Public Security versus Social Media:

Slides:



Advertisements
Similar presentations
Right by Children Walking the talk of childrens rights Nóirín Hayes School of Social Sciences and Law, Dublin Institute of Technology, Centre for Social.
Advertisements

Prof. Alisdair A. Gillespie De Montfort University, UK.
Prof. Alisdair A. Gillespie De Montfort University, UK.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
National Security, Barrier ?. Recently.. Human rights violations and women Among the dilemmas the British public is facing, poverty that’s internationally.
Inter-ministerial Delegation for Human Rights Combatting trafficking in persons in Morocco: Fostering cooperation between NREMs and state and non State.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
Workshop 24 Input by ILGA-Europe (policy and coalition opportunities) Joël Le Déroff – Senior Policy & Programmes Officer – 19 October.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Prosecuting Human Trafficking Mikko Sipilä District Prosecutor Special Prosecutor on Narcotics Offences and Organized Crime The Prosecutor’s.
SGTM 5 D: Prevention of Sexual Exploitation and Abuse Slide 1 SGTM 5 D: Prevention of Sexual Exploitation and Abuse.
Optional Protocol to the Convention on the Rights of the Child on the sale of Children, Child Prostitution and Child Pornography.
The U Visa for Immigrant Crime Victims Immigrant Law Center of Minnesota 450 N. Syndicate Street, Suite 175 St. Paul, MN (651) phone (651)
Copyright © 2006 Pearson Education Canada Inc Chapter 1 Canadian Criminology Its nature and structure “Obviously crime pays, or there'd be no crime.”
Paris Project Meeting January 2012 Item – Statistics Objective 5 B. Proia With financial support from Criminal Justice Programme 2008 European Commission.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
1 Multi-disciplinary Seminar on How to Improve the Child Protection System in Hong Kong 13 July 2004 Duke of Windsor Social Services Building, Wanchai,
VICTIM SUPPORT: The International Context Bali Process Workshop on Victim Support 7 – 9 November 2006 Michel Bonnieu, Senior Regional Legal Advisor UNODC.
Registered in England and Wales Community Pathways CIC Gaining Access Gaining Trust.
OPSC Optional protocol on sale of children children prostitution and pornography.
Children's Rights Protection System in Russia 19 federal and many regional agencies are responsible for the safety and protection of children’s rights.
Use of information technology in the educational system in Bulgaria State policy of implementing security and safety measures of pupils in network.
E-safety is all about keeping children safe online.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
EU measures combating hate speech ERIO Conference on combating hate speech against Roma and the role of Equality bodies Brussels 16/10/2015 DG JUSTICE.
Copyright 2010, The World Bank Group. All Rights Reserved. Other Justice & Governance Agencies Part 1 Crime, Justice & Security Statistics Produced in.
Crown Prosecution Service Violence against Women and Girls Jude Watson Violence against Women and Girls Strategy Manager.
CRIMINAL LAW OF THE EUROPEAN UNION 1 April 2015 THE LISBON TREATY AND CRIMINAL LAW Dr. sc. Zoran Burić Department of Criminal Procedural Law University.
San José, Costa Rica, 9-10 June 2014 Marie-laure Lemineur Head, Sexual Exploitation of Children Online Programme The sexual exploitation of children through.
Rhiannon Evans Director of Services, Supporting Justice CIC ECLA (UK) Seminar 26 April 2016 The European Protection Order.
Caritas of Archdiocese of Prague Migration Centre Joint Staff Training Event Meeting in Prague 23 th – 27 th 2015.
Dr S. Muralidhar Judge, Delhi High Court 13th March, 2016
Peer on Peer (Child on child) Abuse
Child Sexual Exploitation and Abuse
Aware Education Consulting
Children with disabilities in the digital environment Gerison Lansdown
Gender, Diversity and Climate Change
The second international meeting in Prague
Prevention of Sexual Exploitation and Sexual Abuse in UN Missions
Cje Class I and II SCOPE OF APPLICATION OF CRIMINAL LAW Criminal Law I
SLAVERY IN OUR OWN BACKYARD!
Mayuko Watanabe, Ph.D. Media scholar and Journalist
Dr. Željko Karas Police College, Zagreb (Croatia)
Introduction to asset recovery in Poland and Wielkopolska region, along with the presentation of the invited guests and discussion of thematic areas presented.
Women,peace and security
Prevention of Sexual Exploitation and Abuse
Internet Watch Foundation (IWF)
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
● SmartLaw Sexting and the Law.
Chapter One Police and Society
Chapter One Crime and Criminology
Criminal Violence: Patterns, Causes, and Prevention Riedel and Welsh, Ch. 1 “Violence and Criminal Violence”
Criminal Violence Riedel and Welsh, Ch
Addressing Sexual Violence Against Refugee Women
Funding opportunities in illicit drugs research in H2020
Chapter four – International Criminal Law:General Introduction
Hate crime statistics: gaps, progress and challenges ahead
Inter-ministerial Delegation for Human Rights
Securing free and fair European elections
Harmful Sexual Behaviour - 7 Minute Briefing
National Child Sexual Exploitation and Trafficking Workshop – Intelligence Led Investigations I will come back to the scenario towards the end of this.
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Sexting and the Law.
Assessing organised crime: threat, anticipation and future
Staff and Trainer Responsibilities explained:
Authors: Zerina Bosovic
UNODC and CYBERCRIME October 2009.
DEFINING THE CONCEPT OF TRAFFICKING IN PERSONS
Presentation transcript:

Public Security versus Social Media: Dipartimento di Giurisprudenza 18TH WORLD CONGRESS  OF CRIMINOLOGY Delhi NCR, India | 15th-19th December 2016 Session 61 Social Media, Venue Hall 4 Time 3:30 p.m. 5.30 p.m. Public Security versus Social Media: Study on Criminal Law Aspects of Social Media

Better understanding the role of new social media networks and their use for public security purposes This topic shall look at the role and purpose of social media and the relationship between the new social networks and public security. Research to be coordinated by this activity may focus on analysing the following issues: T o what extent are social media likely to influence public security planning? Shall the adoption of social media across the public security community be treated as a threat or a tool for public security purposes? Shall the potential of social networking tools be explored by public security agencies for example in order to predict future trends or identify possible threats?

Purpose of presentation · To which extent, in the age of the connected society, are social media used in the eve of urban violence and riots? How can the understanding of the different social media influence on the populations lead to the shaping of new forms of policing in the public space? · What are the ethical and legal implications, for instance with reference to the respect for fundamental rights, of public agencies using social media information for security planning purposes?

Public security vs Social media By focusing on criminal law enforcement, thanks to the pillars of EU enlargement strategy, at the core of the project is the elaboration of concept: who protects who in a virtual world? Criminal law It aims to understand the development and consequences of the most important alternative to real crimes in the Society of Risk in time of collapse of the public security and the transformation of social control forms. Cyber- law

CRIMNAL LAW as (possible) answer Information Technology and "social" telecommunication technologies have caused relevant changes in criminal law and criminal procedure, showing –first of all- how a crime could have its effects at many more locations than the place where the perpetrator acted. Google earth and social companies increase the locus commissi delicti, in a virtual world where a lot of people are online in different-technological-ways. Orwellian memories here we are! The Big Brother is watching all of us because of the traces we leave. In a space of freedom to express and communicate, Internet is a new big planet of possible, real offences.

criminal legal analysis fir the paper will go beyond a traditional legal dogmatic analysis, as it aims to lay the foundations for a new conceptualisation of offences, jurisdiction and locus delicti, conflicting jurisdiction, transnational dimension of cyber crime, criminal liability of legal entities; the searching of evidence in cyber space; the age “below which it is prohibited to engage in sexual activities with a child”;

specific focus on children’s protections especially for what concerns the potential threats such as 1) child exploitation; (2) production, distribution, and possession of child pornography; (3) exposure to harmful content; (4) grooming, harassment, and sexual abuse; and (5) cyber bullying. The latest technologies make it easier for criminals to contact children in ways that were not previously possible.

specific focus on children’s protections Children are particularly vulnerable to the exploitation of online predators because they rely heavily on networking websites for social interaction. Offenders use false identities (who is the perpetrator?) in chat rooms to lure victims into physical meetings, thus connecting the worlds of cyber and physical crime. When this happens, virtual crime often leads to traditional forms of child abuse and exploitation such as trafficking and sex. The victims of online exploitation must live with their abuse for the rest of their lives.

CYBER LAW as phenomenon dogmatic and sociological analysis of emergency trends in human behaviours, known as Sexting and the recognition of new mental disease, called Internet Addiction Disorder (IAD)in DSM V, 2014

Criminal penalties recognition of penal fines for legal entities as form of Harmonization of Criminal Enforcement of EU policies, analysing the implications of their use in the transformation of social control strategies. This shows interesting paradoxes: from their consolidation from Beccaria and Bentham as one of the pillars of the current crime management strategies, along with imprisonment, to their gradual decline in favour of an increase in sentences depriving people of rights.

Criminal law as paradigm of complexity The project focuses on the mechanisms, instruments and practices relating to issues connected to information society in criminal perspective -to identify the offenses beside national and international criminal systems on the respect of legality principle

CRIMINAL LAW ASPECTS (the rule of law and due process on guaranteeing compliance). Which conduct is crime? (definition at national and European level of sexual abuse, child pornography, the participation of a child in pornography performances, child prostitution, corruption of children, solicitation of children for sexual purposes); which conduct is crime? Can we criminalize the virtual sexual acts? Which sanctions? Are attempt, aiding or abetting of these criminal conducts criminal offences?

Statistical perspectives -to identify the offenses beside national and international criminal systems applying the principles of jurisdictions (territoriality, active and passive nationality, personality, universality). -to identify the locus delicti. Starting from the legal concepts for locating conduct to a specific place of commission, where is the locus delicti in cyberspace? (Italian and French Doctrines discuss on a-territoriality as a form of “loss of location).

Criminal law factors Short term Medium term Long run term )Which issues to support a basic theory, when an offence has been committed on own territory and its effects are above around the globe? Which norms to apply (the conduct or the effects of the crime respecting the territoriality; the atrocity of crime, respecting the universal jurisdiction; the transnational dimension of crimes)? This is a crucial point that plays a significant role in practice and in legal systems. Short term Medium term Long run term

Criminal law aspects To identify the victims The grow of the Internet gives criminals greater opportunities to entrap new victims, including children, specifically in times of emergencies for the security of under age citizens; -To identify the criminal liability for legal entities (host providers). to emphasis the gravity of phenomenon; -to undertake measures taken by European Countries on protecting children against sexual exploitation and sexual abuse on the Internet; -To share good practices and to facilitate international cooperation activity.