...
首页> 外文期刊>Georgetown Journal of International Law >IAGO'S NET: NOTES FOR AN INTERNATIONAL LEGAL REGIME TO COMBAT IDENTITY-RELATED CRIME
【24h】

IAGO'S NET: NOTES FOR AN INTERNATIONAL LEGAL REGIME TO COMBAT IDENTITY-RELATED CRIME

机译:IAGO的网:国际法律制度应对与身份有关的犯罪的说明

获取原文
获取原文并翻译 | 示例

摘要

Vast numbers of people and businesses around the world are discovering that they have become victims of identity-related crime, with costs in the tens of billions of dollars. This Article analyzes, and offers a coherent response to, the increasingly global problem of identity-related crime. Section II of the Article explores the nature and extent of the problem, focusing on factors that have made identity-related crime more feasible and profitable than ever before. It next discusses identity-related crime as a cycle of criminal activity that falls into five distinct phases: (1) the initial acquisition of personal identifying information (PII), whether in the form of physical items or data; (2) the initial transfer of those items or data; (3) the manipulation of those items or data when necessary to make them useful to others, whether the manipulation takes the form of alteration, compilation, or counterfeiting; (4) the transfer of the manipulated items or data; and (5) the use of the items or data for some criminal purpose, including fraud and concealment of criminal identity. It also identifies the principal financial and non-financial harms that identity-related crime causes, and discusses significant characteristics of the victims and criminals involved in identity-related crime. Section III of the Article proposes an approach to developing an international legal regime to combat identity-related crime. It first identifies and analyzes legal norms pertinent to identity-related crime that are reflected in existing international conventions such as the Council of Europe Cybercrime Convention and the United Nations Conventions Against Transnational Organized Crime and Corruption, national criminal and civil codes, and other sources of authority. It then explains how these pertinent legal norms can be reified through those international conventions, national statutes, and other measures.
机译:全世界大量的人和企业发现他们已成为与身份有关的犯罪的受害者,造成的损失高达数百亿美元。本文分析了与身份相关的犯罪这一日益全球性的问题,并做出了一致的回应。该条第二节探讨了问题的性质和严重程度,重点关注使与身份有关的犯罪比以往任何时候都更可行和更有利的因素。接下来,我们将与身份相关的犯罪作为犯罪活动的一个循环,分为五个不同的阶段:(1)初始获取个人身份信息(PII),无论是物理物品还是数据形式; (2)这些项目或数据的初始传输; (3)必要时对这些项目或数据进行处理以使其对他人有用,而无论这些处理是采取更改,汇编还是伪造的形式; (四)操纵物或数据的转让; (5)将这些项目或数据用于某些犯罪目的,包括欺诈和隐瞒犯罪身份。它还确定了与身份相关的犯罪造成的主要财务和非财务损害,并讨论了与身份相关的犯罪所涉及的受害者和罪犯的重要特征。该条第三节提出了一种发展国际法律制度以打击与身份有关的犯罪的方法。它首先确定并分析与身份相关犯罪有关的法律规范,这些规范已反映在现有的国际公约中,例如欧洲委员会网络犯罪公约和联合国打击跨国有组织犯罪与腐败公约,国家刑法和民法以及其他来源权威。然后,它解释了如何通过这些国际公约,国家法规和其他措施来完善这些相关的法律规范。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号