victim selection
Recently Published Documents


TOTAL DOCUMENTS

34
(FIVE YEARS 10)

H-INDEX

7
(FIVE YEARS 1)

2021 ◽  
Vol 15 (2) ◽  
pp. 10-36
Author(s):  
Kristina Hook

This article utilizes the case study of the 1930s Ukrainian Holodomor, an artificially induced famine under Joseph Stalin, to advance comparative genocide studies debates regarding the nature, onset, and prevention of large-scale violence. Fieldwide debates question how to 1) distinguish genocide from other forms of large-scale violence and 2) trace genocides as unfolding processes, rather than crescendoing events. To circumvent unproductive definitional arguments, methodologies that track large-scale violence according to numerically-based thresholds have substituted for dynamics-based analyses. Able to address aspects of the genocide puzzle, these methodologies struggle to incorporate cross-cultural contextual variation or elicit ripe moments for specific, real-time interventions. Demonstrating how genocide’s precise, changing dynamics can be mapped over its duration, I present and apply a new mixed methods methodology, affirming that historical cases can inform modern prevention efforts. By coding 1932–1933 Ukraine-specific correspondences to/from Stalin, I pinpoint the precise moment when genocidal intent and victim selection overlaps.


Author(s):  
Rossano Gaeta ◽  
Marco Grangetto

AbstractRateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been deeply investigated because they have been originally devised as a solution for dealing with block erasures and not for block modification. In this paper we provide an analysis of the intrinsic robustness of three rateless codes algorithms, i.e., random linear network codes (RLNC), Luby transform (LT), and band codes (BC) against intentional data modification. By intrinsic robustness we mean the ability of detecting as soon as possible that modification of at least one equation has occurred as well as the possibility a receiver can decode from the set of equations with and without the modified ones. We focus on bare rateless codes where no additional information is added to equations (e.g., tags) or higher level protocol are used (e.g., verification keys to pre-distribute to receivers) to detect and recover from data modification. We consider several scenarios that combine both random and targeted selection of equations to alter and modification of an equation that can either change the rank of the coding matrix or not. Our analysis reveals that a high percentage of attacks goes undetected unless a minimum code redundancy is achieved, LT codes are the most fragile in virtually all scenarios, RLNC and BC are quite insensitive to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm.


Significance The pressure has intensified following two costly and highly disruptive double-extortion ransomware attacks against US-based firms -- one against Colonial Pipeline in early May and the other against JBS Foods in early June. Impacts Russian-based cybercriminals will mainly target Western entities, safe because there is no extradition treaty with the EU or Washington. Sophisticated and careful victim selection will allow hackers to increase ransom demands. Western ‘hackback’ operations are likely to rise following the FBI’s recent success against DarkSide.


2021 ◽  
Author(s):  
Sandra Oziel

Case linkage is a statistical technique which connects multiple sexual assault cases to a single perpetrator and holds promise for informing criminal investigations. Further, examining the behaviours executed most consistently across serial offences committed by a given offender is crucial to linking offences. The current study investigated behavioural consistency in a sample of 49 male serial stranger sexual offenders responsible for 147 offences. For each offence, four crime aspects were identified: 1) pre-crime facilitators, 2) victim selection and characteristics, 3) approach and attack methods, and 4) crime scene characteristics. Consistency between and within each crime series and across offender types based on background characteristics was examined. Results indicated a high degree of behavioural consistency across all crime aspects. Behaviours occurring prior to the offence were particularly useful in establishing consistent offending patterns. The implications of these findings in the context of police investigations and their utility for clinical practice are discussed.


2021 ◽  
Author(s):  
Sandra Oziel

Case linkage is a statistical technique which connects multiple sexual assault cases to a single perpetrator and holds promise for informing criminal investigations. Further, examining the behaviours executed most consistently across serial offences committed by a given offender is crucial to linking offences. The current study investigated behavioural consistency in a sample of 49 male serial stranger sexual offenders responsible for 147 offences. For each offence, four crime aspects were identified: 1) pre-crime facilitators, 2) victim selection and characteristics, 3) approach and attack methods, and 4) crime scene characteristics. Consistency between and within each crime series and across offender types based on background characteristics was examined. Results indicated a high degree of behavioural consistency across all crime aspects. Behaviours occurring prior to the offence were particularly useful in establishing consistent offending patterns. The implications of these findings in the context of police investigations and their utility for clinical practice are discussed.


2020 ◽  
Vol 3 (1) ◽  
pp. 93-112
Author(s):  
Francess Dufie Azumah ◽  
John Onzaberigu Nachinaab ◽  
Samuel Krampah ◽  
Pius Nzeh Ayim

The study was conducted to explore the determinants of target victim selection by criminals, mode of operations adopted by criminals and the factors considered in the selection of victims by criminals. The study adopted a qualitative approach where simple random and purposively sampling techniques were used to select a sample size of 50 inmates in the Gambaga prisons. Interview guide was the main tool used for the data collection for this study. The study found that victimization influences criminal intentions and behaviour of an individual. The inmates noted that they like to attack victims in isolation and in dark places, especially at night. The study further found that criminals operated in gangs, in areas with darkness and in the night using caps and tattered dresses that anonymized them. They also used fear to traumatize their victims, monitor their victims, as well as operated with guns and knives and under special requests of other individuals in society.


Sign in / Sign up

Export Citation Format

Share Document