Co-operation in Combating International Crime (some aspects)




Text 1

 

Over the last 25 years international crime has expanded enormously. Individuals and companies are being subjected to increasing pressure from criminals leading to widespread feelings of insecurity. Interpol's fundamental role is to facilitate communication, a continuing exchange between countries. In this way Interpol is in a position to overcome the barriers to investigation caused by national frontiers.

 

Crimes committed against individuals (such as murder, robbery, armed robbery, serious assault, rape, kidnapping, extortion, hostage-taking and offences against children) often become 'international' because the criminals commit an offence in one country and then take refuge in another. Most of these criminal activities are monitored by the General Crime Branch and, as a result, modus operandi and 'operational matter' circulars are often prepared and sent out to Member States.

 

Traffic in human beings, prostitution. Almost all these offences are covered by international conventions. In the trafficking of women, as well as in illegal immigrant smuggling, the perpetrators (i.e. recruiters, smugglers and exploiters) may form an organized group or serve as independently operating links in a chain of individuals working together.

 

Crimes against property (such as armed robbery of banks or security vehicles, traffic in stolen motor vehicles, theft of vehicles carrying freight, of identity and travel documents and of works of art) are often committed by gangs of thieves operating in several countries or by highly skilled international specialists.

The General Secretariat publishes a vehicle registration brochure to assist in identifying vehicles rapidly and the Interpol Guide to Vehicle Registration Documents in Europe and North Africa. In 1996 the General Secretariat created a centralized database of stolen and/or misappropriated motor vehicles enabling Member States to enter information on stolen vehicles and to carry out searches on vehicles which are the subject of investigations.

 

International traffic in cultural property. The theft of works of art is a particular concern. To combat this kind of crime effectively, a specialized computer database has been developed containing detailed descriptions of stolen works of art. Interpol is conscious of a need to increase international awareness of crimes of this nature. "Wanted” posters are produced twice a year and a major project is under way to put a large proportion of the visual data. International conferences and working meetings are held regularly to develop and implement strategies against the illegal traffic of cultural property.

 

 

Firearms and explosives used for criminal purposes is another sector covered by the General Crime Branch. A database contains information on traffic in firearms, the use of explosives for criminal purposes and data on improvised explosive devices. Access is restricted to ensure maximum confidentiality.

 

Combating international terrorism. The Terrorism Branch collects information about acts of terrorism and works closely with the international civil aviation agencies on measures to counter crimes against civil aviation.

It is important to recognize that the General Assembly resolution adopted in 1984 in Luxembourg emphasized the criminal nature of acts of terrorism. It states:

"When offences are committed by persons with definite political motives but when the offences committed have no direct connection with the political life of the offenders' country or the cause for which they are fighting, the crime may no longer be deemed to come within the scope of Article 3."

Fraud is a term which covers a variety of economic offences, many of which have international aspects. For instance, fraudulent commercial operations conducted to the detriment of both individuals and governments may constitute serious threats to the economies of victim countries.

Such offences which are particularly complex and usually involve large sums of money are often committed by international specialists. This form of international crime is currently one of the areas of greatest concern.

 

Information technology crime. Increasing use of information technology has meant greater law enforcement activity in combating computer crime. The need for specialist knowledge in this field has led to an ongoing whereby regional working parties, overseen by an international steering committee, have produced amongst other things international training courses for law enforcement officers and a computer crime manual. These initiatives are continuously updated to ensure that information on the latest technology is always available to investigators in police services in Member States around the world.

 

Corruption. Also within the sphere of economic crime, corruption has a major impact internationally on the economies of many countries. The law enforcement interest in all aspects of corruption has been enhanced by the recent increase in cooperation with other international organizations.

 

Environmental crime such as illegal traffic in hazardous waste, is also considered to be a form of economic crime and, as always, close co-operation among Member States is encouraged through Interpol.

 

The Forensic Analysis Unit works with counterfeit banknotes. It collects, analyses and disseminates technical data such as the assignment of international indicatives, method of manufacture, the association of related banknotes and documents and any available descriptive commercial information to help identify the equipment and materials used.

 

Illicit drug traffic. The Drugs Sub-Directorate enhances co-operation between Member States and stimulates the exchange of information between all national and international enforcement bodies concerned with countering the illicit production, traffic and use of narcotic drugs and psychotropic substances.

A number of projects have been established to address topics which are particularly serious and widespread. Recently these have included:

§ Operation "Hostal" - investigating the activities of West African criminal groups who are smuggling cocaine by post from South America principally to the African continent.

§ Operation "Show Me How" - investigating the activities of West African criminal groups who are smuggling heroin from Thailand and Pakistan by post to destinations all round the world.

§ Operation "Black Powder" - investigating a Colombian trafficking organization which has smuggled cocaine to Europe uniquely mixed with industrial pigments to disguise its narcotic content.

These projects are ongoing and have enjoyed success. Several arrests and seizures have been made as a direct result of these operations.

(from Internet www)

Notes:

has expanded enormously – расширила границы

are being subjected to – подверглись влиянию

to facilitate – способствовать, продвигать, содействовать

caused by - вызвано

to take refuge – находить убежище, пристанище

modus operandi – метод действия («почерк») преступника

a vehicle registration brochure – журнал регистрации угнанных транспортных средств

to enter information – владеть информацией

visual data – наглядные данные

to implement strategies – приводить в исполнение

to counter crimes – противостоять преступности

detriment – ущерб, вред

available – доступный, относящийся к делу

member states – государства-члены

impact – удар, толчок; влияние, воздействие

has been enhanced by – увеличился, возраст

hazardous – рискованный, опасный

counterfeit – подделывать; подделка

disseminates – распространяет

 

 

Text 2

Computer Crime

Homicide and rape have changed little for centuries, but forms of theft have altered greatly. For example, train robbery did not exist until trains began carrying currancy, gold, and wealthy passengers. Thieves have always adjusted their strategics to the technologies and opportunities of the times. One of the latest features is theft by computer.

The electronic computeris only about fifty years old but is already an integral (necessary) aspect of our lives. Business and finance, aswe know it, would be impossible without the computer. The computer seems for most of us to be a mysterious genius which guides rockets in space, play chess, etc. But it is no genius. It is a stupid tool for handling great numbers of data with incredible (невероятный) speed. It is all the same for the computer to whom it obeys and for what purposes. The computer cannot identify fraudulent checks and fraudulent data. When the dataare of great value, the computer becomes a target for fraud, especially the data concerning property, services, and money which can be transferred from one account to another within the computer. The thieves are not only bookkeepers and tellers (кассир в банке), but also computer programmers, operators and engineers.

Because the computer is sonew, all the ways it can be used in crime are yet to be discovered.

There are three basic criminal uses of computers:

1. Embezzlement. This is a modern workplace crime. An employee writes a computer program which diverts company assents (актив, имущество) for his or her personal use. So here the trusted (доверенные) employees steal from their employers.

2. Falsification of company records. This is usually a crime by company managers who are attempting to mispresent the company’s assets. Here the crime is committed by the compa­ny, not against it.

3. Theft of computer data. This crime may be committed byinsiders (сотрудник oрганизации) or by outsiders with insiders’ assistance. It includes stealing of programs - which can be very valuable - for use of other companies, or the theft of other information stored in the computer which may be con­fidential and valuable.

Of course, companies and financial institutions have used many security means to prevent and discover computer crime. But in spite of this criminal can do a great damage in a very short. time



Поделиться:




Поиск по сайту

©2015-2024 poisk-ru.ru
Все права принадлежать их авторам. Данный сайт не претендует на авторства, а предоставляет бесплатное использование.
Дата создания страницы: 2016-04-11 Нарушение авторских прав и Нарушение персональных данных


Поиск по сайту: