3,140 research outputs found

    Seaport Vulnerability to Criminal Networks: A Mixed Method Approach to Measuring Criminological Vulnerability in the Top 30 U.S. Container Ports

    Full text link
    Seaports form a unique space for criminological examination. As the locus points for the majority of international and domestic trade criminal network access to a port can provide outsized benefits. While ports are physical spaces they are underlined by complex systems incorporating public and private agencies, companies and small entities. Underlying the administrative and logistical activity at the port is a jurisdictional web of public and private security regulatory agencies. The complexity of the environment creates vulnerabilities that criminal networks can use to gain access to ports. This dissertation developed a Seaport Vulnerability Framework (SVF), developed from the rational choice and situational crime prevention literature with a multi-disciplinary focus that allows security stakeholders to identify whether a port is at risk of utilization by criminal networks. The SVF is used to measure and analyze criminological vulnerability in the top 30 U.S. container seaports and in-depth in a case study at the Port of New York and New Jersey. Finally, I examine the implications of the SVF for port and maritime security policy and port security assessments in the U.S. and worldwide

    Annual Report, Fiscal Year 2021/2022

    Get PDF
    https://digitalcommons.memphis.edu/govpubs-tn-safety-homeland-security-annual-report/1001/thumbnail.jp

    Annual Report, Fiscal Year 2019/2020

    Get PDF
    https://digitalcommons.memphis.edu/govpubs-tn-safety-homeland-security-annual-report/1002/thumbnail.jp

    FY 2011-12 annual accountability report

    Get PDF
    Each year the South Carolina Department of Natural Resources reports to the Office of State Budget that includes the agency's mission, goals and objectives to accomplish the mission, and performance measures regarding the goals and objectives

    Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy

    Get PDF
    Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level of privacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy

    Annual Report, Fiscal Year 2020/2021

    Get PDF
    https://digitalcommons.memphis.edu/govpubs-tn-safety-homeland-security-annual-report/1000/thumbnail.jp

    MLAT Jiu-Jitsu and Tor: Mutual Legal Assistance Treaties in Surveillance

    Get PDF
    A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the Australian LEA\u27s complicity in illegal narcotics activity. The target journalist lives in New York and is a U.S. citizen. She opens her laptop, goes online and fires up Tor Browser. She is communicating with her whistleblowing source in Australia, who faces death if his identity is uncovered. Her communication and network traffic passes through Tor relays in Canada, Finland, and Malaysia before arriving at her source in Australia

    The Contemporary Face of Transnational Criminal Organizations and the Threat they Pose to U.S. National Interest: A Global Perspective.

    Get PDF
    Traditional organized crime groups have consistently posed issues for la w enforcement; however, the contemporary TCOs present an even greater security risk and threat. TCOs thrive in countries with a weak rule of law and present a great threat to regional security in many parts of the world. Bribery and corruption employed by these groups further serve to destabilize already weak governments. These TCOs also present a major threat to U.S. and world financial systems by exploiting legitimate commerce, and in some cases creating parallel markets (“Transnational Organized,” 2011) . Finally, one of the most significant threats posed by contemporary TCOs is their alliances and willingness to work with terrorist and extremist organizations. This paper will focus on contemporary TCOs by giving a brief overview of the most common criminal enterprises associated with these groups, the nexus between various TCOs, the nexus between TCOs and terrorist and extremist groups, case studies highlighting the nexus, and the threats they pose to U.S. national interests

    The nerves of government: electronic networking and social control in the information society

    Get PDF
    Informatisation was introduced as a functional parameter in social and political research in 1978 (Nora & Minc 1978). Today, nearly a quarter of a century later, popular and academic political debates in the West appear to be growing increasingly aware of the intense interaction between information technology and social development. This project follows in the footsteps of this increased awareness and explores the meaning of digitisation for the socio- political concept of citizens' privacy.This project seeks to contribute to a wider body of literature that desires to provide meaningful answers to the following questions: (1) what sociotechnical trends are evident today in information privacy policies in the United Kingdom (UK) and the United States (US)? (2) What particular political visions do these trends seem to favour and what do these visions appear to suggest for the future of citizens' privacy in the West? (3) What is the potential importance of digital networking for practices of social management and control, both by governmental decision centres and commercial bodies?As case study for the above issues, the eventful appearance of two recent legislative works has been selected: the Regulation of Investigatory Powers Act (RIPA), enacted by the UK parliament in July 2000; and the Communications Assistance for Law Enforcement Act (CALEA), enacted in the US in 1994. Both Acts, which have yet to be fully implemented, in effect make it mandatory for all telecommunications operators and service providers to, among other things, ensure that their customers' communications can be intercepted by law enforcement and intelligence organisations, whose interception capabilities have been seriously hampered by the digitisation of telecommunications during the past few years.The project combines quantitative and qualitative data on RIPA and CALEA, which have been acquired through open- source, restricted or leaked government and industry reports on the subject, as well as through a number of interviews with informed individuals representing different sides of the communications interception (CI) debate. The development of communications interception is thus placed into the context of complex relationships between political actors, such as national policy experts and government advisors, state and corporate decision -makers and members of regulatory bodies
    corecore