10 research outputs found

    Agent selection and threat actualization in contamination cases: Predicting action from perpetrator behavior

    Get PDF
    While existing research on the topic is sparse, previous works have shown that there is believed to be a substantial threat of intentional, malicious contamination of the supply chain by criminals and terrorists (CFSAN, 2001; WHO, 2008). Genuine contamination incidents have the potential to result in mass casualties, although empty threats are often enough to generate public fear and lead to considerable economic damage. While empty threats often appear indistinguishable from those which will result in contamination, it is thought that certain variables identified in perpetrator communications may be able to help separate empty threats from those which will be actualized. This research thus attempts to determine whether a perpetrator’s reported choice of agent could offer functional predictions for the likelihood of actual contamination in future incidents. Findings indicate that chemical agents alone are more likely to be associated with genuine contamination, while the claimed use of biological agents alone as well as chemical, biological and radionuclear (CBRN) agents combined are more often associated with empty threats. The utility of these findings will be discussed, as well as suggestions for future research

    Sage Research Methods Case 2: Using unobtrusive data to study criminal behavior: Understanding malicious contamination incidents

    Get PDF
    Malicious contamination is a term used to describe a number of different types of criminal activity, from poisoning and product tampering to extortion and food terrorism. However, little is known about these types of crime as few empirical studies have been conducted to date. In particular, there is a lack of clear definitions in the literature for terms like “product tampering” and “poisoning.” To develop such definitions and to explore crimes of malicious contamination in more depth, a database was constructed consisting of all known incidents of malicious contamination worldwide occurring over a 40-year period. Out of necessity, this database was constructed using unobtrusive, open source data which was then content analyzed for the presence or absence of pertinent behavioral variables. The following case study highlights the advantages and disadvantages of working with unobtrusive data to study criminal behavior, including issues related to validity, reliability, and credibility. Specific examples have been included from the author’s own PhD work and subsequent publication, with an emphasis on how some of the abovementioned challenges were addressed. The importance of unobtrusive data to the study of forensic and investigative psychology is also discussed

    Criminal poisoning and product tampering: Toward an operational definition of malicious contamination

    Get PDF
    ‘Malicious contamination’ encompasses multiple crimes which have received little previous academic attention, including poisoning and product tampering. While these acts may seem easy to distinguish, there are many areas of overlap, and so before these crimes and those who commit them can be understood clear definitions must be introduced. The presence or absence of 14 behavioural variables is proposed as a way of distinguishing product tamperings from poisonings, with the empirical definition then tested on 384 malicious contamination incidents. The operational definition successfully distinguishes 92.7% of the cases and allows for a comparison of the differences between poisoning and tampering

    A definitional framework of poisoning crimes

    No full text
    This chapter proposes an empirically derived definitional framework that can both bring together poisoning crimes for comparison while distinguishing different forms of criminal activity based on three variables indicative of perpetrator intentions and motivations; the specificity of victim targeting, the motivational goal and the precipitating form of violence. Based on their classification on these variables, it presents eight broad forms of poisoning crimes, along with subordinate crimes, which can be used to facilitate comparison and differentiation. The first crime group involves highly specified victims targeted for personal reasons using instrumental violence. Such incidents may occur when a perpetrator attacks an individual known to them for some form of financial—or otherwise instrumental—gain. Assassinations and attempts most frequently involve one victim, although it is possible for attacks to result in multiple casualties. Of each of the groups defined, those involving low specificity victims for political means are perhaps the most difficult to distinguish according to whether they are instrumental or expressive

    Cross-disorder analysis of bipolar risk genes: further evidence of DGKH as a risk gene for bipolar disorder, but also unipolar depression and adult ADHD

    No full text
    Recently, several genome-wide association studies (GWAS) on bipolar disorder (BPD) suggested novel risk genes. However, only few of them were followed up and further, the specificity of these genes is even more elusive. To address these issues, we genotyped SNPs in ANK3, CACNA1C, CMTM8, DGKH, EGFR, and NPAS3, which were significantly associated with BPD in previous GWAS, in a sample of 380 BPD patients. Replicated SNPs were then followed up in patients suffering from unipolar depression (UPD; n=387) or adult attention-deficit/hyperactivity disorder (aADHD; n=535). While we could not confirm an association of ANK3, CACNA1C, and EGFR with BPD, 10 SNPs in DGKH, CMTM8, and NPAS3 were nominally associated with disease, with two DGKH markers surviving correction for multiple testing. When these were followed up in UPD and aADHD, seven DGKH SNPs were also associated with UPD, while one SNP each in NPAS3 and CMTM8 and four in DGKH were linked to aADHD. Furthermore, a DGKH haplotype consisting of rs994856/rs9525580/rs9525584 GAT was associated with all disorders tested, while the complementary AGC haplotype was protective. The corresponding haploblock spans a 27-kb region covering exons coding for amino acids 65–243, and thus might include functional variants yet to be identified. We demonstrate an association of DGKH with BPD, UPD, and aADHD by applying a two-stage design. These disorders share the feature of mood instability, so that this phenotype might be associated with genetic variation in DGKH.Heike Weber, Sarah Kittel-Schneider, Alexandra Gessner, Katharina Domschke, Maria Neuner, Christian P Jacob, Henriette N Buttenschon, Andrea Boreatti-Hümmer, Julia Volkert, Sabine Herterich, Bernhard T Baune, Silke Gross-Lesch, Juliane Kopf, Susanne Kreiker, Thuy Trang Nguyen, Lena Weissflog, Volker Arolt, Ole Mors, Jürgen Deckert, Klaus-Peter Lesch and Andreas Rei
    corecore