criminal syndicate
Recently Published Documents


TOTAL DOCUMENTS

4
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

POLITEA ◽  
2019 ◽  
Vol 2 (2) ◽  
pp. 127
Author(s):  
Hendrini Renolafitri

<p>This paper highlights one concrete example of how the power of <em>Hoaxes</em> can provide an extra-ordinary significant impact to the country.  The term<em> </em>of <em>the Trojan Horse Affairs</em> make this issue more interesting for the author to discuss. The term of <em>Trojan Horse </em>generally used in technological science to describe the existence of the <em>malware </em>or <em>viruses</em> activity, whos hiding in suspicious forms and then damage the core systems on a computer or steal its data. The damage caused by the <em>Trojan Horse</em> is usually very severe (<em>Trojan Horses</em>, 2019).</p><p>In the study of international relations, the term of <em>Trojan Horse </em>was also recently introduced to defined the “terrorist operations”. This is because, terrorist operations are also use hidden movements on their actions to attack or stealing data which resulted in fatal damage. For that kind of reason, in the study of international relations, the term of <em>Trojan Horse</em> is also synonymous with serious crime, which are usually carried out by the opponents, enemies, or international criminal syndicate (<em>Trojan Horses</em>, 2019).</p>Tracing the origin history the use of the term of <em>The Trojan Horse</em> will remind back with the Ancient Greek War, between the <em>Achaena</em> (Greek) and Trojan people. This history become phenomenal after the <em>Achaena </em>win the war with their clever trick of smuggling its soldier into an unsuspecting wooden horse statue, soon called <em>“The Trojan Horse”</em>statue. The Trojan people immediately got killed in the night, when their soldiers were unaware and sleeping. The Achenian soldiers came out from their hiding place and then ended this storys (Mogra, n.d.).


2016 ◽  
Vol 55 (4) ◽  
pp. 324
Author(s):  
Lisa Presley

The features of this slim volume include ten chapters that are arranged topically; in addition, there is a glossary, references section, and index. In the front matter, there is a very useful timeline that highlights some of the key events associated with the formation and history of the Crips and Bloods from the 1960s to 2005. In the introductory chapter, the author explains that “there is very little systematic research on the Bloods and Crips” (12), with limited and biased information being reported and published either by gang members in autobiographies or by law enforcement and government agencies. The author does a good job of offering a balanced viewpoint about these gangs (sets) by neither demonizing nor glorifying them. The author provides information about Crips’ and Bloods’ role in crime and drug dealing but rejects the notion that they are an organized criminal syndicate, due to their lack of hierarchical features.


Sign in / Sign up

Export Citation Format

Share Document