile of autism and cybercrime and the pathways whereby such offences are committed is shared by key law-enforcement agencies worldwide. This was explored by literature review and survey. Findings – The authors identified a presence of persons with Autism Spectrum Disorders but no empirical evidence to suggest a prevalence or an over representation of autistic individuals committing cybercrime offences. At present profiling, pathways, and recording is under developed. Research limitations/implications – Paucity of literature on cybercrime and autism. Awareness of autism within law-enforcement agencies and the absence of key diagnostic and other data from the cross-section of agencies surveyed. Practical implications – Improve detection, diversion, profiling, risk and pathways into cybercrime. Social implications – Better prediction of risk of cybercrime and improved responses. Originality/value – Original paper believed to be the first to look at cybercrime and ASD in the context of international law enforcement.


Temida ◽  
2007 ◽  
Vol 10 (2) ◽  
pp. 51-62 ◽  
Author(s):  
Murugesan Srinivasan ◽  
Mathew Eyre

Until 1970s the victims of crime were a forgotten entity in the criminal justice system. The attitude began to change as the discipline of victimology came into its own. The past few decades have witnessed a revolution in the way society deals with victims of crime. Many countries have now recognized the need to provide services to victims to help them recover from the effects of crime and assist them in their dealings with the criminal justice system. But in India, there has not been any significant improvement in the position of victims in the criminal justice system. The present paper has attempted to examine the position of victims of crime in India and the criminal justice system. The paper also emphasizes the need to provide assistance to crime victims. The authors of the present paper have also suggested some of the immediate steps that are to be implemented by the law enforcement agencies in India to improve the position of victims in the criminal justice system. .


2019 ◽  
Vol 59 (2) ◽  
pp. 115-126 ◽  
Author(s):  
David M Diamond

It is commonly reported that in the course of a drive, a parent or caretaker loses awareness of the presence of a child in the back seat of the car. Upon arriving at the destination, the driver exits the car and unknowingly leaves the child in the car. This incomprehensible lapse of memory exposes forgotten children to hazards, including death from heatstroke. More than 400 children in the past 20 years have suffered from heatstroke after being unknowingly forgotten in cars. How can loving and attentive parents, with no evidence of substance abuse or an organic brain disorder, have a catastrophic lapse of memory that places a child’s welfare in jeopardy? This article addresses this question at multiple levels of analysis. First, it is concluded that the loss of awareness of a child in a car is a failure of a type of memory referred to as prospective memory (PM), that is, failure to remember to execute a plan in the future. Second, factors that increase the likelihood that PM will fail are identified. Third, research on the neurobiology of PM and PM-related memory failures are reviewed, including a discussion of how competition between brain structures contributes to a failure of PM. Finally, the issue of whether a failure of PM that results in harm to a child qualifies as a criminal offence is discussed. Overall, this neuropsychological perspective on how catastrophic memory errors occur should be of value to the scientific community, the public and law-enforcement agencies.


Sign in / Sign up

Export Citation Format

Share Document