Search results for: cybercrime offenders
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 126

Search results for: cybercrime offenders

66 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 95
65 Challenging the Constitutionality of Mandatory Sentences: A South African Perspective

Authors: Alphonso Goliath

Abstract:

With mandatory minimum sentences, even with its qualification of “substantial and compelling circumstances”, the sentence severity for violent crimes has increased substantially to combat crime. Considering the upsurge in violent crime, the paper argues that minimum sentences failed to prevent or curb violent crime. These sentences deprive offenders more than what is reasonably necessary of their freedom to curb the offense and punish the offender. Minimum sentences amount to cruel, inhuman, and degrading punishment unjustified and vulnerable to constitutional challenge.

Keywords: constitutionality, deterrence, incapacitation, minimum sentencing legislation, prison overcrowding, rehabilitation, recidivism, retribution, violent crime

Procedia PDF Downloads 58
64 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 84
63 Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence

Authors: Lilian Noronha Nassif

Abstract:

Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.

Keywords: digital evidence, digital forensics process and procedures, mobile forensics, cloud forensics

Procedia PDF Downloads 379
62 Establishing Digital Forensics Capability and Capacity among Malaysia's Law Enforcement Agencies: Issues, Challenges and Recommendations

Authors: Sarah Taylor, Nor Zarina Zainal Abidin, Mohd Zabri Adil Talib

Abstract:

Although cybercrime is on the rise, yet many Law Enforcement Agencies in Malaysia faces difficulty in establishing own digital forensics capability and capacity. The main reasons are undoubtedly because of the high cost and difficulty in convincing their management. A survey has been conducted among Malaysia’s Law Enforcement Agencies owning a digital forensics laboratory to understand their history of building digital forensics capacity and capability, the challenges and the impact of having own laboratory to their case investigation. The result of the study shall be used by other Law Enforcement Agencies in justifying to their management to establish own digital forensics capability and capacity.

Keywords: digital forensics, digital forensics capacity and capability, laboratory, law enforcement agency

Procedia PDF Downloads 202
61 Relationship between Illegal Wildlife Trade and Community Conservation: A Case Study of the Chepang Community in Nepal

Authors: Vasundhara H. Krishnani, Ajay Saini, Dibesh Karmacharya, Salit Kark

Abstract:

Illegal Wildlife Trade is one of the most pressing global conservation challenges. Unregulated wildlife trade can threaten biodiversity, contribute to habitat loss, limit sustainable development efforts, and expedite species declines and extinctions. In low-income and middle-income countries, such as Nepal and other countries in Asia and Africa, many of the people engaged in the early stages of illegal wildlife trade, which includes the hunting and transportation of wildlife, belong to Indigenous tribes and local communities.These countries primarily rely on punitive measures to prevent and suppress Illegal Wildlife Trade. For example, in Nepal, people involved in wildlife crimes can often be sentenced to incarceration and a hefty fine and serve up to 15 years in prison. Despite these harsh punitive measures, illegal wildlife trade remains a significant conservation challenge in many countries. The aim of this study was to examine factors affecting the participation of Indigenous communities in Illegal Wildlife Trade while recording the experiences of members of the Indigenous Chepang community, some of whom were imprisoned for their alleged involvement in rhino poaching. Chepangs, belonging to traditionally a hunter-gatherer community, are often considered an isolated and marginalized Indigenous community, some of whom live around the Chitwan National Park in Nepal. Established in 1973, Chitwan National Park is situated in the Chitwan Valley of Nepal and was one of the first regions that was declared as a protected area in Nepal, aiming to protect the one-horned rhinoceros as a flagship species. Conducted over a period of three years, this study used semi-structured interviews and focus group discussions to collect data from Illegal Wildlife Trade offenders, family members of offenders, community Elders, NGO personnel, community forest representatives, Chepang community representatives, and Government school teachers from the region surrounding Chitwan National Park. The study also examined the social, cultural, health, and financial impacts that the imprisonment of offenders had on the families of the community members, especially women and children. The results suggest that involvement of the members of the Chepang community living around Chitwan National Park in the poaching of the one-horned rhinoceros (Rhinoceros unicornis) can be attributed to a range of factors, some of which include: lack of livelihood opportunities, lack of awareness regarding wildlife rules and regulations and poverty.This work emphasises the need for raising awareness and building programs to enhance alternative livelihood training and empower indigenous and marginalised communities that provide sustainable alternatives. Furthermore, the issue needs to be addressed as a community solution which includes all community members. We suggest this multi-pronged approach can benefit wildlife conservation by reducing illegal poaching and wildlife trade, as well as community conservation in regions with similar challenges. By actively involving and empowering local communities, the communities become key stakeholders in the conservation process. This involvement contributes to protecting wildlife and natural ecosystems while simultaneously providing sustainable livelihood options for local communities.

Keywords: alternative livelihoods, chepang community, illegal wildlife trade, low-and middle-income countries, nepal, one-horned rhinoceros

Procedia PDF Downloads 59
60 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 61
59 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 92
58 The Analysis of the Effectiveness of the Children’s Act of 2009 in Curbing Child Sexual Abuse: A Case Study of Francistown and the Surrounding Areas

Authors: Gabaikanngwe Ethel Mambo, Kinyanjui Godfrey Gichuhi

Abstract:

The study analysed the Children’s Act of 2009 of Botswana in curbing child sexual abuse (CSA) in Francistown and its surroundings. The qualitative methodology was used to collect data. Retrospective reports of CSA were obtained from various departments dealing with children. The research findings revealed the ineffectiveness of the Children’s Act of 2009 in identifying and preventing CSA. The Act has failed to deter or prevent the offenders from committing crimes against children. The study demonstrated an increase in CSA cases that were never reported. Lack of skills by the justice system exacerbated sexual molestation. The study also revealed that most CSA cases were underreported. Lastly, the study demonstrated those child victims were sexually molested by someone known to them.

Keywords: sexual abuse, molestation, incest, child

Procedia PDF Downloads 70
57 The Analysis of Computer Crimes Act 1997 in the Circumvention and Prevention of Computer Crimes in Malaysia

Authors: Nooraneda Mutalip Laidey

Abstract:

Computer Crimes Act 1997 (CCA 1997) was conceded by Malaysia’s legislative body in 1997 and the Act was enforced in June 2000. The purpose of CCA 1997 is to provide for offences related to misuse of computers such as hacking, cracking and phishing. CCA 1997 was modelled after United Kingdom’s Computer Misuses Act 1990 as a response to the emerging computer crimes. This legislation is divided into three parts and 12 Sections. The first part outlines preliminary matters that include short title and relevant definitions, second part provides for the offenses related to misuse of computers and specifies penalties for each offences, and the last part deals with ancillary provisions such as jurisdictional and investigational issues of cybercrime. The main objective of this paper is to discuss the development of computer crimes and its deterrence in Malaysia. Specific sections of CCA 1997 will be analysed in details and detail assessment on the prevention and prosecution of computer crimes in Malaysia will be accessed to determine whether CCA 1997 is so far adequate in preventing computer crimes in Malaysia.

Keywords: computer, computer crimes, CCA 1997, circumvention, deterrence

Procedia PDF Downloads 308
56 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 167
55 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 183
54 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 81
53 Boosting Crime Scene Investigations Capabilities through Crime Script Analysis

Authors: Benoit Leclerc

Abstract:

The concept of scripts and the role that crime scripts has been playing in criminology during the last decade is reviewed. Particularly illuminating is the potential use of scripts not only to understand and disrupt offender scripts (e.g., commonly referred as crime scripts) but to capture victim and guardian scripts to increase the likelihood of preventing crime. Similarly, the concept of scripts is applied to forensic science – another field that can benefit from script analysis. First, similar to guardian scripts, script analysis can illuminate the process of completing crime scene investigations for those who investigate (crime scene investigators or other professionals involved in crime scene investigations), and as a result, provide a range of intervention-points to improve the success of these investigations. Second, script analysis can also provide valuable information on offenders’ crime-commission processes for crime scene investigators and highlight a number of ‘contact points’ that could be targeted during investigations.

Keywords: crime scripts, crime scene investigation, script analysis, situational crime prevention

Procedia PDF Downloads 248
52 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 453
51 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 161
50 The Development of Psychosis in Offenders and Its Relationship to Crime

Authors: Belinda Crissman

Abstract:

Serious mental disorder is greatly overrepresented in prisoners compared to the general community, with consequences for prison management, recidivism and the prisoners themselves. Incarcerated individuals with psychotic disorders experience insufficient detection and treatment and higher rates of suicide in custody. However direct evidence to explain the overrepresentation of individuals with psychosis in prisons is sparse. The current study aimed to use a life course criminology perspective to answer two key questions: 1) What is the temporal relationship between psychosis and offending (does first mental health contact precede first recorded offence, or does the offending precede the mental health diagnosis)? 2) Are there key temporal points or system contacts prior to incarceration that could be identified as opportunities for early intervention? Data from the innovative Queensland Linkage project was used to link individuals with their corrections, health and relevant social service systems to answer these questions.

Keywords: mental disorder, crime, life course criminology, prevention

Procedia PDF Downloads 105
49 Determining the Effectiveness of Dialectical Behavior Therapy in Reducing the Psychopathic Deviance of Criminals

Authors: Setareh Gerayeli

Abstract:

The present study tries to determine the effectiveness of dialectical behavior therapy in reducing the psychopathic deviance of employed criminals released from prison. The experimental method was used in this study, and the statistical population included employed criminals released from prison in Mashhad. Thirty offenders were selected randomly as the samples of the study. The MMPI-2 was used to collect data in the pre-test and post-test stages. The behavioral therapy was conducted on the experimental group during fourteen two and a half hour sessions, while the control group did not receive any intervention. Data analysis was conducted by using covariance. The results showed there is a significant difference between the post-test mean scores of the two groups. The findings suggest that dialectical behavior therapy is effective in reducing psychopathic deviance.

Keywords: criminals, dialectical behavior therapy, psychopathic deviance, prison

Procedia PDF Downloads 204
48 Child Molesters’ Perceptions of Their Abusive Behavior in a Greek Prison

Authors: Polychronis Voultsos, Theodora Pandelidou, Alexandra K. Tsaroucha

Abstract:

Aim: To explore child molesters' perceptions of their sexually offensive behavior in Greece. To our knowledge, there is a relative research gap on this topic. Method: A prospective qualitative study using in-depth interviews with eight child molesters who were convicted and imprisoned in a Greek prison. The research was conducted in May 2022. Results: Child molesters' cognitive distortions including justifications, rationalizations and minimizations emerged from our data analysis (content analysis). Importantly, child molesters. adopted a particularly daring ‘role reversal’. Participants reported themselves as being ‘victims’. They said that the children (namely, their victims) were the ones who made the first move and got them in the mood for having sex with the children. Furthermore, we discuss our results in the context of the existing international academic literature on the area of this research. Conclusions: Child molesters' different cognitive distortions emerged from our data analysis, with ‘role reversal’ being prevalent.

Keywords: child molesters, sex offenders, cognitive distortions, Greece

Procedia PDF Downloads 94
47 Life Imprisonment: European Convention on Human Rights Standards and the New Serbian Criminal Code

Authors: Veljko Turanjanin

Abstract:

In this article, an author deals with the issue of life imprisonment. Life imprisonment represents a new sentence in the Serbian legislature, in addition to the standard one, imprisonment. The author elaborated on judgments of the European Court of Human Rights (ECtHR), imposing the possibility of parole for the person sentenced to life imprisonment, emphasizing rehabilitation as the primary goal of penalties. According to the ECtHR, life imprisonment without parole is not permitted. The right to rehabilitation is very strictly set in the ECtHR jurisprudence. Life imprisonment represents a new sentence in the Serbian legislature, in addition to the standard one, imprisonment. The legislator provided the possibility of parole for most criminal offenses after 27 years in prison, while for some of them, a possibility of parole is explicitly prohibited. The author points out the shortcomings of the legal solution that exists in Serbia, which flagrantly threatens to violate the human rights of the offenders.

Keywords: European Court of Human Rights, life imprisonment, parole, rehabilitation

Procedia PDF Downloads 74
46 A Case Study of Wildlife Crime in Bangladesh

Authors: M. Golam Rabbi

Abstract:

Theme of wildlife crime is unique in Bangladesh. In earlier of 2010, wildlife crime was not designated as a crime, unlike other offenses. Forest Department and other enforcement agencies were not in full swing to find out the organized crime scene at that time and recorded few cases along with forest crime. However, after the establishment of Wildlife Crime Control Unitin 2012a, total of 374 offenses have been detected with 566 offenders and 37,039 wildlife and trophies were seized till November 2016. Most offenses seem to be committed outside the forests where the presence of the forest staff is minimal. Total detection percentage of offenses is not known, but offenders are not identified in 60% of detected cases (UDOR). Only 20% cases are decided by the courts even after eight years, conviction rate of the total disposal is 70.65%. Mostly six months imprisonment and BDT 5000 fine seems to be the modal penalty. The monetary value of wildlife crime in the country is approximate $0.72M per year and the maximum value counted for reptiles around $0.45M especially for high-level trafficking of geckos and turtles. The most common seizures of wildlife are birds (mynas, munias, parakeets, lorikeets, water birds, etc.) which have domestic demand for pet. Some other wildlife like turtles, lizards and small mammals are also on the list. Venison and migratory waterbirds often seized which has a large quantity demand for consuming at aristocratic level.Due to porous border and weak enforcement in border region poachers use the way for trafficking of geckos, turtles, and tortoises, snakes, venom, tiger and body parts, spotted deerskin, pangolinetc. Those have very high demand in East Asian countries for so-called medicinal purposes. The recent survey also demonstrates new route for illegal trade and trafficking for instance, after poaching of tiger and deer from the Sundarbans, the largest mangrove track of the planet to Thailand through the Bay of Bengal, sharks fins and ray fish through Chittagong seaport and directly by sea routes to Myanmar and Thailand. However, a good number of records of offense demonstrate the transition route from India to South and South East Asian countries. Star tortoises and Hamilton’s turtles are smuggled in from India which mostly seized at Benapole border of Jessore and Hazrat Shah Jajal International Airport of Dhaka, in very large numbers for transmission to East Asian countries. Most of the cases of wildlife trade routes leading to China, Thailand, Malaysia, and Myanmar. Most surprisingly African ivory was seized in Bangladesh recently, which was meant to be trafficked to the South-East Asia. However; forest department is working to fight against wildlife poaching, illegal trade and trafficking in collaboration with other law enforcement agencies. The department needs a clear mandate and to build technical capabilities for identifying, seizing and holding specimens. The department also needs to step out of the forests and must develop the capacity to surveillance and patrol all sensitive locations across the country.

Keywords: Bangladesh forest department, Sundarban, tiger, wildlife crime, wildlife trafficking

Procedia PDF Downloads 269
45 An Analysis of Digital Forensic Laboratory Development among Malaysia’s Law Enforcement Agencies

Authors: Sarah K. Taylor, Miratun M. Saharuddin, Zabri A. Talib

Abstract:

Cybercrime is on the rise, and yet many Law Enforcement Agencies (LEAs) in Malaysia have no Digital Forensics Laboratory (DFL) to assist them in the attrition and analysis of digital evidence. From the estimated number of 30 LEAs in Malaysia, sadly, only eight of them owned a DFL. All of the DFLs are concentrated in the capital of Malaysia and none at the state level. LEAs are still depending on the national DFL (CyberSecurity Malaysia) even for simple and straightforward cases. A survey was conducted among LEAs in Malaysia owning a DFL to understand their history of establishing the DFL, the challenges that they faced and the significance of the DFL to their case investigation. The results showed that the while some LEAs faced no challenge in establishing a DFL, some of them took seven to 10 years to do so. The reason was due to the difficulty in convincing their management because of the high costs involved. The results also revealed that with the establishment of a DFL, LEAs were better able to get faster forensic result and to meet agency’s timeline expectation. It is also found that LEAs were also able to get more meaningful forensic results on cases that require niche expertise, compared to sending off cases to the national DFL. Other than that, cases are getting more complex, and hence, a continuous stream of budget for equipment and training is inevitable. The result derived from the study is hoped to be used by other LEAs in justifying to their management the benefits of establishing an in-house DFL.

Keywords: digital evidence, digital forensics, digital forensics laboratory, law enforcement agency

Procedia PDF Downloads 141
44 Understanding Racial Disparate Treatment of Juvenile Interpersonal Violent Offenders in the Juvenile Justice System Using Focal Concerns Theory

Authors: Suzanne Overstreet-Juenke

Abstract:

Disproportionate minority contact (DMC) is a salient issue that has been found at every stage of the decision-making process in the juvenile justice system. Existing research indicates that DMC influences adjudication for drug, property, and personal crimes. Because intimate partner violence (IPV) is a major public health problem and global concern, the current study examines DMC at adjudication among youth charged for crimes of interpersonal violence. This research uses administrative, Court Designated Worker (CDW) data collected from 2014 to 2016. The results are contextualized using Steffensmeier’s version of focal concerns theory of judicial decision-making. This study assesses race and two seriousness of offense measures to establish whether a link exists between race and adjudication. The results of the study is similar to prior research on the topic. These results are discussed in terms of policy implications, limitations, and future research.

Keywords: race, disproportionate minority contact, focal concerns theory, juvenile

Procedia PDF Downloads 42
43 Detaching the ‘Criminal Justice Conveyor Belt’: Diversion as a Responsive Mechanism for Children in Kenya

Authors: Sarah Kinyanjui, Mahnaaz Mohamed

Abstract:

The child justice system in Kenya is organically departing from a managerial and retributive model to one that espouses restorative justice. Notably, the Children Act 2001, and the most recent, Children Act 2022, signalled an aspiration to facilitate meaningful interventions as opposed to ‘processing’ children through the justice system. In this vein, the Children Act 2022 formally recognises diversion and provides modalities for its implementation. This paper interrogates the diversion promise and reflects on the implementation of diversion as envisaged by the 2022 Act. Using restorative justice, labelling and differential association theories as well as the value of care lenses, the paper discusses diversion as a meaningful response to child offending. It further argues that while diversion presents a strong platform for the realisation of the restorative and rehabilitative ideals, in the absence of a well-planned, coordinated, and resourced framework, diversion may remain a mere alternative ‘conveyor belt’. Strategic multi-agency planning, capacity building and cooperation are highlighted as essential minimums for the realisation of the goals of diversion.

Keywords: diversion for child offenders, restorative justice, responsive criminal justice system, children act 2022 kenya

Procedia PDF Downloads 17
42 Prevalence of Drug Injection among Male Prisoners in the West of Iran

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: Substance addiction is one of the major worldwide problems that destroys economy, familial relationships, and the abuser’s career and has several side effects; in the meantime drug injection due to the possibility of shared use of syringes among drug users could have multiple complications to be followed. The purpose of this study was to determine the prevalence of drug injection among male prisoners in Kermanshah city, the west of Iran. Methods: In this cross-sectional study 615 male prisoners were randomly selected to participate voluntarily in the study. Participants filled out a writing self-report questionnaire. Data were analyzed by the SPSS software (ver. 21.0) at 95% significant level. Results: The mean age of respondents was 31.13 years [SD: 7.76]. Mean initiation age for drug use was 14.36 years (range, 9-34 years). Almost, 39.4 % reported a history of drug use before prison. Opium (33.2%) and crystal (27.1%) was the most used drug among prisoners. Furthermore, 9.3 % had a history of injection addiction. There was a significant correlation between age, crime type, marital status, economic status, unprotected sex and drug injection (P < 0.05). Conclusion: The low age of drug abuse and the prevalence of drug injection among offenders can be as a warning for responsible; in this regard, implementation of prevention programs to risky behavior and harm reduction among high-risk groups can follow useful results.

Keywords: substance abuse, drug injection, prison, Iran

Procedia PDF Downloads 459
41 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 55
40 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention

Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis

Abstract:

The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.

Keywords: cybercrime, disinformation, fake news, prevention

Procedia PDF Downloads 112
39 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices

Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders

Abstract:

Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.

Keywords: policewomen, mothers, parenting, danger, qualitative research

Procedia PDF Downloads 520
38 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 131
37 Racism in Drug Policies: A Report on United States Legislation

Authors: Frederick Monyepao

Abstract:

Crack cocaine first appeared on the scene in the form of cocaine freebasing in the late 1970s. Stockbrokers, investment bankers, rock stars, Hollywood elites, and a few pro athletes were regular users of the substance. As criminogenic factors associated with substance abuse began to surface, congress passed new legislation. The laws led to the increase of health coverage insurances and the expansion of hospitals. By the mid-1980s, crack use spread into America's inner cities among impoverished African Americans and Latinos. While substance abuse increased among minority communities, legislation pertaining to substance abuse evolved. The prison industry also expanded the number of cells available. A qualitative approach was taken, drawing from a range secondary sources for contextual analysis. This paper traces out the continued marginalisation and racist undertones towards minorities as perpetuated by certain drug policies. It was discovered that the new legislation on crack was instrumental in the largest incarcerations the United States ever faced. Drug offenders increased in prisons eightfold from 1986 to 2000. The paper concludes that American drug control policies are consistently irrational and ineffective when measured by levels of substance use and abuse. On the contrary, these policies have been successful as agents of social control in maintaining the stratification patterns of racial/ethnic minorities and women. To move beyond prohibition, radical law and policy reform may require a change in narratives on substance use.

Keywords: crack, drug policy, minorities, racism, substance abuse

Procedia PDF Downloads 254