To see the other types of publications on this topic, follow the link: Undercover operations.

Journal articles on the topic 'Undercover operations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Undercover operations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dragojlović, Joko, and Nemanja Filipović. "Undercover Investigator in Legislation of the United States and the United Kingdom." Kultura polisa 19, no. 1 (2022): 62–78. http://dx.doi.org/10.51738/kpolisa2022.19.1r.4df.

Full text
Abstract:
In this day and age, one of the specific ways of responding to organized crime is covert operations which, as a measure of an undercover investigation, are a very important form of legal and criminalistic actions. The most efficient tactic of covert operations is deploying an undercover investigator. The success of undercover agent missions is reliant on meticulous planning of every stage of the investigation, in this way the actions of undercover agents can prevent the future criminal activity of suspects and members of criminal organizations. The research subject of this paper encompasses th
APA, Harvard, Vancouver, ISO, and other styles
2

Parry, Helen, and Susan Scott Hunt. "Undercover Operations and White Collar Crime." Journal of Financial Crime 2, no. 2 (1994): 150–59. http://dx.doi.org/10.1108/eb025644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shaikh, Mubin. "ETHICS AND EXCELLENCE IN UNDERCOVER OPERATIONS: A HUMAN SOURCE PERSPECTIVE." Journal of Intelligence, Conflict, and Warfare 5, no. 3 (2023): 237–40. http://dx.doi.org/10.21810/jicw.v5i3.5207.

Full text
Abstract:
On November 24, 2022, Mr. Mubin Shaikh, a Counter Extremism Specialist at Parents for Peace, presented on the Ethics and Excellence in Undercover Operations: A Human Source Perspective. The presentation was followed by a question-and-answer period with questions from the audience and CASIS-Vancouver executives. The key points of discussion were human source intelligence, motivators to work undercover, methods to conduct oneself as a human source, and aggravating issues that contribute to worst case scenarios. Received: 2022-12-11Revised: 2023-01-06
APA, Harvard, Vancouver, ISO, and other styles
4

Bell, R. E. "Undercover Sting Operations in Money‐Laundering Cases." Journal of Money Laundering Control 4, no. 4 (2001): 333–43. http://dx.doi.org/10.1108/eb027283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wagner, Georg A. "United States' Policy Analysis on Undercover Operations." International Journal of Police Science & Management 9, no. 4 (2007): 371–79. http://dx.doi.org/10.1350/ijps.2007.9.4.371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ivanov, Svyatoslav. "On operational search support of special operations." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 4 (2021): 140–47. http://dx.doi.org/10.35750/2071-8284-2021-4-140-147.

Full text
Abstract:
The problem of operational-search support of special operations with the help of a complex of operational-search measures and other auxiliary tactical methods of actions that contribute to the effective achievement of goals and the solution of special operations tasks is considered. Based on the definitions of the concepts «special operation», «operational-search operation» and the opinions of researchers, the author proposed a definition of an operational-search support of special operations, tasks and stages of its implementation are formulated. It is noted that the entire range of tasks can
APA, Harvard, Vancouver, ISO, and other styles
7

Kruisbergen, E. W., E. R. Kleemans, and D. de Jong. "Controlling Criminal Investigations: The Case of Undercover Operations." Policing 6, no. 4 (2012): 398–407. http://dx.doi.org/10.1093/police/pas018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schoeman, Ferdinand. "Undercover operations: Some moral questions about S.804." Criminal Justice Ethics 5, no. 2 (1986): 16–22. http://dx.doi.org/10.1080/0731129x.1986.9991800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Craig, David R. "The Right to Silence and Undercover Police Operations." International Journal of Police Science & Management 5, no. 2 (2003): 112–25. http://dx.doi.org/10.1350/ijps.5.2.112.14322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mintawati, Hesri, Mulus Wijaya Kusuma, Bonse Aris Mandala Putra Simamgunsong, Wiwin Winarni, Kohar Pradesa, and Eneng Rahmi. "Integrated Strategic Management for Drug Eradication: Insights from Undercover Buying Method at Mount Puyuh Police Substation." International Journal of Advanced Technology and Social Sciences 2, no. 3 (2024): 365–74. http://dx.doi.org/10.59890/ijatss.v2i3.1552.

Full text
Abstract:
The relentless circulation of drugs within communities presents a pressing global challenge, necessitating precise eradication strategies. This study investigates the strategic management of drug eradication through the employment of the undercover buying method at the Mount Puyuh Police Substation. Drawing upon qualitative research methods including interviews, observations, and document analysis, this research delves into the integrated strategic management practices employed in combating drug abuse. Findings underscore the critical role of strategic management encompassing human resources,
APA, Harvard, Vancouver, ISO, and other styles
11

Perrin, Nigel. "Undercover operators: fakery, passing and the special operations executive." Journal of Intelligence History 16, no. 1 (2016): 23–46. http://dx.doi.org/10.1080/16161262.2016.1258247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Boyd, James. "Undercover Acolytes: Honganji, the Japanese Army, and Intelligence-Gathering Operations." Journal of Religious History 37, no. 2 (2013): 185–205. http://dx.doi.org/10.1111/1467-9809.12027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Harris, LaShawn Denise. "“Women and Girls in Jeopardy by His False Testimony”: Charles Dancy, Urban Policing, and Black Women in New York City during the 1920s." Journal of Urban History 44, no. 3 (2016): 457–75. http://dx.doi.org/10.1177/0096144216672447.

Full text
Abstract:
Troubling partnerships between the New York City Police Department (NYPD) and criminal informants during the mid-1920s adversely impacted urban African American women’s daily lives. Part of multiple hierarchies of municipal corruption, undercover surveillance operations represented one of many apparatuses law enforcers employed to criminalize black women’s ordinary behavior, to reinforce Progressive era images of black female criminality and promiscuity, and to deny women of their personhood and civil rights. Black New Yorker and criminal informant Charles Dancy, identified by local black news
APA, Harvard, Vancouver, ISO, and other styles
14

Choo, Andrew L. T. "The Legal Aspects of Undercover Police Operations in England and Wales." International Journal of Police Science & Management 2, no. 2 (1999): 144–55. http://dx.doi.org/10.1177/146135579900200205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pilchen, Saul M. "The Federal Sentencing Guidelines and Undercover Sting Operations: A Defense Perspective." Federal Sentencing Reporter 4, no. 2 (1991): 115–19. http://dx.doi.org/10.2307/20639417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hunt, Chris, and Micah Rankin. "R v Hart: A New Common Law Confession Rule for Undercover Operations." Oxford University Commonwealth Law Journal 14, no. 2 (2014): 321–36. http://dx.doi.org/10.1080/14729342.2015.1047651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Perviy, V. Y., and K. O. Gunko. "Some features of the participation of operational units of the National Police of Ukraine in the organization and conduct of covert (investigative) search operations during martial law." Analytical and Comparative Jurisprudence, no. 6 (December 27, 2023): 642–45. http://dx.doi.org/10.24144/2788-6018.2023.06.113.

Full text
Abstract:
One of the most effective methods of obtaining evidence during the investigation of a criminal offense is the use of covert investigative (search) actions. Operational units play a significant role in the detection of such crimes, actively participating in criminal proceedings to obtain evidence by conducting appropriate undercover investigative (search) actions. However, the results of the analysis of judicial practice show that in modern conditions, a number of problematic aspects arise during the conduct of undercover investigative (search) actions. These issues have a negative impact on th
APA, Harvard, Vancouver, ISO, and other styles
18

Giladi, R. "Out of Context: 'Undercover' Operations and IHL Advocacy in the Occupied Palestinian Territories." Journal of Conflict and Security Law 14, no. 3 (2009): 393–439. http://dx.doi.org/10.1093/jcsl/krp035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Zaniboni, Eugenio. "International Cooperation to Counter Migrant Smuggling and Human Trafficking through Special Investigative Techniques." Brill Research Perspectives in Transnational Crime 3, no. 4 (2021): 109–17. http://dx.doi.org/10.1163/24680931-12340027.

Full text
Abstract:
Abstract The adoption of international coordination measures to spread the use of ‘special investigative techniques’ to combat organised crime effectively is encouraged by Article 20 of the UNTOC. This article discusses, firstly, the main features of ‘undercover operations’ involving, or taking place in, more than one State. It then examines the Italian implementation legal framework, as amended by a new law passed in 2019, seeking to establish whether and to what extent Italy is complying with its international commitments in this field.
APA, Harvard, Vancouver, ISO, and other styles
20

Kowalczyk, Devin, and Matthew J. Sharps. "Consequences of Undercover Operations in Law Enforcement: a Review of Challenges and Best Practices." Journal of Police and Criminal Psychology 32, no. 3 (2016): 197–202. http://dx.doi.org/10.1007/s11896-016-9211-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Кольцов, Дмитрий Валентинович, and Александр Владимирович Шахматов. "On Possible Ways of Meeting Requirements of European Court of Human Rights Concerning Sanctioning Special Investigation Activities such as Test Purchasing and Sting Operation (by the example of Police Operation Departments)." ЖУРНАЛ ПРАВОВЫХ И ЭКОНОМИЧЕСКИХ ИССЛЕДОВАНИЙ, no. 3 (October 15, 2019): 56–63. http://dx.doi.org/10.26163/gief.14.88.003.

Full text
Abstract:
В статье рассматривается проблема имплементации требовании Европейского суда по правам человека в части повышения уровня санкционирования оперативнорозыскных мероприятий «проверочная закупка» и «оперативный эксперимент». Актуальность проблемы обусловлена значительным количеством жалоб на возможные подстрекательские действия сотрудников оперативных подразделений российских правоохранительных органов при проведении данных негласных операций, поступающих в указанный международный судебный орган. По итогам анализа результатов сравнительноправовых исследований Европейского суда, касающихся вопросов
APA, Harvard, Vancouver, ISO, and other styles
22

Bleakley, Paul. "Watching the watchers: Taskforce Argos and the evidentiary issues involved with infiltrating Dark Web child exploitation networks." Police Journal: Theory, Practice and Principles 92, no. 3 (2018): 221–36. http://dx.doi.org/10.1177/0032258x18801409.

Full text
Abstract:
As the kind of technology used by offenders advances, it has become increasingly necessary for global law enforcement agencies to adopt proactive strategies in order to effectively combat the threat posed by the organisation of child exploitation networks on the Dark Web. In spite of concerns regarding the collection of evidence, Queensland Police’s Taskforce Argos has cultivated a reputation for success in the covert infiltration of online forums dedicated to child exploitation material, due largely to the relatively loose restrictions placed on it, which allow officers to commit a wide range
APA, Harvard, Vancouver, ISO, and other styles
23

Taket, Ann. "Undercover Agency?-Ethics, Responsibility and the Practice of OR." Journal of the Operational Research Society 45, no. 2 (1994): 123. http://dx.doi.org/10.2307/2584119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Taket, Ann. "Undercover Agency?—Ethics, Responsibility and the Practice of OR." Journal of the Operational Research Society 45, no. 2 (1994): 123–32. http://dx.doi.org/10.1038/sj/jors/0450201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Taket, Ann. "Undercover Agency?–Ethics, Responsibility and the Practice of OR." Journal of the Operational Research Society 45, no. 2 (1994): 123–32. http://dx.doi.org/10.1057/jors.1994.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Martel, Marcel. "“They smell bad, have diseases, and are lazy”: rcmp Officers Reporting on Hippies in the Late Sixties." Canadian Historical Review 102, s2 (2021): s451—s475. http://dx.doi.org/10.3138/chr-102-s2-007.

Full text
Abstract:
At the end of the sixties, the Royal Canadian Mounted Police (rcmp) ordered officers engaged in undercover operations to send reports on drug users and especially hippies. This paper argues that collecting information on hippies was a useful weapon in the battle against softening penalties for marijuana offences since the federal police force was among the strongest opponents of legalizing or decriminalizing marijuana for recreational purposes. By depicting hippies in very negative terms, the rcmp was able to describe them as a threat and argue against their cultural, social, and political dem
APA, Harvard, Vancouver, ISO, and other styles
27

Constantinou, Angelo G. "Harming the very people whom the law is seeking to protect? The nexus between international, European Union and domestic law on human trafficking and undercover police operations." New Journal of European Criminal Law 8, no. 4 (2017): 476–95. http://dx.doi.org/10.1177/2032284417743145.

Full text
Abstract:
The conundrum of trade in women for sex has engendered many feminist struggles that sought to influence the political and legal actions on the matter, in an attempt to eliminate female sexual exploitation. However, albeit a number of transnational legal means (especially European Union law) have been put into effect for such purpose and, also, for universalizing the national anti-trafficking approaches, the very recipients of exploitation (victims of human trafficking) are still marginalized. A case in point is the role of the Cypriot law in the execution of undercover police operations, where
APA, Harvard, Vancouver, ISO, and other styles
28

Grinciuns, Mārcis. "Operational Experiment and Related Legal Issues in Latvia: An Overview." European Journal of Sustainable Development 12, no. 3 (2023): 335. http://dx.doi.org/10.14207/ejsd.2023.v12n3p335.

Full text
Abstract:
Operational Activities Law of the Republic of Latvia states operational activities that are performed in order to prevent or detect criminal offences and to safeguard the independence of the State, its constitutional order and territorial integrity.
 This research focuses on “Operational experiment” which is an operational activity defined in Section 15, paragraph three of the Operational Activities Law. It allows Latvian law enforcement authorities to create specific circumstances (situations) in order to determine criminal purposes of persons. Usually, this activity is used to investiga
APA, Harvard, Vancouver, ISO, and other styles
29

Grinciuns, Mārcis. "Slepenu izmeklēšanas metožu lietošanas principu attiecināmība uz likumā “Par policiju” paredzētā kontrolpirkuma izpildi." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 2, no. 17 (2020): 89–107. http://dx.doi.org/10.25143/socr.17.2020.2.089-107.

Full text
Abstract:
Rakstā tiek pētīta Eiropas Cilvēktiesību tiesas (ECT) pausto slepeno izmeklēšanas metožu (undercover operations) izpildes principu attiecināmība uz likumā “Par policiju” noteiktā kontrolpirkuma (turpmāk rakstā – policijas kontrolpirkums) izpildi. Policijas kontrolpirkums galvenokārt tiek veikts, lai atklātu administratīvos pārkāpumus, kuru izskatīšana nav piekritīga ECT, jo Cilvēka tiesību un pamatbrīvību aizsardzības konvencijas (turpmāk rakstā – Konvencija) 6. pantā noteiktās tiesības uz taisnīgu tiesu paredzētas apsūdzētajiem krimināllietās [1, angļu valodas versija]. Taču atsevišķos gadīju
APA, Harvard, Vancouver, ISO, and other styles
30

Fanhar, Frisca Tyara M. "Operasi Tangkap Tangan (OTT) Tinjauan Berdasarkan KUHAP Dan Undang Undang Nomor 30 Tahun 2002 Tentang Komisi Pemberantasan Korupsi (KPK)." Corruptio 1, no. 2 (2020): 75. http://dx.doi.org/10.25041/corruptio.v1i2.2096.

Full text
Abstract:
The ambiguity regarding the mechanism and limits of the authority of the arresting operations carried out by the corruption eradication commission raises public assumption that the authority exercised by the corruption eradication commission has violated the law and even violated human rights, namely taking arbitrary actions (unprocedure).The problem in writing this study is How can the legal force of the operation of the corruption eradication commission arrest if viewed from the aspect of the Criminal Procedure Code and Law Number 30 of 2002 Concerning the Corruption Eradication Commission?
APA, Harvard, Vancouver, ISO, and other styles
31

Luther, Kirk, and Brent Snook. "Putting the Mr. Big technique back on trial: a re-examination of probative value and abuse of process through a scientific lens." Journal of Forensic Practice 18, no. 2 (2016): 131–42. http://dx.doi.org/10.1108/jfp-01-2015-0004.

Full text
Abstract:
Purpose – A recent Supreme Court of Canada (SCC) ruling resulted in stricter rules being placed on how police organizations can obtain confessions through a controversial undercover operation, known as the Mr. Big technique. The SCC placed the onus on prosecutors to demonstrate that the probative value of any Mr. Big derived confession outweighs its prejudicial effect, and that the police must refrain from an abuse of process (i.e. avoid overcoming the will of the accused to obtain a confession). The purpose of this paper is to determine whether a consideration of the social influence tactics
APA, Harvard, Vancouver, ISO, and other styles
32

Reddy, Eveshnie. "Policing the Onion Router (Tor) crypto-markets on the dark web: An analysis of South African investigatory powers." South African Journal of Criminal Justice 36, no. 3 (2023): 406–33. http://dx.doi.org/10.47348/sacj/v36/i3a3.

Full text
Abstract:
Emerging financial technology (fintech), such as cryptocurrencies and privacy-enhancing technology (pets) such as the Onion Router (Tor), enable varying levels of anonymity or pseudonymity based on underlying encryption algorithms. These technologies are increasingly exploited by cybercriminals for nefarious purposes on the dark web. This has resulted in the so-called tor crypto-markets that facilitate ‘digital organised crime.’ Thus, albeit not inherently criminogenic, encryption constitutes a barrier to criminal investigation. This article discusses two specific methods that police use to in
APA, Harvard, Vancouver, ISO, and other styles
33

Коротаєв, О. "IMPLEMENTATION OF THE SOVIET AUTHORITIES OF THE ANTI-RELIGIOUS POLICY STATE SECURITY ON THE EXAMPLE Carrying out operations "3224 / m", "Prophets" AND FANATICS (1943-1957)." Problems of Political History of Ukraine, no. 15 (February 5, 2020): 189–201. http://dx.doi.org/10.33287/11939.

Full text
Abstract:
The article reveals the work of the Soviet authorities (NKGB-KGB) on the unification of the All-Ukrainian Union of Christians of the Pentecostal Evangelical Faith (UCPEF/KhEV) with the All-Union Council of Evangelical Baptist Christians (ACEBC/VSEKhB).The article also is devoted to the study of the role of the bodies of Soviet state security in carrying out of religious policy in Protestant environment in the territory of Soviet Ukraine on the example of their creation of a «legendary» religious center – All-Union Council of Evangelical Baptist Christians, as well as the apparatus of its repub
APA, Harvard, Vancouver, ISO, and other styles
34

Hughes, Geraint. "The use of undercover military units in counter-terrorist operations: a historical analysis with reference to contemporary anti-terrorism." Small Wars & Insurgencies 21, no. 4 (2010): 561–90. http://dx.doi.org/10.1080/09592318.2010.518857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Buggie, Chelsey. "Talking to Strangers: A Critical Analysis of the Supreme Court of Canada’s Decision in R v Mills." Manitoba Law Journal 44, no. 6 (2022): 108–37. http://dx.doi.org/10.29173/mlj1299.

Full text
Abstract:
In R v Mills, an undercover officer acting without a warrant posed as a 14-year-old girl online and communicated with Mr. Mills through Facebook messages. The officer eventually arranged a meeting with, and arrested Mr. Mills who sought to have the message evidence excluded. The Supreme Court unanimously ruled to allow the evidence. However, only Justice Martin agreed that Mr. Mills’ s. 8 rights were engaged and infringed. This paper takes the position that the Mills decision is inconsistent with prior s. 8 jurisprudence regarding content neutrality and expectation of privacy in conversations.
APA, Harvard, Vancouver, ISO, and other styles
36

Nurse, Angus. "Masculinities and Animal Harm." Men and Masculinities 23, no. 5 (2020): 908–26. http://dx.doi.org/10.1177/1097184x20965458.

Full text
Abstract:
This paper explores the role of masculinities in animal harm and conceptions on the Masculinities Offender, primarily motivated by power and masculine behaviors. Within “masculinities crimes,” the exercise of power allied to sport or entertainment is significantly linked to organized crime and gambling. Masculinities crimes also include elements of cruelty or animal abuse and perceptions by offenders of their actions having cultural significance, and where toughness, masculinity, and smartness combine with a love of excitement. Examples include badger digging, badger baiting, cock-fighting, an
APA, Harvard, Vancouver, ISO, and other styles
37

Dodge, Mary, Donna Starr-Gimeno, and Thomas Williams. "Puttin’ on the Sting: Women Police Officers' Perspectives on Reverse Prostitution Assignments." International Journal of Police Science & Management 7, no. 2 (2005): 71–85. http://dx.doi.org/10.1350/ijps.7.2.71.65778.

Full text
Abstract:
Reverse police prostitution stings, which target men by using female police officers as decoy prostitutes, are becoming a common method in some United States cities for controlling the problem of solicitation for prostitution. The role of policewomen as decoys has received scant attention by scholars, though critics and traditional feminists view the practice as further evidence of the subjection and degradation of women in law enforcement. This article presents participant field observations of how reverse prostitution operations are conducted in Aurora, Colorado Springs, and Denver, Colorado
APA, Harvard, Vancouver, ISO, and other styles
38

Alpern, Steve, Paul Chleboun, Stamatios Katsikas, and Kyle Y. Lin. "Adversarial Patrolling in a Uniform." Operations Research 70, no. 1 (2022): 129–40. http://dx.doi.org/10.1287/opre.2021.2152.

Full text
Abstract:
Many of us will have seen uniformed guards patrolling in museums, airports, and other places where thefts or attacks are possible. In other similar places, we may have been unaware of undercover agents carrying out similar patrols. The latter type of patrollers has been modeled in recent literature. However, when the patroller is visible (wears a uniform), the potential thief or terrorist may be able to spot him when he is nearby and to time his theft appropriately. For example, the thief may wait a specified time after the uniformed patroller leaves his area. In “The Uniformed Patroller Game,
APA, Harvard, Vancouver, ISO, and other styles
39

Kamali, Sara. "Informants, Provocateurs, and Entrapment: Examining the Histories of the FBI’s PATCON and the NYPD’s Muslim Surveillance Program." Surveillance & Society 15, no. 1 (2017): 68–78. http://dx.doi.org/10.24908/ss.v15i1.5254.

Full text
Abstract:
Since September 11, 2001, the U.S. government and police departments across the United States, most notably the New York City Police Department, have been collecting intelligence targeting Muslim American communities. The controversial surveillance practices include the use of confidential informants, undercover operations, and entrapment, and infringing upon civil rights and civil liberties in the name of national security. A decade before 9/11, however, the Federal Bureau of Investigation (FBI) conducted the same practices against a completely different demographic – Christian Right militant
APA, Harvard, Vancouver, ISO, and other styles
40

Egesa Natwoli, Robert. "Challenges Facing the Directorate of Criminal Investigation On Management of Criminal Gang Activities in Nairobi County, Kenya." Advances in Social Sciences Research Journal 8, no. 1 (2021): 134–55. http://dx.doi.org/10.14738/assrj.81.9501.

Full text
Abstract:
Abstract
 This paper uses data collected for an MA Thesis on the challenges facing the Directorate of Criminal Investigation Department on management of criminal gang activities, in Nairobi County, Kenya. This study has been necessitated by continued concern among policymakers, security pundits and citizens about the rising criminal gang activities in the country, more pertinently in Nairobi County. Although there are few studies that tried to scratch this area, there has never been a detailed and systematic inquiry and analysis of this problem. The study was guided by several specific ob
APA, Harvard, Vancouver, ISO, and other styles
41

Martiradonna, Luigi. "Undercover operation." Nature Materials 14, no. 1 (2014): 13. http://dx.doi.org/10.1038/nmat4188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Norris, Jesse J. "Entrapment and Terrorism on the Left." New Criminal Law Review 19, no. 2 (2016): 236–78. http://dx.doi.org/10.1525/nclr.2016.19.2.236.

Full text
Abstract:
Previous literature has analyzed entrapment in post-9/11 jihadi terrorism cases, but has neglected similarly compelling entrapment claims among left-wing terrorism defendants. The Article bridges this gap through an in-depth analysis of the four post-9/11 left-wing terrorism cases involving an informant or undercover agent. Based on a review of these cases, the Article concludes that at least three of the four cases had strong entrapment claims, and that realistically, none of the defendants in the four cases would have committed any terrorist offense without government prompting. A comparativ
APA, Harvard, Vancouver, ISO, and other styles
43

Romano, Silvina M. "Liberal Democracy and National Security: Continuities in the Bush and Obama Administrations." Critical Sociology 38, no. 2 (2011): 159–78. http://dx.doi.org/10.1177/0896920511419903.

Full text
Abstract:
The antiterrorist policy of the George W. Bush Administration established a relationship between democracy and security that implied the limitation of the former as a necessary condition for the achievement of the latter. This strategy led to the diminishing of the basic liberties promoted by liberal democracy through legal means with the putative objective of guaranteeing the ‘security’ of American citizens. A key starting point of these policies can be found in undercover operations carried out abroad by the Central Intelligence Agency (CIA) and the Department of State at the beginning of th
APA, Harvard, Vancouver, ISO, and other styles
44

Gunarto, Gunarto, Apriady Apriady, and Sri Endah Wahyuningsih. "Reconstruction of Controlled Delivery Regulations in Humanitarian Value-Based Narcotic Act Investigations." Scholars International Journal of Law, Crime and Justice 5, no. 6 (2022): 217–22. http://dx.doi.org/10.36348/sijlcj.2022.v05i06.006.

Full text
Abstract:
The problem raised in this study is what are the weaknesses in the implementation of controlled delivery in the investigation of narcotics crimes in realizing the protection of human rights and How to reconstruct it in order to realize the protection of human rights. To find answers to these problems, the study uses a sociological juridical research type where The method of qualitative analysis is used on the data obtained, and presented in the form of written words supported by quantitative and qualitative data to then draw an inductive conclusion. The Result Shows that the weakness referred
APA, Harvard, Vancouver, ISO, and other styles
45

Zaichenko, Olga. "“Russian Spy” Schweitzer: An Attempt at Biography Reconstruction. Agent of the High Military Secret Police in Warsaw (1819–1831)." Novaia i noveishaia istoriia, no. 1 (2023): 33. http://dx.doi.org/10.31857/s013038640020835-6.

Full text
Abstract:
In the early 1830s, in order to wage a political and information war on Polish emigrants and the European opposition, the formation of Russian foreign intelligence as a unified state service with an extensive network of agents on the basis of the Third Section began. The head of the Russian residence in Germany from 1833 to 1839, Baron Karl Ferdinandovich von Schweitzer, was one of its founders. The structure he created, as well as the forms and methods of intelligence work he put in place, had a major impact on the subsequent development of the security services in Russia. However, little is
APA, Harvard, Vancouver, ISO, and other styles
46

Ibadin, Peter Okoeguale, and Kemebradikemor Embele. "The Effect of Forensic Audit Services on Tax Fraud in South-South, Nigeria." Accounting and Finance Research 12, no. 3 (2023): 30. http://dx.doi.org/10.5430/afr.v12n3p30.

Full text
Abstract:
The need to address tax fraud has increasingly been attracted to the state authorities’ administrators, decision-makers, scholars, and investigators in Nigeria. Although various efforts have been made to alleviate it for effective revenue generation, mobilization through taxation is still low. Consequently, this study examined Forensic Audit Services and Tax Fraud in South-South Nigeria. To this end, a cross-sectional research design with a survey research strategy was used. Copies of questionnaire, reflecting the research questions, were distributed to a sample size of 228 staff in the Nigeri
APA, Harvard, Vancouver, ISO, and other styles
47

Miller, Laurence. "Undercover policing: A psychological and operational guide." Journal of Police and Criminal Psychology 21, no. 2 (2006): 1–24. http://dx.doi.org/10.1007/bf02855681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Girodo, Michel, Trevor Deck, and Melanie Morrison. "DISSOCIATIVE-TYPE IDENTITY DISTURBANCES IN UNDERCOVER AGENTS: SOCIO-COGNITIVE FACTORS BEHIND FALSE-IDENTITY APPEARANCES AND REENACTMENTS." Social Behavior and Personality: an international journal 30, no. 7 (2002): 631–43. http://dx.doi.org/10.2224/sbp.2002.30.7.631.

Full text
Abstract:
The uncontrolled dissociative-type reappearance of a fabricated false identity in undercover agents was investigated in 48 federal police officers undergoing 3 weeks of undercover field exercises in two separate classes. Half of the officers received passive and covert identity dissimulation training as coverpersons and half received training in active identity dissimulation methods as operators. One class received hypnotic induction procedures to visualize an alter self and the second class was exposed to false-identity constructions under imagination conditions. Participants reported on the
APA, Harvard, Vancouver, ISO, and other styles
49

Dulskyi, O. "Features of forensic supporting for evidence collection during conductive undercover investigative (detective) actions." Analytical and Comparative Jurisprudence, no. 2 (May 11, 2024): 668–74. http://dx.doi.org/10.24144/2788-6018.2024.02.111.

Full text
Abstract:
The scientific article is devoted to the specifics of forensic evidence collection during undercover investigative (detective) actions. It reveals the following general concepts: forensic support, covert investigative (detective) actions, forensic methodology, content of forensic support for covert investigative (detective) actions. The purpose of the scientific article is to determine the specifics of forensic evidence collection during covert investigative (detective) activities. The article highlights the elements of forensic support for evidence collection during covert investigative (dete
APA, Harvard, Vancouver, ISO, and other styles
50

Hidenko, Ye S., and D. V. Vodop’ian. "CURRENT REQUIREMENTS AND MODERN REALITIES OF CONDUCTING UNDERCOVER INVESTIGATION FORM (INVESTIGATIVE) ACTION BEFORE JUDGE RESOLUTION." Actual problems of native jurisprudence, no. 06 (March 2, 2020): 131–34. http://dx.doi.org/10.15421/3919110.

Full text
Abstract:
The article explores the issues of conducting undercover investigation form (investigative) action prior to the decision of the investigating judge in the framework of the operative support of criminal proceedings. In fact, after the events of the 2014 Revolution of Dignity, law enforcement agencies underwent a dramatic change, which in turn led to the decline of the law enforcement system, them authority and professionalism. In law enforcement agencies lost the institution of “mentoring”, because this institution was destroyed after reform. These events have led to the consolidation of their
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!