Phd Thesis Final1

Total Page:16

File Type:pdf, Size:1020Kb

Phd Thesis Final1 Understanding Career Criminal Kidnapping: A study of offending dynamics, subcultural tolerance and policing in Malaysia MOHD KASSIM NOOR MOHAMED A thesis submitted in partial fulfilment of the requirements of Nottingham Trent University for the degree of Doctor of Philosophy September 2010 © “This work is the intellectual property of the author. You may copy 5 per cent of this work for private study, or personal, non-commercial research. Any re-use of the information contained within this document should be fully referenced, quoting the author, title, university, degree level and pagination. Queries or requests for any other use, or if a more substantial copy is required, should be directed in the owner of the Intellectual Property Rights.” Understanding Career Criminal Kidnapping PhD __________________________________________________________________________ Abstract I subscribe to the notion that criminology needs to seek information about crime from successful criminals. Alohan is a Malaysian, ethnic Chinese, Triad member, businessman and police informer who also kidnaps people for ransom. He is a serious offender who has, so far, escaped conviction for kidnap, which is a capital offence in Malaysia. This thesis seeks to understand the factors underpinning Alohan’s lengthy and apparently successful criminal career but is subject to methodological constraints imposed by ethical and safety concerns. With methods such as participant observation ruled out, the research is based on a series of life history, narrative interviews, conducted with Alohan in a secure location. These are supplemented by semi- structured interviews with: officers from Royal Malaysian Customs; officers from the Specialist Police Kidnap Unit of the Royal Malaysian Police, and ethnic Chinese businessmen. Alohan provides an account that can be examined and compared against influential strands of criminological thought in such areas as criminal careers, cultural criminology, subcultural tolerance of deviance and techniques of neutralisation. Alohan’s story reveals the highly culturally specific nature of most influential criminological theorising, which has almost exclusively been generated from a ‘western’ perspective. It uncovers the need for more comparative research in order to fill gaps and correct faulty assumptions that have arisen from the fairly narrow world-view that currently informs the field. _____________________________________________________________________________________________ Mohd Kassim Noor Mohamed Page 3 2010 Understanding Career Criminal Kidnapping PhD __________________________________________________________________________ Acknowledgements This thesis was completed with kind help from many people. First, I acknowledge the great debt owed to my Director of Studies, Dr. Mike Sutton, whose positive criticism, instructive insights, patience, friendship and kindly shoulder were critical. I am also grateful to my second and third supervisors Professor Nick Tilley and Mr Michael Ahearne for their valuable input. Thank you to Nottingham Trent University for awarding me the Vice- chancellor’s bursary – I would not have been able to undertake PhD study without this financial support. The staff of the Graduate School deserve special mention, including Sandra Odell, Sarah Troy-Brown and Rachel Cicinski for their practical help throughout and Professor Matt Henn for the confidence he has always shown in me – I hope this has been justified. The motivation provided by both my Malaysia and UK families is inestimable. Mak, thank you for the all the ways in which, throughout my life, you have encouraged me to realise my potential. Boy, Shiz and Nadheera, thank you for being so patient and understanding even when being without Dad was hard. To Ruby, never underestimate how much I appreciate your sacrifice and hard work in juggling the finances and holding the family fort. Anei, Dad and Sheila - thank you, too, for showing your support in ways too numerous to mention. No list of credits would be complete without the person who stood by me every second of the way and without whom this thesis could never have been completed – my editor-in-chief, wife and best friend, Jayne. Finally, my deep gratitude goes to my research participants: the officers from Royal Malaysian Police and Royal Malaysian Customs, for their hospitality and generous contribution and, of course, Alohan – this is your story. _____________________________________________________________________________________________ Mohd Kassim Noor Mohamed Page 4 2010 Understanding Career Criminal Kidnapping PhD __________________________________________________________________________ Contents Abstract ............................................................................................................ 3 Acknowledgements .......................................................................................... 4 Contents .......................................................................................................... 5 List of Figures .................................................................................................. 9 List of Abbreviations ....................................................................................... 10 1 Introduction ............................................................................................. 11 1.1 The Crime of Kidnap ..................................................................... 12 1.2 Criminal Careers ........................................................................... 18 1.3 Cultural Criminology ...................................................................... 18 1.4 Subculture and Subcultural Tolerance of Deviance ...................... 19 1.5 Rationalisations and Justifications ................................................ 21 1.6 Methods ........................................................................................ 22 1.7 Research Questions ...................................................................... 23 1.8 Structure of the Thesis .................................................................. 24 2 Methodology ........................................................................................... 26 2.1 Methodological Framework ........................................................... 27 2.2 A First-Person Narrative ................................................................ 30 2.3 Research Participants ................................................................... 30 2.4 Access .......................................................................................... 32 2.4.1 Alohan ............................................................................ 32 2.4.2 Specialist Police Kidnap Unit .......................................... 34 2.4.3 Customs Officers ............................................................ 35 2.4.4 Others ............................................................................ 37 2.5 Understanding Narrative Research ............................................... 38 2.6 Interview Styles used in Narrative Research ................................. 41 2.7 Life-history Interviewing in Practice ............................................... 43 2.8 Corroboratory Interviews ............................................................... 46 2.9 Quality Control .............................................................................. 48 2.10 Data Processing ............................................................................ 50 2.11 Data Analysis ................................................................................ 54 2.12 Ethical Standards .......................................................................... 57 _____________________________________________________________________________________________ Mohd Kassim Noor Mohamed Page 5 2010 Understanding Career Criminal Kidnapping PhD __________________________________________________________________________ 2.12.1 Informed Consent and The Balance of Power ................ 58 2.12.2 Researcher Safety .......................................................... 65 2.12.3 Harm to Research Participants ...................................... 70 2.12.4 Psychological Harm to Participants ................................ 71 2.12.5 Arrest .............................................................................. 73 2.12.6 Other Physical Harm ...................................................... 77 2.12.7 Other Concerns Around Anonymity and Confidentiality . 78 2.12.8 Appearing to Endorse or Encourage Criminal Behaviour ....................................................................... 79 2.12.9 The Rights to a Life ........................................................ 81 2.12.10 Insider versus Outsider .................................................. 82 2.12.11 Other Ethical Business ................................................... 83 2.13 Chapter Summary ......................................................................... 84 3 Understanding Kidnap and Abduction .................................................... 85 3.1 Introduction ................................................................................... 85 3.2 Kidnapping in History .................................................................... 88 3.3 Defining Kidnap and Abduction ..................................................... 90 3.4 ‘Western’ Definitions of Kidnap and Abduction ............................. 91 3.5 Malaysian Definitions of Kidnap and
Recommended publications
  • The Comment, October 29, 1981
    Bridgewater State University Virtual Commons - Bridgewater State University The ommeC nt Campus Journals and Publications 1981 The ommeC nt, October 29, 1981 Bridgewater State College Volume 55 Number 17 Recommended Citation Bridgewater State College. (1981). The Comment, October 29, 1981. 55(17). Retrieved from: http://vc.bridgew.edu/comment/491 This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. l I l -j THE COM ENT i Dear Joe, page· 3 Triumph! page 7 Vol. LV, Issue 17 Bridgewater State College October 29, 1981 Bridgewater Junior Saves Life of Friend by Michael Ricciardi Joseph Cifello is a police officer the woman from· choking. Joseph for the town of Rockland. He is also knew that this was only driving the in his junior year at BSC. Last choking material farther into her Thurs, Oct 22, Mr. Cifello was one throat. After what seemed like of forty honored guests at a banquet hours Cifello, pushing the chef out sponsored by the American Blue of the way, tried three times unsuc­ Cross, Blue Shield. He and the cessfully to dislodge the food from other 39 guests personally received her throat. On the fourth try he suc­ .awards from Dr. Henry Hiemlech, ceeded in dislodging the food from inventor of a first aid maneuver the woman's throat. It was not until known as the "Hiemlich hug". some time later that Joseph fully It all began some four years ago realized what he had done. "When I when Mr. Cifello was at home got home it hit me:.1 had saved a watching a morning talk show.
    [Show full text]
  • Global Kidnap for Ransom Report
    GLOBAL SUMMARY FOCUS ARTICLE STABILISATION IN THE HORN OF AFRICA July 2020 REPORT WWW.CONSTELLIS.COM July 2020 REPORT TABLE OF EXECUTIVE SUMMARY CONTENTS SUMMARY This issue of Constellis’ Kidnap for Ransom the geopolitical tensions surrounding the eastern GLOBAL OVERVIEW .....................................................................................................03 Insight Report covers global kidnapping incidents giant. While several countries are attempting to and trends for the months of May, June and July bolster their defences, a number of cyberattacks Americas ......................................................................................................................03 2020. The information is derived from multi-source traced to China have already occurred, including analysis of kidnap for ransom activity and where attacks against governments, businesses and Europe ..........................................................................................................................05 known, the outcome or resolution of the events. The critical infrastructure. With relations not showing any Middle East ..................................................................................................................07 report covers current kidnap for ransom hotspots signs of improvement, no let-up in malicious Chinese at regional, national and provincial levels, with a cyber activity is anticipated in the near future. Africa ............................................................................................................................09
    [Show full text]
  • The General Stud Book : Containing Pedigrees of Race Horses, &C
    ^--v ''*4# ^^^j^ r- "^. Digitized by tine Internet Arciiive in 2009 witii funding from Lyrasis IVIembers and Sloan Foundation http://www.archive.org/details/generalstudbookc02fair THE GENERAL STUD BOOK VOL. II. : THE deiterol STUD BOOK, CONTAINING PEDIGREES OF RACE HORSES, &C. &-C. From the earliest Accounts to the Year 1831. inclusice. ITS FOUR VOLUMES. VOL. II. Brussels PRINTED FOR MELINE, CANS A.ND C"., EOILEVARD DE WATERLOO, Zi. M DCCC XXXIX. MR V. un:ve PREFACE TO THE FIRST EDITION. To assist in the detection of spurious and the correction of inaccu- rate pedigrees, is one of the purposes of the present publication, in which respect the first Volume has been of acknowledged utility. The two together, it is hoped, will form a comprehensive and tole- rably correct Register of Pedigrees. It will be observed that some of the Mares which appeared in the last Supplement (whereof this is a republication and continua- tion) stand as they did there, i. e. without any additions to their produce since 1813 or 1814. — It has been ascertained that several of them were about that time sold by public auction, and as all attempts to trace them have failed, the probability is that they have either been converted to some other use, or been sent abroad. If any proof were wanting of the superiority of the English breed of horses over that of every other country, it might be found in the avidity with which they are sought by Foreigners. The exportation of them to Russia, France, Germany, etc. for the last five years has been so considerable, as to render it an object of some importance in a commercial point of view.
    [Show full text]
  • San José Studies, Winter 1981
    San Jose State University SJSU ScholarWorks San José Studies, 1980s San José Studies Winter 1-1-1981 San José Studies, Winter 1981 San José State University Foundation Follow this and additional works at: https://scholarworks.sjsu.edu/sanjosestudies_80s Recommended Citation San José State University Foundation, "San José Studies, Winter 1981" (1981). San José Studies, 1980s. 4. https://scholarworks.sjsu.edu/sanjosestudies_80s/4 This Journal is brought to you for free and open access by the San José Studies at SJSU ScholarWorks. It has been accepted for inclusion in San José Studies, 1980s by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. s~Ian~s ~sor Nvs SAN JOSE Volume VII, Number 1 ARTICLES The Stalin Resolutions and the Road to World War II Milton Loventhal and Jennifer McDowell ................................. 6 Comrade J. V. Stalin's key reports to the Politburo Warfare in England, 1156-1250 John Marshall Carter ................................................. 40 The thirteenth century rejuvenation in military ideas Angi~American Exclusion of Mexico from the League of Nations Louis Bisceglia ...................................................... 88 The efforts of international diplomacy to affect the Mexican Revolution FICTION Family Secrets Frances Goldwater................................................... 72 Keeping those skeletons in the safe STUDIES February 1981 POETRY David Citino Letters from the Shaman The Couvade ..................................................
    [Show full text]
  • 16. Humanities-Challenges of Hostage-Taking and Kidnapping
    IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN(E): 2321-8878; ISSN(P): 2347-4564 Vol. 2, Issue 6, Jun 2014, 131-142 © Impact Journals CHALLENGES OF HOSTAGE-TAKING AND KIDNAPPING IN THE SOUTH EASTERN NIGERIA PROTUS NATHAN UZORMA 1 & JOHN NWANEGBO-BEN 2 1University of Uyo, Akwa Ibom, Nigeria 2Federal University of Technology, Owerri, Imo State, Nigeria ABSTRACT Before now, hostage-taking and kidnapping have existed in varied forms and for varied reasons in Nigeria. But they were not known to be among the business ventures Nigerians are known for. However today, they have become a big industry and a steady source of income for many, particularly in the South-East. The duo crimes thrive almost in the entire neighbourhood in this region and the adjoining states. Many residents know the traders, where they operate, but watch helplessly as the culture of the area seems to consider any criminal venture that yields wealth to their citizens as “business,” especially if the criminal operates in areas far from home. What are the reasons behind this illicit business? Why and how are they flourishing in this region? Who are the perpetrators of the crime? What are their effects in the country? What is the Nigeria Police Force doing about it? These and many more form the fulcrum of this discussion. KEYWORDS: Peculiar Crime, Kidnapping, National Agencies INTRODUCTION The Phenomenon of Hostage-Taking and Kidnapping Hostage taking and Kidnapping are among the terrorising crimes in Nigeria. They are mostly common in the southern part of the country (South-South, South-East and South-West).
    [Show full text]
  • Pedigree of the Wilson Family N O P
    Pedigree of the Wilson Family N O P Namur** . NOP-1 Pegonitissa . NOP-203 Namur** . NOP-6 Pelaez** . NOP-205 Nantes** . NOP-10 Pembridge . NOP-208 Naples** . NOP-13 Peninton . NOP-210 Naples*** . NOP-16 Penthievre**. NOP-212 Narbonne** . NOP-27 Peplesham . NOP-217 Navarre*** . NOP-30 Perche** . NOP-220 Navarre*** . NOP-40 Percy** . NOP-224 Neuchatel** . NOP-51 Percy** . NOP-236 Neufmarche** . NOP-55 Periton . NOP-244 Nevers**. NOP-66 Pershale . NOP-246 Nevil . NOP-68 Pettendorf* . NOP-248 Neville** . NOP-70 Peverel . NOP-251 Neville** . NOP-78 Peverel . NOP-253 Noel* . NOP-84 Peverel . NOP-255 Nordmark . NOP-89 Pichard . NOP-257 Normandy** . NOP-92 Picot . NOP-259 Northeim**. NOP-96 Picquigny . NOP-261 Northumberland/Northumbria** . NOP-100 Pierrepont . NOP-263 Norton . NOP-103 Pigot . NOP-266 Norwood** . NOP-105 Plaiz . NOP-268 Nottingham . NOP-112 Plantagenet*** . NOP-270 Noyers** . NOP-114 Plantagenet** . NOP-288 Nullenburg . NOP-117 Plessis . NOP-295 Nunwicke . NOP-119 Poland*** . NOP-297 Olafsdotter*** . NOP-121 Pole*** . NOP-356 Olofsdottir*** . NOP-142 Pollington . NOP-360 O’Neill*** . NOP-148 Polotsk** . NOP-363 Orleans*** . NOP-153 Ponthieu . NOP-366 Orreby . NOP-157 Porhoet** . NOP-368 Osborn . NOP-160 Port . NOP-372 Ostmark** . NOP-163 Port* . NOP-374 O’Toole*** . NOP-166 Portugal*** . NOP-376 Ovequiz . NOP-173 Poynings . NOP-387 Oviedo* . NOP-175 Prendergast** . NOP-390 Oxton . NOP-178 Prescott . NOP-394 Pamplona . NOP-180 Preuilly . NOP-396 Pantolph . NOP-183 Provence*** . NOP-398 Paris*** . NOP-185 Provence** . NOP-400 Paris** . NOP-187 Provence** . NOP-406 Pateshull . NOP-189 Purefoy/Purifoy . NOP-410 Paunton . NOP-191 Pusterthal .
    [Show full text]
  • 2017 Shropshire & Borders Club Show and Sale
    Web Catalogue For the 2017 Shropshire & Borders Club Show and Sale 546 Pedigree Texel Males & Females at Welshpool Livestock Market on Thursday, 28th September Show : 9am Sale: 10am Further details Welshpool Livestock Market 01938 553438 1 CONDITIONS OF SALE All sheep will be sold under the Auspices of the Society and the LAA National Conditions of Sale (Livestock Auctioneers Association). These can be viewed at ... www.texel.co.uk/societyrules Neck tags supplied must be worn by all sheep PRIOR to the inspection. Individual animal ID numbers on ear tags must match the ID number displayed in the sales catalogue and substitute catalogue. DISCLAIMER While every effort is made to ensure accuracy of information contained within the Texel Sheep Society Sale Catalogues, the Pedigree information is supplied by the Breeder to the Society and to their best knowledge and belief the information contained therein is true and correct. No responsibility can be accepted for any errors or omissions or any reliance on use of the information to readers AUCTION MART RULES FOR VENDORS The Shepherd in charge must bring their respective lots forward, take them to and from the Sale Ring, attend until delivered and assist in trucking if required as the Auctioneers will be responsible only for what is delivered to the purchaser. Should the Shepherd not be in attendance at the time his lots fall to be sold, it will be passed over and taken at the end of Sale. All Stock will proceed in the order of the Catalogue and all lots not previously entered will be sold only when the list is finished.
    [Show full text]
  • Galloping Onto the Throne: Queen Elizabeth I and the Symbolism of the Horse
    Heidegger 1 Galloping onto the Throne: Queen Elizabeth I and the Symbolism of the Horse University of California, San Diego, Department of History, Undergraduate Honors Thesis By: Hannah von Heidegger Advisor: Ulrike Strasser, Ph.D. April 2019 Heidegger 2 Introduction As she prepared for the impending attack of the Spanish Armada, Queen Elizabeth I of England purportedly proclaimed proudly while on horseback to her troops, “I know I have the body but of a weak and feeble woman; but I have the heart and stomach of a king, and of a king of England too.”1 This line superbly captures the two identities that Elizabeth had to balance as a queen in the early modern period: the limitations imposed by her sex and her position as the leader of England. Viewed through the lens of stereotypical gender expectations in the early modern period, these two roles appear incompatible. Yet, Elizabeth I successfully managed the unique path of a female monarch with no male counterpart. Elizabeth was Queen of England from the 17th of November 1558, when her half-sister Queen Mary passed away, until her own death from sickness on March 24th, 1603, making her one of England’s longest reigning monarchs. She deliberately avoided several marriages, including high-profile unions with Philip II of Spain, King Eric of Sweden, and the Archduke Charles of Austria. Elizabeth’s position in her early years as ruler was uncertain due to several factors: a strong backlash to the rise of female rulers at the time; her cousin Mary Queen of Scots’ Catholic hereditary claim; and her being labeled a bastard by her father, Henry VIII.
    [Show full text]
  • The Chess Players
    Rollins College Rollins Scholarship Online Master of Liberal Studies Theses 2013 The hesC s Players Gerry A. Wolfson-Grande [email protected] Follow this and additional works at: http://scholarship.rollins.edu/mls Part of the Fiction Commons, Leisure Studies Commons, and the Modern Literature Commons Recommended Citation Wolfson-Grande, Gerry A., "The heC ss Players" (2013). Master of Liberal Studies Theses. 38. http://scholarship.rollins.edu/mls/38 This Open Access is brought to you for free and open access by Rollins Scholarship Online. It has been accepted for inclusion in Master of Liberal Studies Theses by an authorized administrator of Rollins Scholarship Online. For more information, please contact [email protected]. The Chess Players A Project Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Liberal Studies by Gerry A. Wolfson-Grande May, 2013 Mentor: Dr. Philip F. Deaver Reader: Dr. Steve Phelan Rollins College Hamilton Holt School Master of Liberal Studies Program Winter Park, Florida The Chess Players By Gerry A. Wolfson-Grande May, 2013 Project Approved: ______________________________________ Mentor ______________________________________ Reader ______________________________________ Director, Master of Liberal Studies Program ______________________________________ Dean, Hamilton Holt School Rollins College Acknowledgments I would like to thank several of my MLS professors for providing the opportunity and encouragement—and in some cases a very long rope—to apply my chosen topic to
    [Show full text]
  • Volume 44 • No. 1 • Spring 2019 TEACHING HISTORY: a JOURNAL of METHODS Openjournals.Bsu.Edu/Teachinghistory
    Volume 44 • No. 1 • Spring 2019 TEACHING HISTORY: A JOURNAL OF METHODS openjournals.bsu.edu/teachinghistory Editor: Sarah Drake Brown, Ball State University Assistant Editor/Book Reviews Editor: Richard Hughes, Illinois State University Publication Director: Chris Lovett, Emporia State University Editorial Board Brian Anton, Forsyth High School (MO) Thomas Armstrong, Ministry of Higher Education, United Arab Emirates Charles Banner-Haley, Colgate University Greta Bucher, United States Military Academy C. David Dalton, College of the Ozarks Elizabeth Lawrence, Augustana College William Mugleston, Austin Community College Laura Musselwhite, University of New Mexico at Valencia Donn Neal, Retired Historian Philip Nicolosi, West Morris Central High School (NJ) Pamela Riney-Kehrberg, Iowa State University Randi Storch, SUNY Cortland Advisory Board Mark Konnert, University of Calgary Oscar Lansen, University of North Carolina-Charlotte Jodie Mader, Thomas More College Ralph Menning, Kent State University at Stark Russell Olwell, Merrimack College R.B. Rosenburg, Clayton State University Raymond Screws, Arkansas National Guard Museum Julie Anne Taylor, University of Michigan-Dearborn Additional support from Ball State University Libraries About the Journal Founded in 1975 by Stephen Kneeshaw, Loren Pennington, and Philip Reed Rulon and first published in 1976, Teaching History’s purpose has been to provide teachers at all levels with the best and newest ideas for their classrooms. The journal is published twice yearly, in the spring and in the fall, and receives financial support from Ball State University and Emporia State University. Print subscriptions are available for $12.00 a year for individuals, libraries, and institutions or $30.00 for three-year subscriptions. To subscribe, contact Chris Lovett, [email protected].
    [Show full text]
  • Macau SAR / Zhuhai Prepared On: Jul 12, 2021 8:24:49 PM UTC
    Security Brief for Macau SAR / Zhuhai prepared on: Jul 12, 2021 8:24:49 PM UTC Security Assessment Rating Security Rating for Macau SAR / 2 - Low Zhuhai: Sub-Ratings 1 2 3 4 5 Crime 2 Overall Rating: Security Services 2 2 Civil Unrest 2 Low Terrorism 1 Kidnapping 2 Security Overview : Overview of Macau SAR / Zhuhai Maucau is a safe travel destination, and most visits are incident-free. Petty and opportunistic crime pose a limited threat in touristic locales. Civil and labor unrest is rare. There are no known terrorist groups operating in the territory, and the risk of conflict is negligible. No Current Security Alerts Other Alerts & Advisories Critical Alerts Entry/Exit: Macau continues to adjust COVID-19 entry, quarantine requirements as of July 11. Travel from Guangdong Province, China, permitted. Incident: COVID-19 restrictions Location(s): Macau (map) Time Frame: Indefinite Impact: Travel and business disruptions Summary Officials in Macau continue to adjust border restrictions to prevent the spread of COVID-19. Citizens of mainland China, Macau, Hong Kong, and Taiwan can enter the territory if they have not been to other locations in the previous 21 days. Individuals from most low-risk areas of mainland China, including Guangdong Province, can enter Macau without quarantine with a negative PCR COVID-19 test result taken within seven days of arrival. Travelers from medium- and high-risk areas of mainland China must quarantine for 14 days at designated hotels. As of July 11, the requirements are in place for travelers from the following location: Yunnan Province: Ruili City, Dehong Dai and Jingpo Autonomous Prefecture Officials require travelers that visited Taiwan within 21 days of arrival to take a COVID-19 test within 24 hours of arrival and quarantine for 21 days at a government-designated facility, followed by an additional seven days of self-health management.
    [Show full text]
  • Tiger Kidnapping Endorsement
    Crisis Solution (Corporate) 2.0 Endorsement TIGER KIDNAPPING It is agreed that: 1. The policy is amended by adding the following schedule: Tiger Kidnapping Schedule Tiger Kidnapping Limits of Liability (all amounts specified are for each single Tiger Kidnapping): 1. Tiger Kidnapping Overall Limit of Liability: USD [ ] 2. Ransom: USD [ ] 3. Legal Liability Loss: USD [ ] 4. Additional Expenses: USD [ ] 5. (a) Death or Disability Benefits: USD [ ] (b) Death or Disability Benefits Maximum Benefit Sum: USD [ ] 6. Crisis Consultants fees and expenses: unlimited 2. Insurance Cover 1, Ransom, is amended by adding the following: The Insurer shall also reimburse the Policyholder for Ransom surrendered by an Insured as a result of a Tiger Kidnapping which commences during the Policy Period and within the Territory. 3. In Section 2, Definitions, the definition of Insured Event is amended by adding the following: For the purposes of Insurance Cover 1.1 (Ransom), Insurance Cover 1.3 (Crisis Consultant Response), Insurance Cover 1.7 (Legal Liability), Insurance Cover 1.8 (Additional Expenses) and Insurance Cover 1.9 (Death or Disability Benefit), Insured Event also means a Tiger Kidnapping. For the purposes of all the other Insurance Covers, Insured Event does not include a Tiger Kidnapping. A result of this is that, as well as cover with regard to Tiger Kidnappings being afforded under Insurance Cover 1.1 (Ransom), cover with regard to Tiger Kidnappings is afforded under Insurance Cover 1.3 (Crisis Consultant Response), Insurance Cover 1.7 (Legal Liability), Insurance Cover 1.8 (Additional Expenses) and Insurance Cover 1.9 (Death or Disability Benefit).
    [Show full text]