Archive

Archive for the ‘crime’ Category

Canada’s Anti–Money Laundering and Anti–Terrorist Financing Regime: The Legal Profession’s Obligations

May 25, 2015 Comments off

Canada’s Anti–Money Laundering and Anti–Terrorist Financing Regime: The Legal Profession’s Obligations
Source: Library of Parliament

On 13 February 2015, the Supreme Court of Canada ruled that certain provisions of the Proceeds of Crime (Money Laundering) and Terrorist Financing Act that impose obligations on lawyers violate the Canadian Charter of Rights and Freedoms.

The decision, in Canada (Attorney General) v. Federation of Law Societies of Canada, confirmed that legislation cannot enforce obligations on lawyers that would undermine solicitor–client privilege.

In exempting lawyers from the Act, Canada – like the United States and Australia – is among the few Financial Action Task Force members that do not impose obligations on lawyers as part of their anti–money laundering and anti–terrorist financing regime.

According to the Task Force, criminals may use lawyers to facilitate illegal financial transactions, particularly when they are acting as financial intermediaries.

Criminal attacks are now leading cause of healthcare breaches

May 20, 2015 Comments off

Criminal attacks are now leading cause of healthcare breaches
Source: Ponemon Institute

The Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data by the Ponemon Institute, sponsored by ID Experts, reveals a shift in the root cause of data breaches from accidental to intentional. Criminal attacks are up 125% compared to five years ago replacing lost laptops as the leading threat. The study also found most organizations are unprepared to address new threats and lack adequate resources to protect patient data

free registration required2

2015 Global Cyber Impact Report

May 15, 2015 Comments off

2015 Global Cyber Impact Report
Source: Aon and Ponemon Institute

Ponemon Institute global study, sponsored by Aon, identifies the relative financial statement impact of cyber incidents compared to tangible asset vulnerabilities.

Key findings:

  • Information technology assets are 39 percent more exposed than property assets on a relative value to insurance protection basis
  • Proliferation of mobile devices and Internet of Things to send cyberrisk skyrocketing over next five years
  • The report’s findings act as a roadmap for risk managers and finance, helping them take a broader look at their organization’s overall risk profile

free registration required2

Sticker Shock: Calculating the Full Price Tag for Youth Incarceration

May 13, 2015 Comments off

Sticker Shock: Calculating the Full Price Tag for Youth Incarceration
Source: Justice Policy Institute

Thirty-three U.S. states and jurisdictions spend $100,000 or more annually to incarcerate a young person, and continue to generate outcomes that result in even greater costs. Our new report, Sticker Shock: Calculating the Full Price Tag for Youth Incarceration, provides estimates of the overall costs resulting from the negative outcomes associated with incarceration. The report finds that these long-term consequences of incarcerating young people could cost taxpayers $8 billion to $21 billion each year.

Psychosocial Maturity and Desistance From Crime in a Sample of Serious Juvenile Offenders

May 12, 2015 Comments off

Psychosocial Maturity and Desistance From Crime in a Sample of Serious Juvenile Offenders (PDF)
Source: Office of Juvenile Justice and Delinquency Prevention (DoJ)

Highlights

The Pathways to Desistance study followed more than 1,300 serious juvenile offenders for 7 years after their conviction. In this bulletin, the authors present key findings on the link between psychosocial maturity and desistance from crime in the males in the Pathways sample as they transition from midadolescence to early adulthood (ages 14–25):

• Recent research indicates that youth experience protracted maturation, into their midtwenties, of brain systems responsible for self-regulation. This has stimulated interest in measuring young offenders’ psychosocial maturity into early adulthood.
• Youth whose antisocial behavior persisted into early adulthood were found to have lower levels of psychosocial maturity in adolescence and deficits in their development of maturity (i.e., arrested development) compared with other antisocial youth.
• The vast majority of juvenile offenders, even those who commit serious crimes, grow out of antisocial activity as they transition to adulthood. Most juvenile offending is, in fact, limited to adolescence.
• This study suggests that the process of maturing out of crime is linked to the process of maturing more generally, including the development of impulse control and future orientation.

Power relationships in the united states federal government and its effect on cybersecurity policy

May 12, 2015 Comments off

Power relationships in the United States federal government and its effect on cybersecurity policy (PDF)
Source: Journal of Information System Security (via ResearchGate)

The United States federal government faces a major challenge as it attempts to secure the nation’s resources and critical infrastructure: the politics and power relationships that form the essence of its very body. Implementing security in any organization will affect the power relationships within that organization (Lapke & Dhillon, 2008) and the federal government is one of the largest and most complex. Considering the long standing de jure and de fa cto power relationships inherent in the federal government, the implementation of broad reaching cyber security policy has been a long fought battle. Subramanian (2010) detailed the government’s approach to cyber security in the 10 year period between 2000 and 2010. This paper is an extension of Subramanian’s work and focuses the analysis through the lens of Clegg’s (2002) Circuits of Power. It explores the power relationships that impacted the decisions made by the executive, legislative, and judic ial branches of government. It also describes how these power relationships changed as a result of the emerging reality of cyber security.

FY14 Annual Report on Sexual Assault in the Military

May 8, 2015 Comments off

FY14 Annual Report on Sexual Assault in the Military (PDF)
Source: U.S. Department of Defense

From fiscal year 2012 to fiscal year 2013, there was an unprecedented 53% increase in victim reports of sexual assault. In fiscal year 2014, the high level of reporting seen in fiscal year 2013 was sustained with 6,131 reports of sexual assault (see Figure 1, below). This figure represents an increase of 11% over fiscal year 2013 numbers. In fiscal year 2014, victims made 4,660 Unrestricted Reports and 1,840 initial Restricted Reports of sexual assault. At the close of fiscal year 2014, 1,471 reports remained Restricted. Over time, the percentage of victims who convert their Restricted Reports to Unrestricted Reports has remained relatively stable with an average of 15%. However, in fiscal year 2014, the conversion rate increased to 20%.

Overall, surveys of sexual assault victims suggest that those who reported their sexual assault were satisfied with their decision. According to the 2014 RAND Military Workplace Study, approximately 72% of Service member victims who indicated that they reported their sexual assault said they would make the same decision if they had to do it over again. Furthermore, according to the Survivor Experience Survey, 73% of Service member victims who participated in the survey indicated that, based on their overall experience of reporting, they would recommend that others report.

Follow

Get every new post delivered to your Inbox.

Join 1,053 other followers