CRIMINAL PSYCHOLOGY and FORENSIC TECHNOLOGY a Collaborative Approach to Effective Profiling

Total Page:16

File Type:pdf, Size:1020Kb

CRIMINAL PSYCHOLOGY and FORENSIC TECHNOLOGY a Collaborative Approach to Effective Profiling CRIMINAL PSYCHOLOGY and FORENSIC TECHNOLOGY A Collaborative Approach to Effective Profiling Edited by Grover Maurice Godwin, Ph.D. Research Assistant Professor Justice Center The University of Alaska –Anchorage CRC Press Boca Raton London New York Washington, D.C. © 2001 CRC Press LLC Front Cover: Helen M. Godwin Library of Congress Cataloging-in-Publication Data Criminal psychology and forensic technology : a collaborative approach to effective profiling / editor, Maurice Godwin. p. cm. Includes bibliographical references and index. ISBN 0-8493-2358-4 1. Criminal psychology. 2. Forensic sciences. I. Godwin, Maurice. HV6080 .C734 2000 364.3—dc21 00-064150 CIP This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. All rights reserved. Authorization to photocopy items for internal or personal use, or the personal or internal use of specific clients, may be granted by CRC Press LLC, provided that $.50 per page photocopied is paid directly to Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923 USA. The fee code for users of the Transactional Reporting Service is ISBN 0-8493-2358-4/01/$0.00+$.50. The fee is subject to change without notice. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying. Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe. © 2001 by CRC Press LLC No claim to original U.S. Government works International Standard Book Number 0-8493-2358-4 Library of Congress Card Number 00-064150 Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 Printed on acid-free paper Preface Criminal psychology, forensic technology, and profiling. These three disciplines have received a wealth of media attention over the past decade. Consequently, due to public and professional interest, a plethora of books have been published. The technique of offender profiling, or classifying offenders according to their behaviors and characteristics, has been developing slowly as a possible investi- gative tool since 1841 and the publication of the The Murders in the Rue Morgue by Edgar Alan Poe, in which detective C. Auguste Dupin demonstrated the ability to follow the thought patterns of a companion while the pair strolled through Paris without speaking a word. Some years later, the art of using psy- chology to profile a criminal was used in 1888 in England, where Dr. Thomas Bond, a lecturer in forensic medicine, produced what could be recognized as a psychological profile of the perpetrator of the Whitechapel murders. Dr. Bond wrote to the head of the Criminal Investigation Division (Rumbelow, 1987:140): The murderer must have been a man of physical strength and great coolness and daring. There is no evidence that he had an accomplice. He must, in my opinion, be a man subject to periodic attacks of Homicidal and erotic mania. The character of the mutilations indicates that the man may be in a condition sexually, that may be called Satyriasis. It is of course possible that the Homi- cidal impulse may have developed from a revengeful or brooding condition of mind, or that religious mania may have been the original disease, but I do not think that either hypothesis is likely. The murderer in external appearance is quite likely to be a quite inoffensive looking man probably middle-age and neatly and respectable dressed. I think he might be in the habit of wearing a cloak or overcoat or he could hardly escape notice in the streets if the blood on his hands or clothes were visible. Assuming the murderer to be such a person as I have just described, he would be solitary and eccentric in his habits. Also, he is likely to be a man without regular occupation, but with some small income or pension. He is possibly living among respectable persons who have some knowledge of his character and habits who have grounds for suspicion that he is not quite right in his mind at times. Such person would probably be unwilling to communicate and would be suspicious of the police for fear of trouble or notoriety, whereas if there were prospects of a reward it might overcome his scruples. © 2001 CRC Press LLC Dr. Bond based his profile only on his professional experience, yet the claims he made would probably be accepted as thoughtful and intelligent by most police investigators today. Since its emergence, offender profiling has been described by several dif- ferent terms: psychological profiling, criminal profiling, criminal personality profiling, and criminal investigative analysis. Regardless of the descriptive label applied, profiling as an investigative tool today represents a less–than–educated attempt to provide law enforcement agencies with detailed information about the behavior of an unknown individual who has committed a crime. Most published accounts of profiling, which detail the methods employed by various individuals, have tended to take the form of semi-autobiographical books and journalistic articles rather than systematic academic work and, hence, are difficult to evaluate for accuracy or a scientific point of view. For example, most offender profiles emphasize the various psychological functions that murder has for the offender — not what varieties of action the murder actually consists of. Consequently, these profiles make little distinction between the overt crime scene behavior as it occurs in murders and the psychodynamic processes that produce that behavior. Hence, there is little attempt by profilers to differentiate aspects of the offender’s motivations and life-style from aspects of his offending behavior. Heuristics and Biases in Decision Making Aside from a few studies (e.g., Hunting Serial Predators, Godwin, 2000), most published accounts that claim new findings in criminal profiling or serial offending are often a part of the cultural baggage passed down over the years, and are fraught with the frailties of human thinking. Conclusions are pre- dominantly based on what has been written in the past. For example, some profilers claim that patterns associated with serial offending occur as a result of recognizable mental illness or mental disorder in the offender, and these disorders can be classified using a personality theory. However, psychological theory should never be treated as a vocabulary by so-called profilers or expert consultants to further their personal opinions, rather than a set of empirically derived hypotheses open to scientific analysis. For instance, in a newspaper article about Robert Yates, a serial murderer recently captured in Spokane, Washington, a former homicide investigator, stated that the Yates case dem- onstrated that serial killers are individuals whose behavior cannot be pre- dicted, yet a recently published journal article written by the investigator describes a theoretical typology by which sexual murderers’ motivations are profiled. This is just one of the ways in which individuals attempt to blur the facts when it comes to taking responsibility for inaccurate profiles and the failure to link unsolved crimes. © 2001 CRC Press LLC Confirmation Bias Numerous studies have demonstrated that people generally give excessive value to confirmatory information; that is, information which supports a particular position (Schwenk, 1988). Confirmation bias refers to a type of selective thinking whereby one tends to look for what confirms one’s beliefs, and ignore or undervalue the relevance of contradictory information. This type of thinking results from deductive inferencing without supporting inductive research. For example, Wiseman, West, and Stemman (1996) found that in cases where psychics had contributed to police investigations, the psychics and the investigators they advised were only likely to remember those aspects of the case they were correct about and forget the incorrect assertions. Gilovich (1993) suggests that the most likely reason for excessive influence of confirmatory information is that it is easier to deal with cognitively. In other words, it is much easier to see how a piece of information supports a position than how it might count against it. This form of confirmatory thinking is prevalent in criminal investigations — especially serial crime investigations — and often results in misleading information and wasted man hours. Selective Thinking Selective thinking is the process whereby a person focuses on favorable evidence while ignoring unfavorable evidence. This kind of thinking is sometimes referred to as “tunnel vision.” Selective thinking occurs when an investigator or profiler rejects alternative explanations in favor of simpler ones. This form of thinking is referred to as “Occam’s Razor.” Post Hoc Fallacy Post hoc fallacy, also called post hoc ergo proper hoc (after this therefore because of this) fallacy, is based upon the mistaken notion that simply because one event follows another, the first event is the cause of the second one. This form of reasoning in criminal investigations is the basis for many erroneous con- clusions and failed investigations. For example, you have a “vision” that a body is going to be found in the water near a tree, and later a body is found in the water near a tree.
Recommended publications
  • The Python/C API Release 3.6.0
    The Python/C API Release 3.6.0 Guido van Rossum and the Python development team March 05, 2017 Python Software Foundation Email: [email protected] CONTENTS 1 Introduction 3 1.1 Include Files...............................................3 1.2 Objects, Types and Reference Counts..................................4 1.3 Exceptions................................................7 1.4 Embedding Python............................................9 1.5 Debugging Builds............................................ 10 2 Stable Application Binary Interface 11 3 The Very High Level Layer 13 4 Reference Counting 19 5 Exception Handling 21 5.1 Printing and clearing........................................... 21 5.2 Raising exceptions............................................ 22 5.3 Issuing warnings............................................. 24 5.4 Querying the error indicator....................................... 25 5.5 Signal Handling............................................. 26 5.6 Exception Classes............................................ 27 5.7 Exception Objects............................................ 27 5.8 Unicode Exception Objects....................................... 28 5.9 Recursion Control............................................ 29 5.10 Standard Exceptions........................................... 29 6 Utilities 33 6.1 Operating System Utilities........................................ 33 6.2 System Functions............................................. 34 6.3 Process Control.............................................. 35
    [Show full text]
  • M&A Transaction Spotlight
    2012 AWARD WINNER: Capstone Partners GLOBAL INVESTMENT BANKING Investment Banking Advisors BOUTIQUE FIRM OF THE YEAR SaaS & Cloud M&A and Valuation Update Q2 2013 BOSTON CHICAGO LONDON LOS ANGELES PHILADELPHIA SAN DIEGO SILICON VALLEY Capstone Partners 1 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors WORLD CLASS WALL STREET EXPERTISE.1 BUILT FOR THE MIDDLE MARKET.TM Table of Contents Section Page Introduction Research Coverage: SaaS & Cloud 4 Key Takeaways 5-6 M&A Activity & Multiples M&A Dollar Volume 8 M&A Transaction Volume 9-11 LTM Revenue Multiples 12-13 Highest Revenue Multiple Transactions for LTM 14 Notable M&A Transactions 15 Most Active Buyers 16-17 Public Company Valuation & Operating Metrics SaaS & Cloud 95 Public Company Universe 19-20 Recent IPOs 21-27 Stock Price Performance 28 LTM Revenue, EBITDA & P/E Multiples 29-31 Revenue, EBITDA and EPS Growth 32-34 Margin Analysis 35-36 Best / Worst Performers 37-38 Notable Transaction Profiles 40-49 Public Company Trading & Operating Metrics 51-55 Technology & Telecom Team 57-58 Capstone Partners 2 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors 2 Capstone Partners Investment Banking Advisors Observations and Introduction Recommendations Capstone Partners 3 CapstoneInvestment BankingPartners Advisors Investment Banking Advisors WORLD CLASS WALL STREET EXPERTISE.3 BUILT FOR THE MIDDLE MARKET.TM Research Coverage: SaaS & Cloud Capstone’s Technology & Telecom Group focuses its research efforts on the following market
    [Show full text]
  • Software Equity Group's 2012 M&A Survey
    The Software Industry Financial Report Software Equity Group, L.L.C. 12220 El Camino Real Suite 320 San Diego, CA 92130 [email protected] (858) 509-2800 Unmatched Expertise. Extraordinary Results Overview Deal Team Software Equity Group is an investment bank and M&A advisory firm serving the software and technology sectors. Founded in 1992, our firm has guided and advised companies on five continents, including Ken Bender privately-held software and technology companies in the United States, Canada, Europe, Asia Pacific, Managing Director Africa and Israel. We have represented public companies listed on the NASDAQ, NYSE, American, (858) 509-2800 ext. 222 Toronto, London and Euronext exchanges. Software Equity Group also advises several of the world's [email protected] leading private equity firms. We are ranked among the top ten investment banks worldwide for application software mergers and acquisitions. R. Allen Cinzori Managing Director Services (858) 509-2800 ext. 226 [email protected] Our value proposition is unique and compelling. We are skilled and accomplished investment bankers with extraordinary software, internet and technology domain expertise. Our industry knowledge and experience span virtually every software product category, technology, market and delivery model. We Dennis Clerke have profound understanding of software company finances, operations and valuation. We monitor and Executive Vice President analyze every publicly disclosed software M&A transaction, as well as the market, economy and (858) 509-2800 ext. 233 technology trends that impact these deals. We offer a full complement of M&A execution to our clients [email protected] worldwide. Our capabilities include:. Brad Weekes Sell-Side Advisory Services – leveraging our extensive industry contacts, skilled professionals and Vice President proven methodology, our practice is focused, primarily on guiding our client s wisely toward the (858) 509-2800 ext.
    [Show full text]
  • Scientific Computing with MATLAB
    Scientific Computing with MATLAB Paul Gribble Fall, 2015 Tue 12th Jan, 2016, 06:25 ii About the author Paul Gribble is a Professor at the University of Western Ontario1 in London, On- tario Canada. He has a joint appointment in the Department of Psychology2 and the Department of Physiology & Pharmacology3 in the Schulich School of Medicine & Dentistry4. He is a core member of the Brain and Mind Institute5 and a core member of the Graduate Program in Neuroscience6. He received his PhD from McGill University7 in 1999. His lab webpage can be found here: http://www.gribblelab.org This document This document was typeset using LATEX version 3.14159265-2.6-1.40.16 (TeX Live 2015). These notes in their entirety, including the LATEX source, are avail- able on GitHub8 here: https://github.com/paulgribble/SciComp License This work is licensed under a Creative Commons Attribution 4.0 International License9. The full text of the license can be viewed here: http://creativecommons.org/licenses/by/4.0/legalcode iii LINKS Links 1http://www.uwo.ca 2http://psychology.uwo.ca 3http://www.schulich.uwo.ca/physpharm/ 4http://www.schulich.uwo.ca 5http://www.uwo.ca/bmi 6http://www.schulich.uwo.ca/neuroscience/ 7http://www.mcgill.ca 8https://github.com 9http://creativecommons.org/licenses/by/4.0/ LINKS iv Preface These are the course notes associated with my graduate-level course called Sci- entific Computing (Psychology 9040a), given inthe Department of Psychol- ogy10 at the University of Western Ontario11. The goal of the course is to provide you with skills in scientific computing: tools and techniques that you can use in your own scientific research.
    [Show full text]
  • Who's Behind ICE: Tech and Data Companies Fueling Deportations
    Who’s Behind ICE? The Tech Companies Fueling Deportations Tech is transforming immigration enforcement. As advocates have known for some time, the immigration and criminal justice systems have powerful allies in Silicon Valley and Congress, with technology companies playing an increasingly central role in facilitating the expansion and acceleration of arrests, detentions, and deportations. What is less known outside of Silicon Valley is ​ the long history of the technology industry’s “revolving door” relationship with federal agencies, how the technology industry and its products and services are now actually circumventing city- and state-level protections for vulnerable communities, and what we can do to expose and hold these actors accountable. Mijente, the National Immigration Project, and the Immigrant Defense Project — immigration and ​ ​ ​ ​ ​ Latinx-focused organizations working at the intersection of new technology, policing, and immigration — commissioned Empower LLC to undertake critical research about the multi-layered technology ​ ​ infrastructure behind the accelerated and expansive immigration enforcement we’re seeing today, and the companies that are behind it. The report opens a window into the Department of Homeland Security’s (DHS) plans for immigration policing through a scheme of tech and database policing, the mass scale and scope of the tech-based systems, the contracts that support it, and the connections between Washington, D.C., and Silicon Valley. It surveys and investigates the key contracts that technology companies have with DHS, particularly within Immigration and Customs Enforcement (ICE), and their success in signing new contracts through intensive and expensive lobbying. Targeting Immigrants is Big Business Immigrant communities and overpoliced communities now face unprecedented levels of surveillance, detention and deportation under President Trump, Attorney General Jeff Sessions, DHS, and its sub-agency ICE.
    [Show full text]
  • Marks Published for Opposition
    MARKS PUBLISHED FOR OPPOSITION The following marks are published in compliance with section 12(a) of the Trademark Act of 1946. Applications for the registration of marks in more than one class have been filed as provided in section 30 of said act as amended by Public Law 772, 87th Congress, approved Oct. 9, 1962, 76 Stat. 769. Opposition under section 13 may be filed within thirty days of the date of this publication. See rules 2.101 to 2.105. A separate fee of two hundred dollars for opposing each mark in each class must accompany the opposition. SECTION 1.— INTERNATIONAL CLASSIFICATION The short titles associated below with the international class numbers are terms designed merely for quick identification and are not an official part of the international classification. The full names of international classes are given in section 6.1 of the trademark rules of practice. The designation ‘‘U.S. Cl.’’ appearing in this section refers to the U.S. class in effect prior to Sep. 1, 1973 rather than the international class which applies to applications filed on or after that date. For adoption of international classification see notice in the OFFICIAL GAZETTE of Jun. 26, 1973 (911 O.G. TM 210). Application in more than one class SN 75-416,963. LEARNING KEY, INC., THE, ALBUQUER- SN 75-741,599. HARLEQUIN ENTERPRISES LIMITED, DON QUE, NM. FILED 1-12-1998. MILLS, ONTARIO M3B 3K9, CANADA, FILED 6-30-1999. BLAZE THE LEARNING KEY CLASS 9—ELECTRICAL AND SCIENTIFIC APPARATUS FOR DOWNLOADABLE ELECTRONIC PUBLICA- NO CLAIM IS MADE TO THE EXCLUSIVE RIGHT TO TIONS, NAMELY ROMANCE NOVELS; PRE-RE- USE "LEARNING", APART FROM THE MARK AS SHOWN.
    [Show full text]
  • 3Q09 Software Industry Equity Report.Pdf
    ABOUT OUR FIRM Software Equity Group is an investment bank and M&A advisory serving the software and technology sectors. Founded in 1992, our firm has represented and guided private companies throughout the United States and Canada, as well as Europe, Asia Pacific, Africa and Israel. We have advised public companies listed on the NASDAQ, NYSE, American, Toronto, London and Euronext exchanges. Software Equity Group also represents several of the world's leading private equity firms. We are ranked among the top ten investment banks worldwide for application software mergers and acquisitions. Our value proposition is unique and compelling. We are skilled and accomplished investment bankers with extraordinary software, internet and technology domain expertise. Our industry knowledge and experience span virtually every software product category, technology, market and delivery model, including Software-as-a-Service (SaaS), software on-demand and perpetual license. We have profound understanding of software company finances, operations and valuation. We monitor and analyze every publicly disclosed software M&A transaction, as well as the market, economy and technology trends that impact these deals. We're formidable negotiators and savvy dealmakers who facilitate strategic combinations that enhance shareholder value. Perhaps most important are the relationships we've built, and the industry reputation we enjoy. Software Equity Group is known and respected by publicly traded and privately owned software and technology companies worldwide, and we speak with them often. Our Quarterly and Annual Software Industry Equity Reports are read and relied upon by more than fifteen thousand industry executives, entrepreneurs and equity investors in 61 countries, and we have been quoted widely in such leading publications as The Wall Street Journal, Barrons, Information Week, The Daily Deal, The Street.com, U.S.
    [Show full text]
  • Impact of Artificial Intelligence on Businesses: from Research, Innovation, Market
    Impact of Artificial Intelligence on Businesses: from Research, Innovation, Market Deployment to Future Shifts in Business Models1 Neha Soni1, Enakshi Khular Sharma1, Narotam Singh2, Amita Kapoor3, 1Department of Electronic Science, University of Delhi South Campus, Delhi, India 2Information Communication and Instrumentation Training Centre, India Meteorological Department, Ministry of Earth Sciences, Delhi, India 3Shaheed Rajguru College of Applied Sciences for Women, University of Delhi, Delhi, India {[email protected], [email protected], [email protected], [email protected]} Abstract The fast pace of artificial intelligence (AI) and automation is propelling strategists to reshape their business models. This is fostering the integration of AI in the business processes but the consequences of this adoption are underexplored and needs attention. This paper focuses on the overall impact of AI on businesses - from research, innovation, market deployment to future shifts in business models. To access this overall impact, we design a three dimensional research model, based upon the Neo-Schumpeterian economics and its three forces viz. innovation, knowledge, and entrepreneurship. The first dimension deals with research and innovation in AI. In the second dimension, we explore the influence of AI on the global market and the strategic objectives of the businesses and finally the third dimension examines how AI is shaping business contexts. Additionally, the paper explores AI implications on actors and its dark sides. Keywords Artificial Intelligence, Automation, Digitization, Business Strategies, Innovation, Business Contexts 1. Introduction The emerging technologies viz. internet of things (IoT), data science, big data, cloud computing, artificial intelligence (AI), and blockchain are changing the way we live, work and amuse ourselves.
    [Show full text]
  • RIACS FY2002 Annual Report
    Research Institute for Advanced Computer Science NASA Ames Research Center RIACS FY2002 Annual Report Barry M. Leiner RIACS Technical Report AR-02 November 2002 RIACS FY2002 Annual Report October 2001 through September 2002 THIS PAGE IS INTENTIONALLY LEFT BLANK Research Institute for Advanced Computer Science ANNUAL REPORT October 2001 through September 2002 Cooperative Agreement: NCC 2-1006 Submitted to: Contracting Office Technical Monitor: Anthony R. Gross Associate Director for Programs Information Sciences & Technology Directorate NASA Ames Research Center Mail Stop 200-6 Submitted by: Research Institute for Advanced Computer Science (RIACS) Operated by: Universities Space Research Association (USRA) RIACS Principal Investigator: Dr. Barry M. Leiner Director Dr. Barry M. Leiner Any opinions, findings, and Conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Aeronautics and Space Administration. This report is available online at http://www.riacs.edu/trs/ RIACS FY2002 Annual Report October 2001 throughSeptember 2002 THIS PAGE IS INTENTIONALLY LEFT BLANK RIACS FY2002 Annual Report October 2001 through September 2002 TABLE OF CONTENTS I* INTRODUCTION AND OVERVIEW .............................................................. 1 I.A. Summary of FY2002 Activity ........................................................................................ 1 I.B. Bio/IT Fusion Area Overview .......................................................................................
    [Show full text]
  • Marks Published for Opposition
    MARKS PUBLISHED FOR OPPOSITION The following marks are published in compliance with section 12(a) of the Trademark Act of 1946. Applications for the registration of marks in more than one class have been filed as provided in section 30 of said act as amended by Public Law 772, 87th Congress, approved Oct. 9, 1962, 76 Stat. 769. Opposition under section 13 may be filed within thirty days of the date of this publication. See rules 2.101 to 2.105. A separate fee of two hundred dollars for opposing each mark in each class must accompany the opposition. SECTION 1.— INTERNATIONAL CLASSIFICATION The short titles associated below with the international class numbers are terms designed merely for quick identification and are not an official part of the international classification. The full names of international classes are given in section 6.1 of the trademark rules of practice. The designation ‘‘U.S. Cl.’’ appearing in this section refers to the U.S. class in effect prior to Sep. 1, 1973 rather than the international class which applies to applications filed on or after that date. For adoption of international classification see notice in the OFFICIAL GAZETTE of Jun. 26, 1973 (911 O.G. TM 210). Application in more than one class SN 74-092,685. HACHETTE FILIPACCHI PRESS, LEVAL- SN 75-348,155. MACMILLAN PUBLISHERS LIMITED, BAS- LOIS-PERRET CEDEX, FRANCE, FILED 8-30-1990. KINSTOKE, UNITED KINGDOM, FILED 8-27-1997. NATURE ELLE OWNER OF U.S. REG. NO. 1,129,966. SEC. 2(F). CLASS 9—ELECTRICAL AND SCIENTIFIC OWNER OF FRANCE REG.
    [Show full text]
  • L'edi Vu Par Wikipedia.Fr Transfert Et Transformation Table Des Matières
    L'EDI vu par Wikipedia.fr Transfert et transformation Table des matières 1 Introduction 1 1.1 Échange de données informatisé .................................... 1 1.1.1 Définition ........................................... 1 1.1.2 Quelques organisations .................................... 1 1.1.3 Quelques normes EDI .................................... 2 1.1.4 Quelques protocoles de communication ........................... 2 1.1.5 Quelques messages courants ................................. 2 1.1.6 Articles connexes ....................................... 4 2 Organismes de normalisation 5 2.1 Organization for the Advancement of Structured Information Standards ............... 5 2.1.1 Membres les plus connus de l'OASIS ............................ 5 2.1.2 Standards les plus connus édictés par l'OASIS ........................ 6 2.1.3 Lien externe ......................................... 7 2.2 GS1 .................................................. 7 2.2.1 Notes et références ...................................... 7 2.2.2 Annexes ........................................... 7 2.3 GS1 France .............................................. 7 2.3.1 Lien externe .......................................... 8 2.4 Comité français d'organisation et de normalisation bancaires ..................... 8 2.4.1 Liens externes ........................................ 8 2.5 Groupement pour l'amélioration des liaisons dans l'industrie automobile ............... 9 2.5.1 Présentation ......................................... 9 2.5.2 Notes et références .....................................
    [Show full text]
  • Who's Behind ICE? the Tech Companies Fueling
    Who’s Behind ICE? The Tech Companies Fueling Deportations Tech is transforming immigration enforcement. As advocates have known for some time, the immigration and criminal justice systems have powerful allies in Silicon Valley and Congress, with technology companies playing an increasingly central role in facilitating the expansion and acceleration of arrests, detentions, and deportations. What is less known outside of Silicon Valley is ​ the long history of the technology industry’s “revolving door” relationship with federal agencies, how the technology industry and its products and services are now actually circumventing city- and state-level protections for vulnerable communities, and what we can do to expose and hold these actors accountable. Mijente, the National Immigration Project, and the Immigrant Defense Project — immigration and ​ ​ ​ ​ ​ Latinx-focused organizations working at the intersection of new technology, policing, and immigration — commissioned Empower LLC to undertake critical research about the multi-layered technology ​ ​ infrastructure behind the accelerated and expansive immigration enforcement we’re seeing today, and the companies that are behind it. The report opens a window into the Department of Homeland Security’s (DHS) plans for immigration policing through a scheme of tech and database policing, the mass scale and scope of the tech-based systems, the contracts that support it, and the connections between Washington, D.C., and Silicon Valley. It surveys and investigates the key contracts that technology companies have with DHS, particularly within Immigration and Customs Enforcement (ICE), and their success in signing new contracts through intensive and expensive lobbying. Targeting Immigrants is Big Business Immigrant communities and overpoliced communities now face unprecedented levels of surveillance, detention and deportation under President Trump, Attorney General Jeff Sessions, DHS, and its sub-agency ICE.
    [Show full text]