首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Controversies have surrounded law enforcement intelligence because of past instances where the police maintained records of citizens' activities that were viewed as suspicious or anti-American, even though no crimes were being committed. This, of course, violates fundamental constitutional guarantees and offends the American sense of fairness with respect to government intrusiveness. Unfortunately, the boundary is not precise regarding the types of information the police can collect and keep. Some legal guidelines appear contradictory and the application of law to factual situations is often difficult. Beyond the legal ramifications, early intelligence initiatives by the police typically lacked focus, purpose, and process. Important lessons can be learned from these historical experiences that provide context and guidance for law enforcement intelligence today. Aggravating the [kinds of factors referred to above] has been the tenuous relationship between law enforcement intelligence and national security intelligence that has changed continuously since the mid-20th century. These changes have been both politically and legally controversial, responding to changing socio-political events in American history and most recently through post-9/11 counterterrorism efforts. As a result, there is value in understanding selected portions of history from both types of intelligence to gain context and understand the lessons learned.  相似文献   

2.
情报信息的侦查模式   总被引:2,自引:0,他引:2  
马忠红 《政法学刊》2006,23(3):96-100
侦查模式是指侦查主体进行侦查活动时所采用的程式。传统侦查模式可分为从案到人、从人到案、从案到人、从物到案等模式。情报信息的侦查模式是利用情报信息系统和通讯网络开展的侦查方式,从侦查切入点、侦查思维、侦查措施、侦查效率等方面与传统侦查模式有着较大的差别。情报信息的侦查模式具有反应迅速、过程保密、结果客观、成本低、效率高等优势和特点。  相似文献   

3.
Amphetamine-type substances (ATS), like other synthetically derived compounds, can be produced by a multitude of synthetic pathways using a variety of precursors and reagents, resulting in a large number of possible contaminants (by-products, intermediates and impurities). This review article describes the common contaminants found in preparations of methylamphetamine (MA), 3,4-methylenedioxymethylamphetamine (MDMA), amphetamine (AP), N,N-dimethylamphetamine (DMA) and p-methoxyamphetamine (PMA) synthesised via common synthetic pathways including reductive amination, Leuckart method, Nagai method, Emde method, Birch reduction, “Moscow” method, Wacker process, “Nitrostyrene” method and the Peracid oxidation method.Contaminants can facilitate identification of the synthetic route, origin of precursors and may suggest information as to the location of manufacture of these illicit drugs. Contaminant profiling can provide vital intelligence for investigations in which linking seizures or identifying the synthetic pathway is essential. This review article presents an accessible resource; a compilation of contaminants resulting from a variety of manufacturing methods used to synthesise the most common ATS. It is important for research in this field to continue as valuable information can be extracted from illicit drug samples, increasing discrimination amongst ATS, and in turn, leading to an increase in evidential value and forensic drug intelligence from forensic drug samples.  相似文献   

4.
This article examines recent United Kingdom government proposals for secret inquests, which, it is argued, are part of a general push for secrecy discernible across common law jurisdictions, and which include developments such as increased recourse to sensitive evidence in forensic settings and the normalization of intelligence‐led policing. While the push for secrecy is justified by national security claims, the article shows that in cases of contentious death involving police, the issue is less about national security and more about the use of intercept evidence, covert surveillance, and intelligence‐led policing, all of which have implications for police trust, accountability, and reputation management.  相似文献   

5.
论广州亚运安保警务情报机制的构建   总被引:1,自引:0,他引:1  
丘志馨 《政法学刊》2010,27(5):112-116
情报信息是亚运安保部门最重要的安全资源和工作基础,公安机关作为亚运安保工作的主力军,在亚运会的安全保卫工作中必须进行科学的社情评估,建立高效的警务情报机制,精心组织实施安保工作,力争实现"和谐亚运"的工作目标。  相似文献   

6.
张新海 《政法学刊》2007,24(5):111-114
汽车数量的膨胀,涉车违法犯罪愈加猖獗,车辆套牌违法行为呈多发态势,公安机关的整治行动一度陷入困境。科学治理套牌车非法上路行驶,需要树立情报信息主导警务理念,既要采取法律手段、技术手段,更要采取信息手段;需要建立部门联动机制,使用先进装备,培养信息专门人才,规范情报信息的采集与录入。  相似文献   

7.
Since 1978, the Foreign Intelligence Surveillance Act (FISA) has governed United States intelligence gathering for national security purposes. Enacted in response to the Watergate–era civil rights violations and revelations of a Senate investigation headed by Senator Frank Church that other presidential administrations had authorized similar warrantless surveillance, FISA established a statutory framework for national security surveillance. Understanding FISA contributes to the study of criminal justice policymaking because law enforcement and intelligence communities view it as an important tool for combatting espionage and terrorism. This article examines the enactment of FISA from the perspective of symbolic politics.  相似文献   

8.
论广东街面“两抢一盗”犯罪的精确打击   总被引:1,自引:0,他引:1  
刘国旌 《政法学刊》2007,24(1):47-50
严厉打击街面“两抢一盗”犯罪活动,是当前公安中心工作的重要任务之一。通过提高侦查人员的综合素质,加强对“两抢一盗”犯罪情报信息研判,精确获取街面“两抢一盗”犯罪证据,实施精确打击,是“专项整治”遏制“两抢一盗”犯罪的需要,是提高办案质量和对犯罪人员的打击处理率的重要保证,是公安机关打击街面“两抢一盗”犯罪这场战役是否取得成效的重要标准,也是我们当前加强街面“两抢一盗”犯罪案件侦查工作问题研究所面临的一个重要课题。  相似文献   

9.
田刚 《法学论坛》2021,36(2):66-75
《数据安全法(草案)》的发布是数据安全作为独立法益的立法宣示,基于数据安全对个体利益、公共安全和国家安全的重要价值,刑法有必要将其纳入保护范围。现行刑法对数据安全的保护是通过制裁信息犯罪间接实现的,由于刑法视阈下的信息和数据存在着本质性差异,未来刑法必然要建立新的数据犯罪罪名体系,实现数据安全领域刑法保护的大规模扩张。为了避免刑法扩张演化成违背谦抑性的公权力滥用,必须进行"合边界性审视",确保其不会突破刑法自身的边界。由于数据安全法益自身无法通过"法益原则"实现刑法边界划定功能,有必要引入"广义危害性原则",在数据安全领域的刑法保护扩张之前,划定扩张的合理边界。  相似文献   

10.
Forensic science laboratories are being challenged by the expanding decentralization of forensic capabilities, particularly for digital traces. This study recommends laboratories undertake digital transformations to capitalize on the decentralization movement, develop a more comprehensive understanding of crime and security‐relevant problems, and play a more central role in problem‐solving collaboratively with law enforcement organizations and other stakeholders. A framework for the bilateral transfer of information and knowledge is proposed to magnify the impact of forensic science laboratories on abating crime, strengthening security, and reinforcing the criminal justice system. To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence. Ultimately, this study encourages managers, educators, researchers, and policymakers to look beyond the usefulness of forensic results for solving individual investigations, and to realize the value of combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.  相似文献   

11.
ABSTRACT

An increasingly globalised world brings with it unprecedented complexities in international intelligence sharing. The continual integration of international markets and services, amid the ongoing disruption of digital technologies, is driving the need for greater collaboration and cooperation between countries. The flows of people, goods, ideas and information are increasing each year in tandem with the global reach of terrorism. Global reliance on the internet for commerce and communication also exposes countries and organizations to cyber-attack. Significant increases in borderless crime, the rising incidence of global political fragility, and shifts in multi-jurisdictional crime all compel law enforcement, intelligence and security agencies to continually re-evaluate existing approaches and policies. The ability of police to attack transnational organized crime at its source, or at a transit point that offers opportunities for effective disruption, is now more important than ever. This essay describes a study conducted by the Australian Strategic Policy Institute that identified a number of crucial issues with Australia’s criminal intelligence efforts offshore. It explains why it is important to foster a culture of offshore criminal intelligence, looks at challenges associated with the current system, and suggests ways to overcome those challenges. The research confirms that Australia’s efforts to collect and disseminate criminal intelligence, as distinct from routine international liaison, is ripe for improvement.  相似文献   

12.
薛殿杰 《政法学刊》2005,22(6):77-80
将精确打击中的制信息权用于绑架勒索案件的侦查,是保障人质安全,及时抓捕绑匪的有效手段。探索夺取绑架案件侦查中的制信息权,以情报信息引导精确锁定犯罪嫌疑人,安全解救人质的战术战法对于绑架案件的及时侦破具有重要的现实意义。  相似文献   

13.
In the United States and elsewhere, there is substantial controversy regarding the use of race and ethnicity by police in determining whom to stop, question, and investigate in relation to crime and security issues. In the ethics literature, the debate about profiling largely focuses on the nature of profiling and when (if ever) profiling is morally justifiable. This essay addresses the related, but distinct, issue of whether states have a duty to collect information about the race and ethnicity of persons stopped by police. I argue that states in the U.S. do have such a duty on the grounds that such information collection would help secure the value of persons' human rights against discrimination and unfair policing. Nonetheless, a large number of states do not require it. I begin by distinguishing rights from the value of rights, and arguing that under certain conditions persons have claims to the value of rights themselves, and that states have duties to secure that value. I then turn to the issue of profiling and offer the value of rights argument in favor of information collection about the race and ethnicity of persons stopped by police.  相似文献   

14.
关于我国网络信息安全应急的立法构想   总被引:2,自引:1,他引:1  
随着网络信息技术的高速发展及其广泛应用,网络安全问题日益突出,网络紧急事件的不断增多亟待立法加以规范。通过对网络信息安全应急立法的价值定位即安全价值、效率价值和发展价值的研究,从我国立法现状及其存在的缺陷出发,结合国外有关立法经验,提出我国网络信息安全应急的立法构想。  相似文献   

15.
Forensic intelligence can be viewed as comprising two parts, one directly concerning intelligence delivery in forensic casework, the other considering performance aspects of forensic work, loosely termed here as business intelligence. Forensic casework can be viewed as processes that produce an intelligence product useful to police investigations. Traditionally, forensic intelligence production has been confined to discipline-specific activity. This paper examines the concepts, processes and intelligence products delivered in forensic casework, the information repositories available from forensic examinations, and ways to produce within- and across-discipline casework correlations by using information technology to capitalise on the information sets available. Such analysis presents opportunities to improve forensic intelligence services as well as challenges for technical solutions to deliver appropriate data-mining capabilities for available information sets, such as digital photographs. Business intelligence refers primarily to examination of efficiency and effectiveness of forensic service delivery. This paper discusses measures of forensic activity and their relationship to crime outcomes as a measure of forensic effectiveness.  相似文献   

16.
Organised criminality is a great concern for national/international security. The demonstration of complex crimes is increasingly dependant on knowledge distributed within law-enforcement agencies and scientific disciplines. This separation of knowledge creates difficulties in reconstructing and prosecuting such crimes. Basic interdisciplinary research in drug intelligence combined with crime analysis, forensic intelligence, and traditional law enforcement investigation is leading to important advances in crime investigation support. Laboratory results constitute one highly dependable source of information that is both reliable and testable. Their operational use can support investigation and even provide undetected connections or organisation of structure. The foremost difficulties encountered by drug analysts are not principally of a chemical or analytical nature, but methodologies to extract parameters or features that are deemed to be crucial for handling and contextualising drug profiling data. An organised memory has been developed in order to provide accurate, timely, useful and meaningful information for linking spatially and temporally distinct events on a national and international level (including cross-border phenomena). Literature has already pointed out that forensic case data are amenable for use in an intelligence perspective if data and knowledge of specialised actors are appropriately organised, shared and processed. As a particular form of forensic case data, the authors' research focuses on parameters obtained through the systematic physical and chemical profiling of samples of illicit drugs. The procedure is used to infer and characterise links between samples that originate from the same and different seizures. The discussion will not, however, focus on how samples are actually analysed and compared as substantial literature on this topic already exists. Rather, attention is primarily drawn to an active and close collaboration between magistrates, forensic scientists, law enforcement investigators and crime analysts from different institutions with the aim of generating, using and validating relevant profiling case data as integral part of investigative and crime analysis processes. Original advances are highlighted through experiences from criminal investigations of offences related to the unlawful importation, exportation, supply and possession of illicit drugs.  相似文献   

17.
“Text mining” covers a range of techniques that allow software to extract information from text documents. It is not a new technology, but it has recently received spotlight attention due to the emergence of Big Data. The applications of text mining are very diverse and span multiple disciplines, ranging from biomedicine to legal, business intelligence and security. From a legal perspective, text mining touches upon several areas of law, including contract law, copyright law and database law. This contribution discusses the legal issues encountered during the assembly of texts into so-called “corpora”, as well as the use of such corpora.  相似文献   

18.
《Global Crime》2013,14(2-3):155-174
As consumers are increasingly using the Internet to manage their finances, there has been a concomitant increase in the risk of theft and fraud by cybercriminals. Hackers who acquire sensitive consumer data utilise information on their own, or sell the information in online forums for a significant profit. Few have considered the organisational composition of the participants engaged in the sale of stolen data, including the presence of managerial oversight, division of labour, coordination of roles and purposive associations between buyers, sellers and forum operators. Thus, this qualitative study will apply Best and Luckenbill's framework of social organisation to a sample of threads from publicly accessible web forums where individuals buy and sell stolen financial information. The implications of this study for criminologists, law enforcement, the intelligence community and information security researchers will be discussed in depth.  相似文献   

19.
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents. The final phase within many security incident response approaches is the feedback/follow-up phase. It is within this phase that an organization is expected to use information collected during an investigation in order to learn from an incident, improve its security incident response process and positively impact the wider security environment. However, recent research and security incident reports argue that organizations find it difficult to learn from incidents.A contributing factor to this learning deficiency is that industry focused security incident response approaches, typically, provide very little practical information about tools or techniques that can be used to extract lessons learned from an investigation. As a result, organizations focus on improving technical security controls and not examining or reassessing the effectiveness or efficiency of internal policies and procedures. An additional hindrance, to encouraging improvement assessments, is the absence of tools and/or techniques that organizations can implement to evaluate the impact of implemented enhancements in the wider organization. Hence, this research investigates the integration of lightweight agile retrospectives and meta-retrospectives, in a security incident response process, to enhance feedback and/or follow-up efforts. The research contribution of this paper is twofold. First, it presents an approach based on lightweight retrospectives as a means of enhancing security incident response follow-up efforts. Second, it presents an empirical evaluation of this lightweight approach in a Fortune 500 Financial organization's security incident response team.  相似文献   

20.
《Global Crime》2013,14(3-4):561-582
The thousands of large and small private security establishments operating around the world today continue to expand in number, diversity, and capability. Government oversight is often lacking, and the impact on local, national and regional security and stability may be substantial. In the most troubled areas, the pockets of security provided by private security regimens provide may mean the difference between a failed state and one that is at least faltering. However, the advantages of “private security firm cover” quickly became evident to criminals and groups with terrorist agendas as well. This assessment addresses numerous cases from around the world of private security establishments that were either formed for—or otherwise turned to—the pursuit of criminal or terrorist purposes. The stated jihadist intent to infiltrate such companies underscores the need for law enforcement and intelligence attention to the recruiting, affiliations and activities of these security enterprises.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号