首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
钱雪珉 《法制与社会》2014,(32):281-284
中国与越南山水相连,边境地区经贸与人员往来频繁,随着近些年"越南新娘"受到热捧,中越边境周边边民利用自身所处地理优势参与到跨境拐卖越南女性的犯罪集团中并在其中起到主要作用。针对边民参与的中越跨境拐卖妇女犯罪活动现状特点,研讨犯罪管辖、共同犯罪与拐卖犯罪加重情节等问题,希望能为打击和预防跨境拐卖妇女这一严重的犯罪活动提供些许帮助,保障妇女的合法权益,促使边境拥有一个较为良好的环境秩序。  相似文献   

2.
处在边境口岸的云南省瑞丽市,近几年来跨境犯罪案件出现增多趋势,加强对跨境犯罪的打击,是当地公安机关的一项重要任务。本文结合瑞丽实际,通过分析跨境犯罪的特征,提出打击对策。当前跨境犯罪的基本状况跨境犯罪是指境外(国外)的犯罪分子和犯罪组织或境内犯罪分子与境外敌对势力相勾结,乘我对外开放之机,通过各种渠道潜入进行走私、贩毒、诈骗、绑架、杀人等犯罪活动。实行对外开放政策以来,边贸日趋活跃,外来人员增多,给管理工作带来了很大困难,一些境外违法犯罪分子以合法掩盖非法,打着投资经商的名誉,潜入境内进行违法犯罪,而且发展越来越严重。走私活动从初期走私香烟、化妆品、手表、电视机入境,到后来走私摩托车、汽车、大宗货物,数额高达  相似文献   

3.
翁音韵  刘洋 《人民检察》2023,(22):25-28
跨境电信网络诈骗犯罪持续高发且呈现犯罪组织集群化、犯罪手段智能化、犯罪过程隐秘化等特点。与此同时,跨境取证难、追赃挽损阻力大及跨境电信网络诈骗犯罪组织核心人员查处难、非数额构罪要素适用等问题亟须解决。对此,应着力强化跨境联动,畅通境外取证渠道,提升追赃挽损能力,并在准确理解和适用非数额构罪要素的基础上不断优化打击跨境电信网络诈骗犯罪规范体系。  相似文献   

4.
毒品犯罪是指反禁毒法规,破坏禁毒管制活动,应受刑法处罚的行为。而跨境毒品犯罪则指涉及大陆与港澳台之间的毒品犯罪。改革开放以来,我国边境地区成为国际贩毒集团的重要过境路线地区,与大陆存在千丝万缕关系的港澳台地区,跨境毒品犯罪更是迅速蔓延,急剧增多,给人民身体健康和社会安定造成极大的危害。因此,对跨境毒品犯罪的成因及其惩治对策进行研究,具有重要的意义。  相似文献   

5.
随着我国改革开放的不断发展,跨境犯罪问题日益严重,大陆和台、港、澳合作打击跨境犯罪的必要性和紧迫性,也日益为人们所认识,但对合作打击跨境犯罪的具体对策及其可行性的论证,目前还研究得很不够,不足以对惩治跨境犯罪的实践提供有益的理论指导.本文拟对此问题进行初步探讨.  相似文献   

6.
当前,跨境网络赌博犯罪组织多向澜湄流域国家转移,并持续对我国社会经济秩序与人民利益造成威胁.因此,以澜湄流域执法合作为背景,探索完善跨境网络赌博犯罪侦查打击与合作机制具有重要意义.根据当前跨境网络赌博犯罪呈现出的新特征,跨境网络赌博犯罪侦查打击的困境,可采用多途径解决管辖权争议、加强情报信息共享建设、提高电子证据取证能...  相似文献   

7.
内地与港澳跨境洗钱犯罪的刑事司法协助问题   总被引:1,自引:0,他引:1  
洗钱犯罪不仅具有跨国性特点,也具有明显的跨境性。由于内地与港澳刑法对洗钱罪的立法差异,给打击跨法域的洗钱犯罪提出一系列的问题,内地与港澳共同合作打击跨境洗钱犯罪势在必行,包括合理确定跨境洗钱犯罪的刑事管辖权、拓展区际个案协查、促进三地间相互移交逃犯、加强洗钱犯罪收益的没收等四个方面。  相似文献   

8.
商浩文 《政法论丛》2023,(4):139-147
反腐败境外追赃法律机制应具备实效性和长效性,立足于解决境外追赃实践难题,着眼于长效法律机制的建立。但是,从境外追赃执法和司法实践来看,资产跨境转移监测法律的实效性不足,境外承认与执行违法所得没收裁判的实践效果不佳,跨境资产返还中资产分享激励作用不明显。腐败资产跨境转移资追踪难、识别难,我国国内法律制度和域外法治缺乏协调性以及资产流入国法律制度差异等是实践困境产生的重要因素。有必要强化资产跨境转移监测法律的适用力度,拓展境外承认与执行违法所得没收裁决的规范依据,建立健全境外追赃资产分享机制,以提升境外追赃法律机制的实践效果。  相似文献   

9.
跨国网络犯罪的增加使得跨境电子取证的实际需求日益旺盛,我国在2018年颁布了《国际刑事司法协助法》,目的之一是加强国际合作打击跨国犯罪,为我国履行国际条约义务提供法律依据。但在司法实践中,我国的跨境电子取证面临着理论困境和实践困境。网络主权、司法管辖权理论使得单边取证存在着非法性可能。传统跨境电子取证因数据本地化存储和"倒U型"取证结构而效率不高。现有的国际司法协助程序繁杂、时间冗长,无法满足打击跨境犯罪和电子证据取证的现实需求。因此跨境电子取证的简易程序构建具有必要性和紧迫性,对现有司法协助程序进行适当简化,遵循合法性原则和效率性原则,构建境内外双方执法者直接合作方式合法化、派员调查取证方式、建立个案电子取证协助机制三种途径。  相似文献   

10.
为回应打击中国-东盟跨境电信诈骗犯罪对理论研究的新要求,本文梳理了中国-东盟跨境电信诈骗犯罪研究文献,回顾了中国-东盟跨境电信诈骗犯罪的演变,认为电信犯罪组织结构网络化、跨地区化与犯罪行为专业化、高技术化、欺骗性与"非接触性"是这类犯罪突出特点.打击中国-东盟跨境电信诈骗犯罪的困难在于:司法体制障碍,法律适用问题,证据构建难度大,电信、银行部门缺乏同司法机关的深度配合.近期此类犯罪还将蔓延,受害者向内地省份延伸,单案案值不断扩大,涉及国家还会增加.对中国-东盟跨境电信诈骗犯罪的预防措施是建立立体联动的犯罪预防体系,相关各方应加强跨地区警务合作共同打击,加强对银行、电信部门的监管,加强社会公众的防范宣传.  相似文献   

11.
罗刚 《河北法学》2012,(8):138-139,140,141,142,143,144,145
边境是指连接国家边界线两边的一定的区域。云南边境与越南、老挝、缅甸接壤,由于特殊的地理环境,边境两侧无天然屏障,临时入出境通道、便道不计其数,加之当地居民长期养成了从乡间便道过境耕牧、走亲串友的生产、生活习惯,导致出入境管理异常困难,多年来形成"有边难防"的局面。大量存在的非法出入境行为,严重威胁和影响着边疆地区社会的稳定与边防安全,遏制非法出入境行为势在必行。应该在考虑民族地区的特殊情况、依法适当变通的前提下,建构"有边严防"的管理模式。  相似文献   

12.
牛继承 《北方法学》2013,7(5):130-139
申根制度是欧盟边境管理制度的核心内容。欧盟边境管理从制度设计到运转都是服从于欧盟自由、安全和公正区域建设的需要,当前,欧盟正在深化一体化边境管理。借鉴欧盟边境管理的理念、方式,有益于我国边境管理制度的完善和发展。  相似文献   

13.
受各种因素影响,云南边疆地区民族乡政府在自治、经济发展、公共服务、组织协调和学习等方面的能力还有待提高。加强云南边疆地区民族乡政府能力建设。需要从民族乡的社会、经济、文化的发展和国家体制以及政府内部管理等方面进行全方位的变革。并使之成为促进云南边疆地区民族乡经济和社会发展以及加快整个云南省发展的重要保障。  相似文献   

14.
Recent rulings of the European Court of Justice show a trend towards a virtual European health-care basket. Four developments underlie this trend. First, the competence of the European Union seems to mature in the field of health care. Secondly, through a variety of authorisation procedures, individual Member States can to a large extent determine the conditions for cross border care. Thirdly, recent court cases indicate that the co-ordination of cross border care increasingly becomes a EU matter. Finally, in particular border regions, more flexible procedures for cross border care are being developed. An analysis of these developments from an (economic) institutional/constitutional point of view shows that potential Pareto-improvements can be expected from recent changes. These improvements depend on the institutional/constitutional framework into which these rules and engagements are embedded. Our analysis suggests that, although the current (increasing) role for the EU seems desirable, diminishing the role that individual Member States can play is not. National authorisation procedures, local/regional arrangements and flexible rulings are mechanisms that can secure an efficient level of output and an optimal size of the jurisdiction responsible for cross border care. This leads to the following recommendations: Current authorisation procedures (which differ per Member State) have to be maintained in order to secure an optimal community size for cross border services and goods; Bilateral agreements and flexible procedures in cross border regions should be stimulated in order to adapt institutional arrangements to the demand for cross border care by (a group of) individuals. The increased competency of the EU in the field of health care can best be used to make authorisation procedures more consistent and stimulate regional cross border care arrangements.  相似文献   

15.
韩伟 《北方法学》2017,11(3):131-137
发轫于战争特殊时代的陕甘宁边区民事法律,是边区法律制度的重要组成部分。民国六法全书、中共的政策、边区民事立法、民事习惯构成了边区民事法律的主要渊源。中共领导了边区民事立法,体现出民主立法、与时更进、因地制宜等特征,深入分析边区民事立法的基本经验,有助于推动当代中国民法典的编纂。  相似文献   

16.
清雍正三年秋,在湘鄂西容美土司与长阳县交界地区,发生了大规模的汉土田地权属之争,当事各方通过会勘、协商,最终妥善解决了争议,并在争议地带建立起两座形制内容完全相同的"汉土疆界碑",创立了通过协商机制解决区域性民族纠纷的范例。汉土疆界碑铭文典型地反映了清初改土归流前夕,渝湘鄂黔毗邻多民族混居地区民族关系的急剧变化;记录了容美末代土司田?如在与命运抗争的同时,为保一方民众的安宁,坚持理性处理民族关系的策略,为世人认识少数民族土司提供了一个真实的影象。  相似文献   

17.
Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely under-appreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.  相似文献   

18.
In the past 5 years, the mortality rate among undocumented workers in Arizona has increased steadily. In 1998-1999, the number of deaths among border crossers was 28. That number increased dramatically in 1999-2000 to 106 and has exceeded 200 in each of the past 2 years. In the past, many immigrant deaths occurred as a result of dehydration and exposure (1). More recently, a new trend has emerged, that is, death of border crossers at the hands of the persons ("coyotes") hired to lead them across the border to safety. In some cases, the smugglers attempt to extort additional money from the families by holding the victims hostage once they have crossed the border into the United States. If the families fail to pay, the hostage is killed. Rival gangs are also murdering one another over their human cargo. Nine recent cases illustrate this trend in Maricopa County. In each example, the victims were bound, shot (or in one instance stabbed) and dumped in a remote desert area. All of the decedents were linked to murder for extortion by the 'coyotes' or rival gang members.  相似文献   

19.
The Interstate Compact on the Placement of Children (ICPC) is an agreement between all 50 states and the District of Columbia governing the process of placing a foster child out of state. Notorious for its long wait times and system backlog, the ICPC presents a host of problems for children attempting to move mere minutes across state lines to be with a relative or kin placement instead of state foster care. In an effort to make this process smoother, 18 different “border agreements” have been adopted by several neighboring states across the U.S. Such border agreements give temporary placement licenses to relatives and kin while the ICPC process is ongoing. While this is a good start towards a solution, the ICPC could be further streamlined if border agreements were used more widely, especially in regional contexts. This article considers the possibility of such a regional agreement between the District of Columbia, Maryland, and Northern Virginia (known as the “DMV”). By comparing and contrasting two existing border agreements in these three jurisdictions, a regional DMV border agreement can be created implementing the best terms of both agreements.  相似文献   

20.
One of the many difficulties associated with identifying undocumented border crossers stems from an inability to narrow down the search area for the region of origin and family members to obtain family reference samples for DNA comparison. While the geography of regions of origins is wide, the biological profiles of the undocumented border crossers often show strong similarities, young and male. The isotopic composition of human bones, teeth, and hair has been demonstrated to be useful biomarkers for tracing locations and movements of individuals and for aiding in the identification of human remains. Data obtained from human remains can be compared to and aligned with various reference sources, such as soils and bedrock, archaeological remains, or cultural data. Here, the spatial deficiency in isotopic reference data for Mexico, specifically for oxygen (δ18O) isotopes in tap water, is being addressed through the collection and analysis of over 150 water samples and explored with tooth enamel isotopic values from recently identified Mexican nationals. The isoscape was developed using a Spine with Barriers interpolation method and shows sufficient detail to narrow down the regions where specific isotopic values are represented. The individuals were plotted on the developed isoscape using conditional correlations. The methodology was successful in assigning the correct regions of origin for the two individuals, which shows the tremendous potential of the developed isoscape. Nonetheless, there is more research needed to further improve upon this geolocation method, including analysis of multiple isotopes in different tissues, and the development of new isotopic methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号