INVESTIGATIVE TOOLS IN TRANSNATIONAL ORGANIZED CRIME.pptx
CharlieSierra5
7 views
14 slides
Oct 10, 2024
Slide 1 of 14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
About This Presentation
Transnational Organized Crime (TOC) has become a great concern to the world community as it poses a threat to the safety and security of sovereign states. It has manifested itself in many ways, prominent amongst which are drug trafficking, money laundering, trafficking in women and children, illicit...
Transnational Organized Crime (TOC) has become a great concern to the world community as it poses a threat to the safety and security of sovereign states. It has manifested itself in many ways, prominent amongst which are drug trafficking, money laundering, trafficking in women and children, illicit manufacturing of and trafficking of firearms, the smuggling of migrants etc. The result of the above is the emergence of serious problems in various countries of the world.The use of traditional investigative methods to combat TOC has proved to be very difficult and ineffective. This state of affairs therefore calls for the use of special investigative tools such as controlled delivery, undercover operations andelectronic surveillance (wiretapping,communications interception etc) by law enforcement agencies to effectively control TOC.
Size: 114.25 KB
Language: en
Added: Oct 10, 2024
Slides: 14 pages
Slide Content
INVESTIGATIVE TOOLS In Organized Crime Law Enforcement
INTRODUCTION Transnational Organized Crime (TOC) has become a great concern to the world community as it poses a threat to the safety and security of sovereign states. It has manifested itself in many ways, prominent amongst which are drug trafficking, money laundering, trafficking in women and children, illicit manufacturing of and trafficking of firearms, the smuggling of migrants etc. The result of the above is the emergence of serious problems in various countries of the world.The use of traditional investigative methods to combat TOC has proved to be very difficult and ineffective. This state of affairs therefore calls for the use of special investigative tools such as controlled delivery, undercover operations andelectronic surveillance (wiretapping,communications interception etc) by law enforcement agencies to effectively control TOC.
However, there is controversy surrounding the use of these techniques and thus, to a certain extent, discouraging the law enforcement agencies to utilize them. Their use potentially undermines the rule of law, may lead to infringement on human rights and involves government agencies in the use of deceitful means.There is a fear that governments may use them to oppress citizens under the guise of national interest. Their use therefore often spark off politically sensitive debates.The biggest question therefore is how to use these techniques consistent with the rule of law and respect of human rights. The answer to this cannot be universally obtained and this will depend on the legal system, practice and culture of each country. There is a need therefore, to strike an agreement as to what extent the privacyrights of individuals can be respected atthe same time keeping them (people) safefrom the effects of TOC.
In that vein, this paper seeks to analyze these tools with emphasis on the current situation, common issues and problems as well as proposed solutions. It will also analyze the legal framework existing in countries of focus and the trial admissibility of evidence obtained using the above-mentioned investigative tools.
CONTROLLED DELIVERY A. Current Situation Controlled delivery is recognized to beone of the most effective investigative toolsin fighting TOC, particularly illicit drugtrafficking. It is defined as the techniqueof allowing illicit or suspect consignmentsto pass out of, through or into the territory of one or more states, with the knowledgeand under the supervision of theircompetent authorities, with a view to theinvestigation of an offence and theidentification of persons involved in thecommission of the offence.1Under the controlled delivery system,the shipments of such goods are monitoredclosely by law enforcement officers and maydelay arrests in order to identify as manymembers of a trafficking network aspossible and to arrest them at a pointwhere legal proof is most readily available.
CONTROLLED DELIVERY This innovative technique of investigation can be very effective in trapping the managers of crime syndicates. However the methods employed may not be acceptable to many countries in view of considerations of their domestic laws,because it produces offences which couldbe otherwise prevented.
CONTROLLED DELIVERY B. Common Issues and Problems The use of controlled delivery usually becomes a very pertinent issue especially when the laws of a particular country do not explicitly provide for its use. How then could an agency apply it? On this question,it was felt that the laws of most countries do not specifically designate the use of this technique as illegal. It is often just found out that such a method as a means of investigation and detection of criminal activity had not been considered when the laws were promulgated.
CONTROLLED DELIVERY While discussing all these issues, it was found that controlled delivery has both advantages and disadvantages. On the positive side, it is the most effective method of arresting a whole network of a particular illicit trafficking syndicate, not just the sender and the receiver. On the negative side, it is very dangerous because if it fails,the illegal goods or substances enter the market.In practice, the operation of controlled delivery is very difficult and complicated,particularly when it involves many countries. Worse still when there is a difference in legal systems and practices of the countries concerned, as well as the lack of cooperation and coordination among various law enforcement agencies.
UNDERCOVER OPERATIONS A. Current Situation. Undercover operation is another effective investigate tool against TOC and in many cases, it is employed hand-in-hand with controlled delivery. The law enforcement agencies in some countries employ undercover agents to gather information and collect evidence about criminal gangs, study their modus operandi and evaluate their future plans and strategies. This information is used both for preventive and investigative purposes.This technique inherently involves an element of deception and may require cooperation with persons whose motivation and conduct are open to question, and so should b e carefully considered and monitored.
UNDERCOVER OPERATIONS B. Common Issues and Problems The justification of an undercover operation demands establishment of criminal liability of the action of theaccused person, failure of which often raises issues challenging the legality of the operation.
Electronic Surveillance A. Current Situation The use of electronic surveillance suchas wiretapping, communicationsinterception etc. is a very sensitive issueand the topic is commonly surrounded bycontroversies. Questions of theconstitutionality andviolation of humanrights expressed by rights activists havein many jurisdictions restricted or abortedthe use of this investigative tool because itis generally an illegal practice.
Electronic Surveillance However,the law often comes in to legalize its application under given circumstances so as to protect the rights of other people from being violated by criminals. In order to harmonize its application and respect theright to privacy, several conditions must be followed depending on the requirement of each country concerned. These always include obtaining permissions from competent authorities (judge, prosecutor,minister etc), making effort not to interfere with the private affairs/conversations,making progressive reports, close supervision of the tapping etc. However,this method should only be applied if other means have failed, are impracticable or insufficient.
Electronic Surveillance B. Common Issues and Problems The main issues and problems in the use of this investigative tool are as follows:(i) The main problem hampering the use of this technique is lack of legislation allowing it to apply in many countries. Even where legislation exists, it often imposesstringent conditions such aslimited time of communicationinterception, time consuming approval procedures and sorting of private conversations from crime related ones. In cases where authority have been obtained to intercept communication related toa particular crime, it has often become an issue whether tapping should continue when the criminals are discussing a new crime that is not contained in the warrant. The question always is whether the tapping authority should go ahead and tap the circumstantial crime or stop the tapping until a new approval is granted.
THANK YOU Please add your company name or name here