Kidnap, Hijack and Extortion: the Response

Total Page:16

File Type:pdf, Size:1020Kb

Kidnap, Hijack and Extortion: the Response KIDNAP, HIJACK AND EXTORTION: THE RESPONSE Also by Richard Clutterbuck ACROSS THE RIVER (as Richard Jocelyn) BRITAIN IN AGONY CONFLICT AND VIOLEN CE IN SINGAPORE AND MALAYSIA GUERRILLAS AND TERROR1STS INDUSTRIAL CONFLICT AND DEMOCRACY KIDNAP AND RANSOM LlVING WITH TERRORISM PROTEST AND THE URBAN GUERRILLA RIOT AND REVOLUTION IN SINGAPORE AND MALAYSIA THE FUTURE OF POLITICAL VIOLEN CE THE LONG LONG WAR THE MEDIA AND POLITICAL VIOLENCE Kidnap, Hijack and Extortion: The Response Richard Clutterbuck Foreword by Sir Robert Mark Palgrave Macmillan ISBN 978-0-333-41938-0 ISBN 978-1-349-18754-6 (eBook) DOI 10.1007/978-1-349-18754-6 © Richard Clutterbuck, 1987 Foreword © Sir Robert Mark, 1987 Softcover reprint of the hardcover 18t edition 1987 All rights reserved. For information, write: Scholarly & Reference Division, St. Martin's Press, Inc., 175 Fifth Avenue, New York, NY 10010 First published in the United States of America in 1987 ISBN 978-0-312-00906-9 Library of Congress Cataloging-in-Publication Data Clutterbuck, Richard L. Kidnap, hijack, and extortion. Bibliography: p. Includes index 1. Terrorism-Case studies. 2. Kidnapping-Case studies. 3. Hijacking of aircraft-Case studies. 4. Extortion-Case studies. I. Title. HV6431.C549 1987 364.1'54 87-4809 ISBN 978-0-312-00906-9 To my friends in Control Risks who don't know what it me ans to have a quiet life; who are prepared without notice to take the next flight to pI aces facing the highest risks in the world, and to work there under intense pressure until the job is done; who have thereby saved many lives and helped the police catch dangerous criminals and terrorists who, but for that, would have deprived more people of their right to life and liberty. Contents Foreword by Sir Robert Mark Xll Preface xv Abbreviations xvii Prologue xx PART I THE THREAT 1 Sources and Forms of Attaek 3 Kidnap and extortion in perspeetive 3 Types of abduetion, extortion and intimidation 4 Criminal gangs 6 Politieal terrorists 6 International exploitation and support 8 Teehnological developments 9 2 The Growth of Kidnap and Extortion 14 Cost effeetiveness: high yield, low risk 14 Diplomatie kidnappings 1968--73 14 Changing pattern of attaeks on diplomatie targets 16 Hijacking 19 Kidnap and extortion in the business world 21 3 Kidnap and Extortion Around the World 25 The varying pattern 25 Western Europe and Turkey 25 The Middle East and North Afriea 30 Sub-Saharan Afriea 32 Asia and Australasia 36 North Ameriea and the Caribbean 38 Latin Ameriea 41 4 Organization of a Long-term Kidnap 47 Seale and pattern of a kidnap 47 Target seleetion 48 Reeonnaissanee and surveillanee 49 Abduetion 49 Detention in a hideout 51 Negotiation and release 51 vii viii Contents 5 Other Forms of Abduction and Hostage-taking 53 Anti -development abduction 53 Short-term abductions 55 Hostage selzure in the horne or workplace 56 Hijacking 57 6 Product Contamination and Extortion by Bomb Threat 59 The nature of the criminals and the crime 59 Target selection and reconnaissance 60 Pattern of bomb extortions 61 Pattern of extortion by product contamination 62 Negotiation by the extortioner 63 Malicious contamination 64 Animal rights activism 65 PART 11 THE RESPONSE 7 Risk Management and Security 71 Risk management 71 Threat assessment 72 Cooperation with government and police 73 Security at work 73 Airport security 75 International travel 77 Security on the road 80 Horne as a fortress 82 Security of an ordinary horne and family 84 Contingency planning and the essence of security 85 8 The Ordeal of the Hostage 87 Being mentally prepared 87 The moment of abduction 88 The first few days 89 Surviving the long night 91 9 Response to Kidnap: Morality and the Law 93 Conflicting interests 93 Governments, corporations and families 95 Laws inhibiting kidnap negotiations 97 Insurance 99 Laws wh ich help to defeat terrorism 101 Contents IX International cooperation 103 10 Response to Product Contamination 105 Extortion and malicious contamination 105 Assessing the credibility of the threat 105 Conflicting factors 106 The law 107 Product recall, withdrawal and insurance 109 Relations with the police and the media 110 11 Contingency Planning 113 Minimizing management diversion and cost 113 Establishing corporate policies 113 Administrative preparations 115 Joint planning with the police 117 Legalliabilities 117 Public relations planning 118 Training and simulation exercises 119 12 Crisis Management 121 Crisis management structure 121 Immediate re action to a crisis 122 The role of the negotiator 124 The role of the consultant 125 Negotiating tactics 127 Negotiation by families and governments 130 Negotiation in bomb and product extortions 132 Paying a ransom and release of the hostage 132 Siege and rescue 135 Raids 137 Rehabilitation of the hostage 138 PART III CASE STUDIES 13 Leon Don Richardson 143 Kidnap and detention 143 Seeking advice and establishing contact 144 Gaining the initiative 146 Release 147 Don Richardson's advice for businessmen at risk 148 14 Kidnapping: Latin America 150 x Contents Guatemala (Rios de Rivas) 150 EI Salvador (Massie and Chatterton) 151 Colombia (Starr) 152 Venezuela (Niehous) 153 Peru (Ourubia) 154 Uruguay (Jackson) 155 Argentina (Sallustro, Ford, Exxon, Born) 156 15 Kidnapping: Western Europe 159 Great Britain (Whittle, Kaloghirou, Xuereb, Sadiq al-Tajir) 159 Ireland, North and South (Herrema, Gilmour, Kirkpatrick, Shergar, Guinness) 161 The Netherlands (Caransa, Van der Valk, Heineken 164 West Germany (Schleyer, von Gallwitz) 165 France (Empain) 167 Spain (Echevarria, Prado) 168 Italy (Lazzaroni, Moro, Schild, Dozier, Bulgari, Castagno, Bini) 168 An anonymous case 173 16 Anti-development Abductions 175 Kurdistan 175 Angola 178 Sudan 179 Zimbabwe 180 17 Short-term Abductions 182 Brian Norry 182 Stuart Melville 182 Allied lrish Bank 182 Rafael Villaseca 183 18 Hijacking and Hostage Sieges 184 Train hijacks in the Netherlands 184 Hijack to Entebbe, 1976 186 Hijack to Mogadishu, 1977 187 Tehran: seizure of the US Embassy 188 Bogota: seizure of the Dominican Embassy 190 London: the Iranian Embassy siege 191 Contents xi Hijack to Beirut, June 1985 193 Hijack of the ship Achille Lauro, October 1985 194 Hijack to Malta, November 1985 195 Hijack at Karachi, September 1986 195 19 Extortion by Bomb Threat and Product Contamination 198 Woolworths, Australia 198 Coles Supermarkets, Australia 200 Qantas Airways, Australia 200 Bomb threats at an oil installation 200 Supermarket chain, UK 202 Tobacco company, UK 203 A multinational food corporation 203 Japan: 'The 21-faced monster' 205 Sunsilk shampoo: Animal Liberation Front, UK 207 Mars bars: Animal Liberation Front, UK 207 Tylenol, USA 209 PART IV CONCLUSIONS 20 Conclusions 213 The threat 213 The response 214 Contingency planning and crisis management 215 Bibliography 217 Index 220 Foreword Sir Robert Mark, GBE, QPM Eight years have passed since Richard Clutterbuck published his book Kidnap and Ransom: The Response. It was my privilege then to contribute a foreword and 1 do so again for two reasons, pleasure and obligation. The first book was an informative, workmanlike treatise on a subject of growing interest. It sold out, became difficult to obtain and was unlikely to be republished unless expanded and brought up to date. 1 found it particularly useful as a convenient reference book and have repeatedly urged the author to return to the subject, knowing weIl his impressive qualifications for the task. The result gives one pleasure, but perhaps more relevant, a sense of satisfaction that a book so well-informed and so useful should appear at a moment of such obvious need. A number of books on terrorism have appeared in recent times. They cover a wide spectrum, geographically, historically and politically and will undoubtedly be of interest to the researcher. This book, however, is rather different. It reflects the author's experience as a senior army officer involved in counter-terrorist activities as the Chief Army Instructor at the Royal College of Defence Studies, as a Senior Lecturer in Politics at Exeter University and, most important of all, as a director of Control Risks Ud, a British company which has in recent years probably had more actual experience of countering kidnap, ransom and extortion worldwide than any other organization, public or private. It is interesting that a compaily established in a country in which kidnap, ransom and extortion are comparatively rare should have acquired a worldwide reputation for countering that activity and should have gained the respect and confidence of law-enforcement agencies and governments to such a remarkable extent. 1 must make it clear that I, too, have been a director of Control Risks Ltd since 1981 when the company accepted my invitation to help in countering a difficult problem of extortion in Australia. My continued association with it is a direct result of that experience and reflects my admiration for the motivation and dedication of its staff, many of whom are drawn from public service of one kind or another. The author deals at length with kidnapping for political reasons and XlI Foreword xiii for extortion. The uninformed reader, particularly in mainland Britain, will be astonished by its frequency and extent. It emerges clearly that, for political kidnapping in particular, there is no likelihood of an effective response capable of universal application. The demands of the criminals can sometimes only be met by governments other than that of the country in which the victims are being held. One country's terrorist, it is often said, is another's freedom fighter. Add to that the natural unwillingness of any government to show weakness under pressure and the complexity of the problem becomes positively disheartening. A curious tendency by many governments to regard politically mo ti va ted crimes as less reprehensible than conventional wrongdoing affords the terrorist encouragement and occasionally even sanctuary.
Recommended publications
  • Crime, Law Enforcement, and Punishment
    Shirley Papers 48 Research Materials, Crime Series Inventory Box Folder Folder Title Research Materials Crime, Law Enforcement, and Punishment Capital Punishment 152 1 Newspaper clippings, 1951-1988 2 Newspaper clippings, 1891-1938 3 Newspaper clippings, 1990-1993 4 Newspaper clippings, 1994 5 Newspaper clippings, 1995 6 Newspaper clippings, 1996 7 Newspaper clippings, 1997 153 1 Newspaper clippings, 1998 2 Newspaper clippings, 1999 3 Newspaper clippings, 2000 4 Newspaper clippings, 2001-2002 Crime Cases Arizona 154 1 Cochise County 2 Coconino County 3 Gila County 4 Graham County 5-7 Maricopa County 8 Mohave County 9 Navajo County 10 Pima County 11 Pinal County 12 Santa Cruz County 13 Yavapai County 14 Yuma County Arkansas 155 1 Arkansas County 2 Ashley County 3 Baxter County 4 Benton County 5 Boone County 6 Calhoun County 7 Carroll County 8 Clark County 9 Clay County 10 Cleveland County 11 Columbia County 12 Conway County 13 Craighead County 14 Crawford County 15 Crittendon County 16 Cross County 17 Dallas County 18 Faulkner County 19 Franklin County Shirley Papers 49 Research Materials, Crime Series Inventory Box Folder Folder Title 20 Fulton County 21 Garland County 22 Grant County 23 Greene County 24 Hot Springs County 25 Howard County 26 Independence County 27 Izard County 28 Jackson County 29 Jefferson County 30 Johnson County 31 Lafayette County 32 Lincoln County 33 Little River County 34 Logan County 35 Lonoke County 36 Madison County 37 Marion County 156 1 Miller County 2 Mississippi County 3 Monroe County 4 Montgomery County
    [Show full text]
  • Kidnap and Ransom/Extortion Coverage Part
    KIDNAP AND RANSOM/EXTORTION COVERAGE PART I. INSURING AGREEMENTS This Non-Liability Coverage Part applies to the Ransom Monies, Expenses, and Personal Incidental Loss stated below that are paid by an Insured Entity at any time, provided, however, that: (i) such payments result from a covered Kidnapping, Extortion Threat, Detention, or Hijacking that occurs during the Policy Period and (ii) the Insured Entity discovers such occurrence, and makes a claim for reimbursement under this Non-Liability Coverage Part , no later than twelve (12) months after the expiration of the Policy Period . (A) Kidnap/Ransom/Extortion The Insurer shall reimburse Ransom Monies paid by an Insured Entity resulting from a covered Kidnapping or Extortion Threat . (B) Expense The Insurer shall reimburse Expenses paid by an Insured Entity resulting from a covered Kidnapping, Extortion Threat , Detention or Hijacking of any Insured Person . (C) Custody/Delivery If, as a result of a covered Kidnapping or Extortion Threat , an Insured Entity sustains a destruction, disappearance, confiscation or wrongful appropriation of Ransom Monies, while they are being delivered to persons demanding such Ransom Monies by someone who is authorized by the Insured Entity to deliver them, the Insurer will reimburse the Insured Entity for such Ransom Monies . (D) Personal Incidental Loss The Insurer shall reimburse an Insured Entity for payments made to an Insured Person, or such person’s estate in the event of Loss of Life , for the Personal Incidental Loss sustained by such Insured Person from a covered Kidnapping , Detention or Hijacking. II. DEFINITIONS The following terms, whether used in the singular or plural in this Non-Liability Coverage Part , shall have the meaning specified below: • “Bodily Injury Extortion” means any threat, communicated to an Insured Entity or an Insured Person for the purpose of demanding Ransom Monies, to kill, physically injure or kidnap an Insured Person .
    [Show full text]
  • Penal Code Offenses by Punishment Range Office of the Attorney General 2
    PENAL CODE BYOFFENSES PUNISHMENT RANGE Including Updates From the 85th Legislative Session REV 3/18 Table of Contents PUNISHMENT BY OFFENSE CLASSIFICATION ........................................................................... 2 PENALTIES FOR REPEAT AND HABITUAL OFFENDERS .......................................................... 4 EXCEPTIONAL SENTENCES ................................................................................................... 7 CLASSIFICATION OF TITLE 4 ................................................................................................. 8 INCHOATE OFFENSES ........................................................................................................... 8 CLASSIFICATION OF TITLE 5 ............................................................................................... 11 OFFENSES AGAINST THE PERSON ....................................................................................... 11 CLASSIFICATION OF TITLE 6 ............................................................................................... 18 OFFENSES AGAINST THE FAMILY ......................................................................................... 18 CLASSIFICATION OF TITLE 7 ............................................................................................... 20 OFFENSES AGAINST PROPERTY .......................................................................................... 20 CLASSIFICATION OF TITLE 8 ..............................................................................................
    [Show full text]
  • CRIMINAL CONSPIRACY: the STATE of MIND CRIME-INTENT, PROVING INTENT, and ANTI-FEDERAL Intentt
    College of William & Mary Law School William & Mary Law School Scholarship Repository Faculty Publications Faculty and Deans 1976 Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent Paul Marcus William & Mary Law School, [email protected] Repository Citation Marcus, Paul, "Criminal Conspiracy: The tS ate of Mind Crime - Intent, Proving Intent, Anti-Federal Intent" (1976). Faculty Publications. 557. https://scholarship.law.wm.edu/facpubs/557 Copyright c 1976 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/facpubs CRIMINAL CONSPIRACY: THE STATE OF MIND CRIME-INTENT, PROVING INTENT, AND ANTI-FEDERAL INTENTt Paul Marcus* I. INTRODUCTION The crime of conspiracy, unlike other substantive or inchoate crimes, deals almost exclusively with the state of mind of the defendant. Although a person may simply contemplate committing a crime without violating the law, the contemplation becomes unlawful if the same criminal thought is incorporated in an agreement. The state of mind element of conspiracy, however, is not concerned entirely with this agreement. As Dean Harno properly remarked 35 years ago, "The conspiracy consists not merely in the agreement of two or more but in their intention."1 That is, in their agreement the parties not only must understand that they are uniting to commit a crime, but they also must desire to complete that crime as the result of their combination. Criminal conspiracy, therefore, involves two distinct states of mind. The first state of mind prompts the conspirators to reach an agreement; the second relates to the crime that is the object of the agreement.
    [Show full text]
  • Kidnapping, Hostage Taking, Extortion, Attacks
    Prevention and Coping Strategies Kidnapping, Hostage Taking, Extortion, Attacks About EuNAT The European Network of Advisory Teams (EuNAT) is a network of experienced law enforcement advisory teams from across Europe, who provide a mechanism for immediate international cooperation when responding to the threat of kidnapping, hostage taking and extortion, where life is at risk. The network represents a platform for sharing good practice in this specific field throughout the EU and within the members’ respective countries, within the constraints of each Member State’s legal framework. EuNAT: Sharing knowledge saves lives. 1 Foreword Due to your personal and/or professional circumstances, you and your family may be at a higher risk of being affected by a serious offence like kidnapping, hostage taking or extortion. Experience shows that these crimes are often well prepared by the perpetrators. The offender might take advantage of the victim’s routines or habits in order to identify opportunities for an attack. Understanding this will help you identify any weak spots in your routines and take steps to reduce the risk of becoming a victim. This also applies to spontaneous crimes such as robberies. This brochure aims to help you minimise potential and foreseeable risks and suggests how you can do this, in order to be as safe as possible. It should be used in accordance with national and company laws, policies and procedures. The content may reinforce what you already know or raise new ideas that you have not yet considered. It also contains recommendations for reacting to critical situations like a kidnapping. 2 Contents Foreword ...............................................................
    [Show full text]
  • TABLE 9.26 Capital Punishment
    CRIMINAL JUSTICE/CORRECTIONS TABLE 9.26 Capital Punishment State or other Prisoners under Capital punishment jurisdiction Capital offenses by state sentence of death abolished Method of execution Alabama Intentional murder with 18 aggravating factors (Ala. Stat. Ann. 13A-5-40(a)(1)-(18)). 182 Electrocution or lethal injection Alaska … … 1957 … First-degree murder, including pre-meditated murder and felony murder, Arizona 121 Lethal gas or lethal injection (a) accompanied by at least 1 of 14 aggravating factors (A.R.S. § 13-703(F)). Capital murder (Ark. Code Ann. 5-10-101) with a finding of at least 1 of 10 Lethal injection or Arkansas 32 aggravating circumstances; treason. electrocution (b) First-degree murder with special circumstances; sabotage; train wrecking causing California death; treason; perjury causing execution of an innocent person; fatal assault by a 740 Lethal injection prisoner serving a life sentence. First-degree murder with at least 1 of 17 aggravating factors; first-degree Colorado 3 Lethal injection kidnapping resulting in death; treason. Connecticut … (c) 0 2012 … Delaware … (d) (d) 2016 … Florida (e) First-degree murder; felony murder; capital drug trafficking; capital sexual battery. 354 Electrocution or lethal injection Murder with aggravating circumstances; kidnapping with bodily injury or ransom Georgia 56 Lethal injection when the victim dies; aircraft hijacking; treason. Hawaii … … 1957 … First-degree murder with aggravating factors; first-degree kidnapping; perjury Idaho 9 Lethal injection resulting in death. Illinois … (f) 0 2011 … Indiana Murder with 17 aggravating circumstances (IC 35-50-2-9). 11 Lethal injection or electrocution Iowa … … 1965 … Capital murder with 8 aggravating circumstances (KSA 21-3439, KSA 21-4625, Kansas 10 Lethal injection KSA 21-4636).
    [Show full text]
  • United States District Court Northern District of Alabama Western Division
    Case 7:08-cv-02025-LSC Document 45 Filed 01/27/10 Page 1 of 26 FILED 2010 Jan-27 AM 09:23 U.S. DISTRICT COURT N.D. OF ALABAMA UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ALABAMA WESTERN DIVISION RACHEL MASSEY, ] ] Plaintiff, ] ] vs. ] 7:08-CV-02025-LSC ] SMITHWAY MOTOR XPRESS, INC., ] WESTERN EXPRESS, INC., ] ] Defendants. ] Memorandum of Opinion I. Introduction. The Court has for consideration a motion for summary judgment, which was filed on September 25, 2009, by Defendant Smithway Motor Xpress, Inc. (“Defendant” or “Smithway”). (Doc. 35.) Rachel Massey (“Plaintiff”) has brought this action for claims arising from an incident in which an employee of Defendant, Roy Scott Stillwell (“Stillwell”), kidnapped and sexually assaulted Plaintiff over a period of four days. (Doc. 1.) Western Express, Inc. (“Western”), the parent company of Smithway, was originally a party to this action but was dismissed with prejudice on June 1, Page 1 of 26 Case 7:08-cv-02025-LSC Document 45 Filed 01/27/10 Page 2 of 26 2009, pursuant to a stipulated motion by Plaintiff. (Docs. 21-23.) Plaintiff has filed four counts against Defendant for vicarious liability; negligent or wanton hiring, retention and supervision; negligence and wantonness; and combined and concurring negligence and wantoness. Defendant has moved for summary judgment on all counts. (Doc. 35.) Plaintiff has also filed a partial motion for summary judgment on Defendant’s defense of contributory negligence. (Doc. 37.) The issues raised in the parties’ motions for summary judgment have been briefed by both parties and are now ripe for decision.
    [Show full text]
  • Kidnapping Federalism: United States V. Wills and the Constitutionality of Extending Federal Criminal Law Into the States M
    Journal of Criminal Law and Criminology Volume 93 Article 7 Issue 2 Winter Winter 2003 Kidnapping Federalism: United States v. Wills and the Constitutionality of Extending Federal Criminal Law into the States M. Todd Scott Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation M. Todd Scott, Kidnapping Federalism: United States v. Wills and the Constitutionality of Extending Federal Criminal Law into the States, 93 J. Crim. L. & Criminology 753 (2002-2003) This Comment is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/03/9302-0753 THE JOURNALOF CRIMINAL LAW& CRIMINOLOGY Vol. 93, Nos.2-3 Copyright © 2003 by Northestern University, School of Law Printed in U.S.A. KIDNAPPING FEDERALISM: UNITED STATES v. WILLS AND THE CONSTITUTIONALITY OF EXTENDING FEDERAL CRIMINAL LAW INTO THE STATES M. TODD SCOTT* On March 1, 1932, Charles and Anne Lindberg's twenty-month- old baby boy was kidnapped out of his nursery while he slept.' Known for many years after as the "crime of the century," the kidnapping of the Lindberg baby was, at the time, highly sensationalized. 2 Not only did it involve Lindberg, the man who had flown solo across the Atlantic to become the age's "greatest
    [Show full text]
  • Published United States Court of Appeals for The
    PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 14-2254 LIBERTY UNIVERSITY, INC., Plaintiff – Appellee, v. CITIZENS INSURANCE COMPANY OF AMERICA; HANOVER AMERICAN INSURANCE COMPANY; HANOVER INSURANCE COMPANY, Defendants – Appellants. Appeal from the United States District Court for the Western District of Virginia, at Lynchburg. Norman K. Moon, Senior District Judge. (6:13-cv-00033-NKM-RSB) Argued: May 13, 2015 Decided: July 10, 2015 Before NIEMEYER, DUNCAN, and THACKER, Circuit Judges. Vacated and remanded by published opinion. Judge Thacker wrote the opinion, in which Judge Niemeyer and Judge Duncan joined. ARGUED: John Peter Malloy, ROBINSON & COLE LLP, Hartford, Connecticut, for Appellants. Harold Edward Johnson, WILLIAMS MULLEN, Richmond, Virginia, for Appellee. ON BRIEF: Thomas S. Garrett, HARMAN CLAYTOR CORRIGAN & WELLMAN, Richmond, Virginia; Wystan M. Ackerman, ROBINSON & COLE LLP, Hartford, Connecticut, for Appellants. Calvin W. Fowler, Jr., WILLIAMS MULLEN, Richmond, Virginia, for Appellee. THACKER, Circuit Judge: In November 2012, Janet Jenkins sued Liberty University, Inc. (“Appellee”), alleging that the school participated -- both directly and vicariously -- in a scheme to kidnap Jenkins’s daughter in order to disrupt the parent-child relationship. In her complaint (“Jenkins Complaint”), Jenkins alleged that Appellee and its agents helped Lisa Miller, the child’s biological mother and Jenkins’ former partner in a same- sex civil union, to defy state court visitation orders and to abscond with the child to Nicaragua. The district court ruled that Citizens Insurance Company of America (“Appellant”), Appellee’s liability insurance carrier, has a duty to defend Appellee. Under the insurance policy at issue, Appellant must defend Appellee against suits alleging certain harms that arise from an “occurrence” -- an unexpected accident, which does not fall under any of the coverage exclusions.
    [Show full text]
  • PENAL CODE (Act No.45 of 1907)
    この刑法の翻訳は、平成十八年法律第三六号までの改正(平成18年5月28日施行) について、」 「法令用語日英標準対訳辞書 (平成18年3月版)に準拠して作成したもので す。 なお、この法令の翻訳は公定訳ではありません。法的効力を有するのは日本語の法令自 体であり、翻訳はあくまでその理解を助けるための参考資料です。この翻訳の利用に伴っ て発生した問題について、一切の責任を負いかねますので、法律上の問題に関しては、官 報に掲載された日本語の法令を参照してください。 This English translation of the Penal Code has been prepared (up to the revisions of Act No. 36 of 2006(Effective May 28, 2006)) in compliance with the Standard Bilingual Dictionary (March 2006 edition). This is an unofficial translation. Only the original Japanese texts of laws and regulations have legal effect, and the translations are to be used solely as reference material to aid in the understanding of Japanese laws and regulations. The Government of Japan shall not be responsible for the accuracy, reliability or currency of the legislative material provided in this Website, or for any consequence resulting from use of the information in this Website. For all purposes of interpreting and applying law to any legal issue or dispute, users should consult the original Japanese texts published in the Official Gazette. PENAL CODE (Act No.45 of 1907) PART I. GENERAL PROVISIONS Chapter I. Scope of Application Article 1. (Crimes Committed within Japan) (1) This Code shall apply to anyone who commits a crime within the territory of Japan. (2) The same shall apply to anyone who commits a crime on board a Japanese vessel or aircraft outside the territory of Japan. Article 2. (Crimes Committed outside Japan) This Code shall apply to anyone who commits one of the following crimes outside the territory of Japan: (i)
    [Show full text]
  • Tool 3.3 Other Offences Related to Trafficking in Persons
    112 Toolkit to Combat Trafficking in Persons Tool 3.3 Other offences related to trafficking in persons Overview This tool discusses the criminal acts related to trafficking in persons. Many States have also criminalized much of the conduct related to human trafficking. Most States have laws criminalizing abduction, illegal sequestration and kidnapping in general. These acts constitute criminal offences in most States and could be invoked to address certain elements of the full range of crimes involved in trafficking. Crimes linked to trafficking in persons Trafficking in persons should be understood as a process rather than as a single offence. It begins with the abduction or recruitment of a person and continues with the transporta - tion and entry of the individual into another location. This is followed by the exploitation phase, during which the victim is forced into sexual or labour servitude or other forms of exploitation. A further phase may occur, which does not involve the victim but rather the offender. Depending upon the size and sophistication of the trafficking operation, the criminal (organization) may find it necessary to launder the proceeds of crime. During the trafficking process, the offenders usually perpetrate a number of different offences. There may be linkages between trafficking operations and other criminal offences such as the smuggling of weapons or drugs. Offences are also committed in furtherance or protection of the human trafficking operation. Other crimes, such as money-laundering and tax evasion, are secondary, but essential to protect the illicit proceeds of the trafficking activity. A typology can be created to further understanding of the nature of the offences related to the trafficking process.
    [Show full text]
  • Mens Rea for Sexual Abuse: the Ac Se for Defining the Acceptable Risk Eric A
    Journal of Criminal Law and Criminology Volume 99 Article 1 Issue 1 Fall Fall 2008 Mens Rea for Sexual Abuse: The aC se for Defining the Acceptable Risk Eric A. Johnson Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Eric A. Johnson, Mens Rea for Sexual Abuse: The asC e for Defining the Acceptable Risk, 99 J. Crim. L. & Criminology 1 (2008-2009) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/09/990 1-0001 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 99, No. I Copyright © 2009 by Northwestern University, School of Law Primed mnU.S.A. CRIMINAL LAW MENS REA FOR SEXUAL ABUSE: THE CASE FOR DEFINING THE ACCEPTABLE RISK ERIC A. JOHNSON* The persistence of strict criminal liability for child sexual abuse is attributable, at least in part, to the shortcomings of the existing alternatives, namely, the recklessness and criminal negligence standards. These two standards requirejuries to define the acceptable level of risk on a case-by-case basis. Juries are ill-equipped to make this calculation in sexual abuse cases, however, and their efforts to do so almost invariably are skewed by evidence of the victim's unchastity. This Article first explores the shortcomings of the recklessness and criminal negligence standards in this setting, and then attempts to develop a viable alternative.
    [Show full text]