Community Policing: Immigration

Total Page:16

File Type:pdf, Size:1020Kb

Community Policing: Immigration Law Enforcement Executive FORUM Community Policing: Immigration November 2007 Law Enforcement Executive Forum Illinois Law Enforcement Training and Standards Board Executive Institute Western Illinois University 1 University Circle Macomb, IL 61455-1390 Senior Editor Thomas J. Jurkanin, PhD Editor Vladimir A. Sergevnin, PhD Associate Editors Jennifer Allen, PhD Department of Law Enforcement and Justice Administration, Western Illinois University Barry Anderson, JD Department of Law Enforcement and Justice Administration, Western Illinois University Tony Barringer, EdD Division of Justice Studies, Florida Gulf Coast University Lewis Bender, PhD Department of Public Administration and Policy Analysis, Southern Illinois University at Edwardsville Michael Bolton, PhD Chair, Department of Criminal Justice and Sociology, Marymount University Dennis Bowman, PhD Department of Law Enforcement and Justice Administration, Western Illinois University Becky K. da Cruz Criminal Justice and Law and Society, Armstrong Atlantic State University Jose de Arimateia da Cruz Political Science and Comparative Politics, Armstrong Atlantic State University Weysan Dun Special Agent-in-Charge, FBI, New York Division Kenneth Durkin, MD Department of Law Enforcement and Justice Administration, Western Illinois University Larry Hoover, PhD Director, Police Research Center, Sam Houston State University William Lewinski, PhD Director, Force Science Research Center, Minnesota State University William McCamey, PhD Department of Law Enforcement and Justice Administration, Western Illinois University John Millner State Senator of 28th District, Illinois General Assembly Stephen A. Morreale, DPA School of Public Policy and Administration/Criminal Justice, Walden University Gregory Boyce Morrison Department of Criminal Justice and Criminology, Ball State University Michael J. Palmiotto Wichita State University Law Enforcement Executive Forum • 2007 • 7(7) Associate Editors (cont.) Gene L. Scaramella, PhD Dean of Graduate Studies, Ellis College of New York Institute of Technology Wayne Schmidt Director, Americans for Effective Law Enforcement Editorial Production Document and Publication Services, Western Illinois University, Macomb, Illinois Production Assistant Linda Brines The Law Enforcement Executive Forum is published six times per year by the Illinois Law Enforcement Training and Standards Board Executive Institute located at Western Illinois University in Macomb, Illinois. Subscription: $40 (see last page) ISSN 1552-9908 No part of this publication may be reproduced without written permission of the publisher. Disclaimer Reasonable effort has been made to make the articles herein accurate and consistent. Please address questions about individual articles to their respective author(s). Law Enforcement Executive Forum • 2007 • 7(7) Table of Contents Editorial .................................................................................................................. i Vladimir A. Sergevnin Immigration Immigrant Women, Domestic Violence, and Community Policing ........... 1 Edna Erez Julie L. Globokar Immigration Enforcement by Local and State Police: The Impact on Latinos ....................................................................................... 15 Michele Waslin Immigration Policy and Law in the Post-9/11 Era: A Study of Civil and Human Rights Concerns ............................................ 33 Deena Anders Jasna Burza Carrie Coslin Paul Kresser Eleni Messiou Selena Nelson-Salcedo Amy T. Morris Megan Pidduck Kathryn Sharpe Kelly Sowards Opot Lisa Wissbaum Grappling with Ambiguities in a Police and Immigrant Encounter in Finland ......................................................................................... 59 Egharevba Stephen New Technology and Technical Efficiency License Plate Recognition (LPR) Technology: Practical and Legal Issues for Police Implementation ......................................................... 93 Ross Wolf Arthur Gordon Cluster Efficiency Analysis and the Effects of the Operating Environment on the Technical Efficiency of Police Organizations in the State of Florida ........................................................................................ 101 Jeffrey W. Goltz The Diversion of Prescription Opioid Analgesics ......................................... 127 James A. Inciardi Hilary L. Surratt Yamilka Lugo Theodore J. Cicero Law Enforcement Executive Forum • 2007 • 7(7) Crime Peripatetic Blame: Crime Guilt Attribution in the Fiction of Nelson Algren ................................................................................................ 143 Peter J. Puleo Surviving Firearm Assaults at Domestic Violence Calls .............................. 155 Richard R. Johnson Terrorism and Risk Assessment How to Assess Contemporary Security Risks from Worst-Case Scenario to Risk Prioritization ................................................... 169 Ophir Falk Lior Lotan Bioterrorism Preparedness: The Ideal Models of Preparedness: What Does It Take to Be Prepared? ...................................... 175 Fee F. Habtes Materials/publications are available through the Illinois Law Enforcement Training and Standards Board Executive Institute. Law Enforcement Executive Forum • 2007 • 7(7) Editorial Single mother Elvira Arellano arrived in the United States illegally in 1997 with many hopes of reaching her American dream. She was deported to Mexico shortly afterward but returned and settled in Chicago in 2000, taking a job cleaning planes at O’Hare International Airport. She was arrested in 2002 at O’Hare and convicted of working under fraudulent documents. She sought refuge at a church and did not leave its property until she decided to travel by car to Los Angeles to speak at a rally where she was arrested again and deported. There are thousands of similar cases of intertwined issues of immigration, law enforcement, and human rights every year, and the numbers are going up. The Elvira Arellano case clearly demonstrates the increasing political component to immigration, complicating law-enforcement response and increasing the probability of misunderstandings in the community. For the nation that has been formed by and has benefited more from migration than any other country around the globe, there is no surprise that this issue is under political scrutiny. James Madison, in his speech at the Federal Convention of August 13, 1787, made an accurate observation that “America was indebted to immigration for her settlement and prosperity. That part of America which had encouraged them most had advanced most rapidly in population, agriculture and the arts.” A complicated law enforcement response to the immigrant community is not new in the history of the criminal justice system. For decades and decades, police officers have been challenged to embrace the cultures and perspectives of the growing immigrant communities within their jurisdictions. Today, the scale, diversity, and highly dynamic trends in immigrant populations with multiple cultures, languages, and often negative perspectives in regards to the police present local law enforcement with new, critical, and comprehensive tasks. Although local law enforcement focuses on developing effective and positive interactions with immigrant communities, the complexity of each new wave of overseas populations presents significant obstacles and should be addressed. Even more challenging are the attempts by police to find ways of collaborating with and assisting illegal immigrants, whose numbers are unknown, and to find the budgetary means, which are often underestimated, to accomplish these attempts. Complexity multiplies when an illegal immigrant is the victim of a crime, and local police must deal with immigration issues along with the crime itself. A significant presence of illegal immigrants automatically increases latent and unreported crime in the community. This issue of the Forum focuses on immigration and the related problems confronting local, state, and federal law enforcement agencies within the U.S. and in many nations throughout the world. This collection of articles provides an overview of the topics surrounding immigration, both legal and illegal; presents valuable information on the current resources available to law enforcement; and examines the concerns and obstacles that currently surround the discussion over immigration enforcement by the law enforcement community. It is our hope that this collection of articles will prove to be a useful tool for all readers. Vladimir A. Sergevnin, PhD Editor Law Enforcement Executive Forum Law Enforcement Executive Forum • 2007 • 7(7) i Immigrant Women, Domestic Violence, and Community Policing1 Edna Erez, Professor and head, Criminal Justice Department, University of Illinois at Chicago Julie L. Globokar, Academic Chair, Kaplan University A central goal now held by most United States law enforcement agencies is the development of a collaborative relationship with the community members they serve. Heavy emphasis is placed on fostering bonds of trust and cooperation in the implementation of community policing initiatives. As the United States population continues to diversify, law enforcement personnel find themselves working to develop partnerships with members of immigrant communities. While some studies have shown that immigrants hold more favorable views of the police than native-born residents (Davis & Hendricks, 2007), immigrants may be hesitant to work with the police due to mistrust, language
Recommended publications
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Css241 Course Title: Basic Security and Security Threats
    CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE :CSS241 COURSE TITLE: BASIC SECURITY AND SECURITY THREATS 1 CSS 241 BASIC SECURITY AND SECURITY THREATS COURSE GUIDE CSS241 BASIC SECURITY AND SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Rasidi Okunola, Ph. D Department of Sociology University of Ibadan Oyo State Course Coordinator Adeniyi T. Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria 2 CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction……………………………………..………....i-ii What You Will Learn in this Course ...................................ii Course Aims…………………………………………..... ..ii-iii Course Objectives……………………………………… …iii-iv Working through this Course ...............................................iv Course Materials……………………………….………. …v 3 CSS 241 BASIC SECURITY AND SECURITY THREATS Study Units…………………………………….………. …v-vi Textbooks and References…………….……….……… ….vi-vii Assignment File ………………………………………. ….vii Assessment ………………………………….………. ……viii Tutor-Marked Assignment……………………………. …..viii Final Examination and Grading…………………..……. …viii Course Marking Scheme ………………………………. …viii Course Overview ………………………………………. …viii-ix Presentation Schedule …………………………………. …x How to Get the Most from this Course ……………………x Reading Section.....................................................................x-xi Facilitators/Tutors and Tutorials ……………………….
    [Show full text]
  • E-Crime & Cybersecurity Benelux 2018
    6th December 2018 Amsterdam, The Netherlands Transparency plus transformation: the cybersecurity rubicon Welcome to e-Crime th 6 December 2018 & Cybersecurity Novotel Amsterdam City Benelux 2018 s business moves increasingly to digital 3 Security resilience in the face of evolving channels across Europe, fraud attempts and attacker tradecraft Aother cyber-enabled economic crime are rising Stories from the cyber battlefield. sharply. And recent research has shown that as well CrowdStrike as increasing volumes, there has been an evolution from short, isolated peaks of fraud attacks to more 5 Weighing your threat intelligence options sustained, high-volume attacks across a number of If your organisation is looking to make an days or even weeks. investment in threat intelligence, you’ll need to evaluate what different vendors deliver, how In addition, digital transformation is moving they align with your objectives, and the increasingly to mobile, rather than desktop online, advantage they’ll bring to your security strategy. channels. In Europe, 58% of all transactions now Recorded Future come from mobile devices and growth is accelerating. 7 To understand phishing, look at crimes of These trends pose a huge challenge for business and the past for cybersecurity professionals. Businesses need to Phishing is a modern problem but its roots go go digital and to make digital channels as seamless back hundreds of years. as possible for their customers. But they also need to Cofense keep those transactions, and their customers’ personal data, secure. Cybersecurity is therefore a 11 Voice and the future of personal identification strategic business imperative. Despite the more general upward trend of data breaches and sophisticated cross-channel attacks, It is these topics, and more, that we will be discussing businesses have mostly remained stagnant when th at our 8 annual e-Crime & Cybersecurity Benelux as approaching phone channel security.
    [Show full text]
  • Learning Goals Contained in the POST Basic Course Performance Objective Document
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. >. j i . I . .. , BASIC COURSE UNIT GUIDE ( __9 _) , . [~ _________________C_R_I_M_E_S __ A_G_A_I_N_S_T __ P_R_O_P_E_R_T_Y __ ________________-'J This unit guide covers the following learning goals contained in the POST Basic Course performance objective document: 3.9.0 Theft Law 3.11.0 Embezzlement Law 3.12.0 Forgery/Fraud Law 3.13.0 Burglary Law r 3.14.0 Receiving Stolen Property Law 3.15.0 Malicious Mischief Law •• 3.16.0 Arson Law Revised October 1990 THE COMMISSION ,dJ ON PEACE OFfiCER STANDARDS AND TRA./INING . • • 0 • STATEOf~ALlFORNJA ., 131385 U.S. Department of Justice Netlonellnstltute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of • Justice. Permission to reproduce this copyrighted material in mi­ crofiche only has been granted by California Commission on Peace Officer 8tanoards and Trainina to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permis· sion of the copyright owner. This unit of instruction is designed as a guideline for Performance Objective-based law enforcement basic training. This unit is part of the POST Basic Course Guidelines system developed by California law enforcement trainers and criminal justice . • educators for the California Commission on Peace Officer Standards and Training. This Guide is designed to assist the instructor in developing an appropriate lesson plan to cover the performance objectives, which are required as minimum content of the Basic Course .
    [Show full text]
  • DATCP 2015 Cyber Security Awareness Month Daily Tips
    DATCP 2015 Cyber Security Awareness Month Daily Tips Thursday, 10/1. Fresh start for the month – change your passwords frequently Cyber Security Awareness Month, Tip #1: New month…new passwords It’s the first of the month! Change your online passwords today and use a long combination of numbers, letters and special characters. For best protection, do this on a regular basis, and keep a totally different password for your email. Why? You’ll find out here tomorrow! #CyberAware Friday, 10/2. Protect your email account Cyber Security Awareness Month, Tip #2: Protect your email account Remember yesterday when we said to use a completely different password style for your email versus what you use for your other online accounts? Many websites send password update and account access emails to consumers, so getting a hold of these emails could potentially give a hacker access to all of your online accounts. Your email password should be the toughest to decode. #CyberAware Saturday, 10/3. Run a free computer security check Cyber Security Awareness Month, Tip #3: Run a free computer security check Happy Saturday! Start out CSAMonth with a clean sweep of your computer system. At the end of the month, sweep it again and make a plan to do so regularly. StaySafeOnline.org has a listing of free, trusted security check services here: https://www.staysafeonline.org/sta…/free-security-check-ups/. #CyberAware Sunday, 10/4. Backup your contacts, photos, videos, music, documents and more Cyber Security Awareness Month, Tip #4: Backup, backup, backup Halloween is scary. But do you know what's scarier? Losing all of your important files and your collection of photos, music and videos.
    [Show full text]
  • 145626NCJRS.Pdf
    If you have issues viewing or accessing this file contact us at NCJRS.gov. BASIC COURSE INSTRUCTOR UNIT GUIDE (_-.;:6::.....-) C~ C_R_I_M_E_S_A_G_A_IN_S_T_P_R_O_P_ER_TY___________ ) _________ 145626 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been g~~~i¥ornia commission on Peace OffJ.cer standards & TraJ.nJ.ng to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. • The curricula contained in this document is de$igned as a guideline for the delivery of performance-based law enforcement training, It is part of the POST Basic Course guidelines system developed by California law enforcement trainers and criminal justice educators in cooperation with the California Commission on Peace Officer Standards and Training. The training specifications referenced herein express the •• required minimum content of this domain, .,' • 1· ______ _ II UNIT GUIDE 6 • TABLE OF CONTENTS LEARNING DOMAIN 6 Crimes Against Property Page Knowledge Domain 6 (POSTRAC·tested) 3.9.1 Theft ... , . 1 3.9.2 Defrauding an Innkeeper ........................... 9 3.9.3 Appropriation of Lost Property ........................ 11 3.11.1 Embezzlement .................................. 13 3.12.1 Forgery. 15 3.12.2 Fraud ........... '. 17 3.13.1 Unauthorized Entry of Property ...................... 19 3.13.2 Burglary ....................................... 21 • 3.13.4 Possession of Burglary Tool$ .
    [Show full text]
  • White-Collar Crime White-Collar Crime the Classic Statement
    WHITE-COLLAR CRIME WHITE-COLLAR CRIME THE CLASSIC STATEMENT • White-collar crime: crime committed by those within legitimate occupations or organizations. • The concept of white-collar crime was first introduced in the social sciences by Edwin Sutherland in 1939. • He described white-collar crime as “a crime committed by a person of respectability and high social status in the course of his occupation”. • Sutherland’s investigation using records of regulatory agencies, courts, and commissions found that of the 70 largest industrial and mercantile corporations studied over a 40-year period, every one violated at least one law and had an adverse decision made against it for false advertising, patent abuse, wartime trade violations, price fixing, fraud, or the intended sale of faulty goods. WHITE-COLLAR CRIME THE CLASSIC STATEMENT • According to Sutherland (1949), while “crime in the streets” attracts headlines and police attention, the extensive and far more costly “crime in the suites” proceeds relatively unnoticed. • White-collar crimes cost several times more than other crimes put together but in most cases, they are not treated under the criminal law. • White-collar crime differs from lower-class criminality only in the implementation of criminal law that segregates white-collar criminals administratively from other criminals (Sutherland, 1949). • The status of the offender rather than the legal uniqueness of the crime is most important. WHITE-COLLAR CRIME RELATED CONCEPTS • In 1907, Ross coined the term “criminaloids” to refer to those who prospered by shameful practices which may not yet come under the ban of public opinion. • Ross viewed offenders as morally insensible and concerned with success but not with the proper means of achieving it.
    [Show full text]
  • Investment Swindles and Con Schemes
    INVESTMENT SWINDLES AND CON SCHEMES GLOBAL HEADQUARTERS • THE GREGOR BUiLDinG 716 WEST AvE • AUSTin, TX 78701-2727 • USA INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Video ...................................................................................................................................................................... 4 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 5 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ..............................................................................................................................................................
    [Show full text]
  • Priority Development Assistance Fund Scam
    Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million
    [Show full text]
  • Confidence Trick
    Confidence trick A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, and greed. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men') at the expense of their victims (the 'marks')".[1] Political cartoon by JM Staniforth: Herbert Kitchener attempts to raise Contents £100,000 for a college in Sudan by calling on the name of Charles Terminology George Gordon Short and long cons Stages of the con Vulnerability factors See also In films Further reading External links References Terminology Synonyms include con, confidence game, confidence scheme, ripoff, scam, and stratagem. The perpetrator of a confidence trick (or "con trick") is often referred to as a confidence (or "con") man, con-artist, or a "grifter". Samuel Thompson (1821–1856) was the original "confidence man". Thompson was a clumsy swindler who asked his victims to express confidence in him by giving him money or their watch rather than gaining their confidence in a more nuanced way. A few people trusted Thompson with their money and watches.[2] Thompson was arrested in July 1849. Reporting about this arrest, Dr. James Houston, a reporter of the New York Herald, publicized Thompson by naming him the "Confidence Man".[2] Although Thompson was an unsuccessful scammer, he gained the reputation as a genius operator mostly because Houston's satirical tone wasn't understood as such.[2] The National Police Gazette coined the term "confidence game" a few weeks after Houston first used the name "confidence man".[2] A confidence trick is also known as a con game, a con, a scam, a grift, a hustle, a bunko (or bunco), a swindle, a flimflam, a gaffle, or a bamboozle.
    [Show full text]