Comparative Models in Policing Midterm
Comparative Models in Policing Midterm
Effects of Globalization
1. Industrial – emergence of worldwide production markets and broader access of
consumers and companies to a wider range of foreign and local products.
2. Economic – realization of a global market, based on the freedom of exchange of goods
and capital between countries.
3. Political – in a political lens, globalization means the creation of a world government.
4. Informational – it is the increase in information flow between geographically remote
locations.
5. Language – important tool in globalization as it ensures that individuals across the globe
are able to communicate using a common language. English serves as the language of
business.
6. Competition – various industries must upgrade their products and use technology
skillfully in order to survive increased competition.
7. Ecological – global concerns on environmental challenges which can be addressed with
international cooperation.
8. Cultural – cross-cultural contacts.
9. Social – humanitarian aid and developmental efforts
10. Technical – the development of a global information system, global telecommunications
infrastructure, and greater trans-border data flow, using technologies.
Globalization as Internalization
- It is the seamless introduction of products and services in the international markets.
- Global means worldwide
Universalization – to make services, practices, accessibility to information and goods universal.
Universal – including or covering all or a whole collectively or distributive without limit or
exception; to make services, practices, and available equitably to all members of a society.
Drug Trafficking
- Transporting, transferring, harboring, or selling illegal drugs and drug paraphernalia.
Terminologies Associated with Drug Trafficking
1. Cartel – a collection of individuals, entities, and commercial operations formed in the
hopes of conducting communal business activity regarding a specific product or service.
2. Drug Mule – a individual employed to secretly transport and traffic drugs ina clandestine
manner.
3. Controlled substance – a substance or item that is legal to possess, use or administer
because of expressed permission granted by the Federal Government.
Cybercrimes
- Form of illegal activities which makes use of the internet, private or public network, or an
in-house computer system.
Four Categories of Computer Crimes
1. The computer as a target – the attack seeks to deny the legitimate users or owners of the
system access to their data or computers.
2. The computer as an instrument of the crime – the computer is used to gain criminal
objectives.
3. The computer as incidental to a crime – the computer is not the primary instrument of the
crime, it simply facilitates it.
4. Crimes associated with the prevalence of computers – this includes crimes against
industries, such as intellectual property theft and software piracy.
Crimes that Primarily Target Computer Networks or Devices
A. Computer Virus – is a computer program that can replicate itself and spread from one
computer to another.
“virus” type of malwares that do not have a reproductive ability.
B. Denial-of-Service Attack (DOS Attack) or Distributed Denial-of-Service Attack (DDOS
Attack) – is an attempt to make a machine or network resource unavailable to its intended
users.
C. Malware (Malicious Code) Short for Malicious (or Malevolent) Software – is software
used or created to disrupt computer operation, gather sensitive information, or gain access
to private computer systems.
Crime that Uses Computer Networks or Devices to Advance other Ends:
A. Cyberstalking – is the use of the internet or other electronic means to stalk or harass an
individual, a group of individuals, or an organization.
Types of Cyberstalking
• Email Stalking – is committed when a person harasses another individual, a group of
individuals, or an organization with the use of emails.
• Chat stalking – is the act of using a chat room to monitor or get information about an
individual, a group of individuals or an organization and using the information without
their consent.
• Computer stalking – in computer stalking, the cyber stalker exploits the internet and the
windows operating system to assume control over the computer of targeted victim.
B. Fraud and Identity Theft – is a form of stealing using another person’s identity to access
resources or obtain credit and benefits using a false identity.
C. Information Warfare – involves the use and management of information technology in
pursuit of a competitive advantage over an opponent.
D. Phishing Scams – the act of acquiring the usernames, passwords, and credit card details
(and sometimes, indirectly, money) by masquerading as a trustworthy entity in an
electronic communication.
E. Cyber Terrorism – is an act of terrorism using cyberspace or computer resources.
F. Cyber-Extortion – form of cyber-terrorism where hackers access and attack the websites
or computer systems of an individual or an organization.
G. Cyber-Bullying – is the use of the internet and related technologies to harm other people,
in a deliberate, repeated, and hostile manner.
H. Child Pornography – refers to images or films and writings depicting sexually explicit
activities involving a child.
Different Kinds of Child Pornography
Money Laundering
- Process whereby proceeds, reasonably believed to have been derived from criminal
activity, are transported, transferred, transformed, converted, intermingled with legitimate
funds, for the purpose of concealing or disguising the true source, disposition, movement,
or ownership of those proceeds.
Three Basic Steps to Change Illicit Funds to Legitimate Funds
A. Placement – derived from criminal activities into a more portable and less suspicious
form, then getting those proceeds into the mainstream financial system.
B. Layering – involves the movement of illegal drugs, often mixed with funds of legitimate
origins, through the world’s financial systems in numerous accounts through a financial
or banking systems to hide the funds origin.
C. Integration – is the process of reintroducing the layered funds into the mainstream
economy, where it can be invested and spent freely.
Environmental Crimes
- Deliberate evasion of environmental laws and regulations by individuals and companies
in the pursuit of “personal interest and benefit.”
Maritime Piracy
- Can be in the form of traditional robbery on the high seas which has transformed into a
form of kidnapping for ransom.
Counterfeiting of Goods
- Is a form of consumer fraud where a product is sold, purporting to be something that is
not. To counterfeit mens to imitate something authentic.
Trafficking of Cultural Property
- Refer to the common heritage of humankind. It is so unique and an important testimony
of the evolution and identity of human beings.
Terrorism
- Is the use of violence and threats to intimidate or coerce, for political purposes where fear
and submission are the end results.
Four Key Elements of Terrorism
• It is premeditated
• It is political
• It is aimed at civilians
• It is carried out by sub-national groups.
Two General Types of Terrorism
1. Domestic Terrorism
- Involves persons or groups committing a terrorist act/s in their own country.
2. International Terrorism
- Involves citizens or the territory of more than one country.
Kinds of Terrorism
1. Official/State Terrorism
- The nation whose rule is based upon fear and oppression that is similar to the terrorism or
of such proportion.
2. State Sponsored Terrorism
- The Abu Nidal Organization is an example of state -sponsored terrorism where Iran
accused Cuba, Iraq, Libya, North Korea, Sudan and Syria of supporting terrorism.
3. Right Wing Terrorism
- One of the least organized terrorists. This group attacks immigrants and refugees.
4. Left Wing Terrorism
- Limits the use of violence but destroys the democracy in take over with the socialist or
communist regime.
5. Religious Terrorism
- Is a type of religious violence where terrorism is used to achieve religious objectives as
influenced by religious beliefs or identity.
6. Quasi Terrorism
- The activities incidental to the commission of crimes of violence that are similar in
method to genuine terrorist, but which nevertheless lack its essential ingredient.
7. Narco Terrorism
- Refers to the violence used by drug traffickers to influence the government or prevent
government efforts to stop the drug trade.
8. Cyber Terrorism
- Use information technology to attack civilians and draw attention to their cause.
9. Bioterrorism
- Refers to the intentional release of toxic biological agents to harm terrorist civilians, in
the name of political or other cause.
10. Nuclear Terrorism
- Refers to the number of different ways nuclear materials might be exploited as terrorist
tactic.
11. Eco Terrorism
- Is a recently coined term describing violence in the interest environmentalism.