JOURNAL OF CRIMINAL INVESTIGATION
|
|
|
- Marie-Françoise Croteau
- il y a 10 ans
- Total affichages :
Transcription
1 ALEXANDRU IOAN CUZA POLICE ACADEMY JOURNAL OF CRIMINAL INVESTIGATION Volume V Issue 2/ The Journal is indexed in the EBSCO CEOL, SSRN, Index Copernicus international database - ~ 1 ~
2 JOURNAL OF CRIMINAL INVESTIGATIONS Director Prof. COSTICĂ VOICU Ph. D Scientific Board: MAURICE PETIT Prof. LIGIA NEGIER DORMONT Ph.D "Police College Bruxeles" Université Pantéon, Paris NORBERT LEITNER PETER LAMPLOT Rector of the Academy of Security Vienna Reader of the Academy of Security Vienna Prof. ION DOGARU Ph.D Prof. LAZĂR VLĂSCEANU Ph.D Member of the Romanian Academy Bucharest University Prof. OVIDIU PREDESCU Ph.D Prof. ROMIŢĂ IUCU Ph.D Faculty of Law "Simion Bărnuţiu" Pro-rector of Bucharest University Prof. TEODOR FRUNZETI Ph.D Prof. GHEORGHE TOMA Ph.D Rector of the National Defense Deputy Rector of the National Intelligence University "Carol I" Academy "Mihai Viteazul" Prof. GHEORGHE POPA Ph.D Prof. MARIAN PREDA Ph.D Rector of the "A.I.Cuza" Police Academy Bucharest University Lecturer MIHAELA FLORENTINA PRUNĂ Ph. D Prof. NICOLETA DIACONU Ph.D Dean of the Law Faculty, Romanian-American "A.I.Cuza" Police Academy University of Bucharest Prof. FLORIN SANDU Ph.D Lawyer of the Bucharest Bar Association Prof. VLAD BARBU Ph.D Prof. ALEXANDRU BOROI Ph.D Police Quaestor PETRE TOBĂ Ph.D Chief of Romanian Police Prof. IOAN DASCĂLU Ph.D Prof. MIHAI BĂDESCU Ph.D Editorial Committee: Chief Editors: Prof. ŞTEFAN EUGEN PRUNĂ Ph.D Deputy Editor: Lecturer LAURENŢIU CONSTANTIN GIUREA Ph.D Editorial Secretary General: Assist. Lecturer MARIUS CEZAR PANTEA Ph.D Assist. Lecturer Claudiu M. ŢUPULAN Ph.D Lecturer Nicolae GHINEA Ph.D. Assist. Lecturer Nicolae GROFU Ph.D Assist. Lecturer Nelu NIŢĂ Ph.D Assist. Mihail P. MARCOCI Ph.D Assist. Ioan-Cosmin MIHAI Ph.D. Assist. Amalia NIŢU student Ph.D Editors: Assist. Lecturer Gheorghe POPESCU Ph.D Dan BUCUR Ph.D Assit. Lecturer Ionuţ Andrei BARBU Ph.D Assist. Lecturer Laura MAIEREAN Ph.D Assist. Sergiu A. VASILE Ph.D Assist. Cristian Eduard ŞTEFAN Ph.D Assist. Ligia STANCU student Ph.D The Magazine is published with the support of the Police Department from A.I.Cuza Police Academy Semestrial publication under IPA Romania Address: Bucharest, Şos. Olteniţei, , Sector 4, Tel , ISSN ~ 2 ~
3 ALEXANDRU IOAN CUZA POLICE ACADEMY CONTENTS I. ANALYSIS, STUDIES, SYNTHESIS REFLECTIONS ON SOME PROVISIONS OF THE LAW NO. 187 FROM ON THE ENFORCEMENT OF THE ROMANIAN CRIMINAL CODE (Law no. 286/2009) Part I... 7 Professor Costică VOICU Ph.D Assist. Amalia NIŢU Ph.D student FORGERY AND PIRACY WITHIN SLOT-MACHINE GAMING FIELD Associate Professor Marius PANTEA Ph.D LA MONDIALISATION DE L INFORMATION Asist. univ. drd. Ligia Cristina Maria STANCU INTEGRATING CULTURE AND MANAGEMENT Emil STANIMIR Ph.D student II. EVOLUTION AND TRENDS OF CRIME LE PROFIT DE L ENTREPRISE CRIMINELLE Dan BUCUR Ph.D Lawyer Lia Andreea DAN EUROPEAN LEGAL SYSTEM OF POLICE COOPERATION IN THE FIGHT AGAINST TERRORISM AND ORGANIZED CRIME Assistant Cristian-Eduard ŞTEFAN Ph.D ZUSAMMENARBEIT UND INFORMATIONSAUSTAUSCH BEI DER BEKÄMPFUNG VON FINANZDELIKTEN Lect. Iuliana JIDOVU Ph.D REFLECTIONS ON THE ACTIVE SUBJECT AND THE ESSENTIAL CONDITIONS FOR THE OFFENSE OF BRIBE RECEIPT Lect. Ionuţ Andrei BARBU, Ph.D III. RESEARCH AND CRIME PREVENTION ASPECTS OF CRIMINALITY: INTELLECTUAL PROPERTY, FORGERY AND COUNTERFEITING Lect. Gabriela ŞERBĂNOIU Ph.D ~ 3 ~
4 JOURNAL OF CRIMINAL INVESTIGATIONS QUELQUES ASPECTS CONCERNANT L IDENTIFICATION DES CADAVRES D ORIGINE INCONNUE SOME CONSIDERATIONS ON THE IDENTIFICATION OF BIDIES WITH UNKNOWN IDENTITY Lecteur universitaire docteur Marin-Claudiu ŢUPULAN LE RÔLE DES INFORMATIONS DANS LE PROCÈS D`ADMINISTRATION DES ESAIS THE ROLE OF INTELLIGENCE IN THE PROCESS OF ADMINISTERING THE EVIDENCE Lecteur universitaire docteur Gheorghe POPESCU EUROPEAN UNION POLICY ON COMBATING ABUSE OF DOMINANT POSITION Lect. Laura MAIEREAN Ph.D THE FIELD OF ADMINISTRATIVE CONTRACTS IN THE ROMANIAN POSITIVE LAW RELATED TO THE PROVISIONS OF ART. 2 ITEM (1) LET. C) FROM LAW NR.554/2004 REGARDING THE ADMINISTRATIVE LEGAL DISPUTE Lect. Cristian Giuseppe ZAHARIE Ph.D student Niculae GAMENŢ-ANTONIU Ph.D student BRIEF ANALYSIS ON PROBLEMS THAT NEED TO BE CLARIFIED DURING THE INVESTIGATION OF THEFTS Lect. Marin RUIU Ph.D IV. MANAGEMENT OF CRIME INVESTIGATION ANALYSIS OF RISKS AND VULNERABILITIES IN DOCUMENT MANAGEMENT SYSTEMS Costel CIUCHI Ph.D Student Prof. Angelica BACIVAROV Ph.D Laura IANCU Ph.D Student E-LEARNING SECURITY MANAGEMENT Assist. Ioan-Cosmin MIHAI Ph.D CRISIS AND RISKS MANAGEMENT WITHIN THE MINISTRY OF INTERIOR Lect. Gheorghe POPESCU Ph.D Eugen NEAŢA Ph.D V. SCHENGHEN ISSUES CONSTABULARY COOPERATION THROUGH NATIONAL INFORMATICS SYSTEM FOR ALERTS Lect. Ligia Teodora ILIESCU Ph.D VI. REVIEWS ~ 4 ~
5
6 JOURNAL OF CRIMINAL INVESTIGATIONS ~ 6 ~
7 ALEXANDRU IOAN CUZA POLICE ACADEMY REFLECTIONS ON SOME PROVISIONS OF THE LAW NO. 187 FROM ON THE ENFORCEMENT OF THE ROMANIAN CRIMINAL CODE (Law no. 286/2009) Part I Professor Costică VOICU Ph.D [email protected] Law Faculty, Spiru Haret University Assist. Amalia NIŢU Ph.D student [email protected] Alexandru Ioan Cuza Police Academy Social reality, more complex and dynamic than ever, requires measures to amend and supplement the legal framework in criminal matters. At the same time, the new legal framework updated as a response to the new forms of crime requires the adoption and implementation of new methods and techniques related to crime investigation. The management of public property is a primary goal of any government. Public money or property is one of the fundamental resources of the state. Given the significant size (over 50 percent) of the public domain within the national economy as well as the funds and assets administered, we believe that it is necessary to impose a new strategy to prevent and combat crimes that are committed in this vital area of the economy. Key words: new criminal code, crimes, check related crimes, economic police officer, copyright Social reality more complex and dynamic than ever, requires measures to amend and supplement the legal framework in criminal matters. In turn, the new framework - updated in response to the new forms of crime - requires the adoption and implementation of new methods and techniques in crime investigation. The most representative part of Law no. 187/2012 is the amendment of certain provisions of normative acts including criminal provisions (Title II) and provisions to the Criminal Code (Title III). In the following we present some variations concerning normative acts that include criminal provisions: 1. Law no. 59/1934 regarding checks Article 84 is amended and shall provide the following: one of the following acts constitute an offence and shall be punished with imprisonment from six months to one year or with a fine, provided the act is not a serious crime : 1. issuing a check without authorization; 2. issuing a check without having enough available liquidities; 3. issuing a check with a false date or lacking one of the following essential elements: a) the title of check; b) the amount of money that must be paid; c) the name of the issuant ; d) date of issue; e) signature stipulated in art. 11; 4. issuance of a check in non compliance with art. 6, par. 3 Art. 85 from Law no. 59/1934 shall stipulate the following: the illegal issuance of circular check is an offence punishable with fine from to lei. The punishment shall be enforced by the police. These two amendments of the Law no. 59/1934 (which is 80 years old) reflect the intention of the law maker to sanction the acts related to the social relations which are created within the dynamics of the commercial activities specific to the current period. The law maker took into consideration the new aspects related to criminality and the multitude of illegal and fraudulent techniques and schemes as well as the detection rate. During the investigation proceedings there must be serious evidence to demonstrate the clearly stipulated conditions for the objective and subjective side of the crime and the material object, namely: the physical existence of a check, evidence for illegal issuance as well as insufficient bank liquidities available before the deadline for presentation. However, the investigation should be directed towards identifying and investigating the checks with falsified issuance date or those who lack one ~ 7 ~
8 of the essential elements that the law provides in art. 84, par. 3. The investigator should be aware that many economic agents use the system of payments by checks and other instruments regulated by law, a situation which forces him to proceed, in the first stage of the investigation, to the identification and preservation of these checks, to be, then investigated in terms of their legality. 2. Law no. 22/1969 regarding the employment of administrators, the guarantees and liability when it comes to administering the patrimony of the economic agents, authorities and public institutions is amended as follows: Art.1 Administrator, according to the law is the employee of a legal body referred to in art. 176 of the Penal Code whose main tasks are the receipt, storage and issue of the assets he is administering, use or possession, even temporarily, of these. A first clarification refers to the fact that this law is applicable only in the public area, as regulated by art. 176 of the Criminal Code, respectively the term public means all public authorities, public institutions and other legal entities administering or operating with public property assets. Consequently, Law no. 22/1969 does not apply to the private sector. And still why did the law maker amend this law, and the one which is over 40 years old? The answer is found in social reality, which envisages that the public sector in our society, as in all other types of society has a representative share of the national economy. From this derives the need for the law maker to update regulations on the management of public property, according to changes in the structure of the national economy. The management of public property is a primary goal of any government. Public money or property is one of the fundamental resources of the state, called by the law to responsibly manage national assets. As a result, the law maker permanently updates the conditions that must be met by people who have the quality of managers and sanction the illegal acts committed by them. The above mentioned amendments are found in the art. 4, 35 and 37 of this Law, as follows: Art.4 shall provide the following: A person cannot have the quality of a manager if he was convicted for one of the following crimes: a) crimes against the patrimony; b) corruption and abuse while exercising his tasks; JOURNAL OF CRIMINAL INVESTIGATIONS c) forgery; d) crimes stipulated by the Law no. 31/1990 regarding companies; e) crimes stipulated by the Law no 656/2002 for the prevention and sanctioning of money laundering as well for instituting prevention measures for financing acts of terrorism; f) crimes stipulated by the Law no 241/2005 for the prevention and combating tax evasion; g) crimes stipulated by this Law. The beginning of the criminal proceedings for one of the crimes stipulated in art. 1 imposes termination of the manager position. Art. 35 shall stipulate the following: The existence of pluses in the management by fraudulent means is an offense and shall be punished with imprisonment from 6 months to 2 years or a fine. If the fraudulent means represent themselves an offense, the regulations on related crime are applicable. Art. 37 shall stipulate the following: Alienation of movable assets is a guarantee for art. 10, without the prior consent of the legal body referred to in art.176 from the Criminal Code, is a crime punishable by imprisonment from one month to a year or a fine. The amendments described above represent the materialization of the law maker will to control how public property managed by legal bodies, public institutions and authorities (ministries, agencies, companies, inspectorates, departments and divisions) is administered Within these entities there are organized and function management of: fuel, spare parts, maintenance materials, technical equipment, office equipment, machinery and installations, raw materials, finished products and so on, which have a reception, storage, usage and delivery specific to each area. Within each management there are many ways to create pluses by fraudulent means, which are taken by those concerned (pluses fuel by forging waybills or daily activity sheets for machinery, fictitious papers for the repair of equipment and vehicles, fictitious disposal of equipment and assets, overestimation of fuel consumption, lubricants, gas or energy, fictive records (documents), overvaluation of products, services or activities. Given the significant size (over 50 percent) of the public domain within the national economy as well as funds and assets administered, we believe that it is necessary to impose a new strategy to prevent and combat crimes that are committed in this vital area of the economy. One must start with ~ 8 ~
9 a very clear thing: that the public sector is monitored and controlled only by the Court of Auditors, an institution too weak to cover this area, a singularity that gives courage and peace to those who misappropriate public funds. The solution is very simple: to reintroduce the concept of economic police in all institutions, public authorities and legal bodies. The state has the right to control how the public assets are managed and administered. The economic police officers can provide the state with legality in each such public place, in which the state holds shares in whole or in part. Through an effective informative and investigative system economic police is able to provide: prevention and detection of frauds related to administration of property; the correctness of inventory regarding the goods and values administered; the legality of contracts for supplies and delivery, preventing in this way corruption; investigation of illicit property gained by administrators, heads of services, public servants or managers; the correctness of the accounting documents which demonstrate how public money has been spent (contracts of sponsorship which do not relate with the activity of the public objective, fictive legal counseling contracts, unnecessary contracts for advertising, falsified accounting documents etc.); the correctness of the public-private partnerships signed in detriment of public objectives. Data and public information on criminal actions carried out by all (without exception) authorities, institutions and public legal entities are sufficiently strong to demonstrate the plunder that is practiced. In this context we must mention the illegalities committed in the Oltchim case and the Romanian Post, ministries, national agencies, companies and public companies as well as the privatization of some important objectives in the field of metallurgy, steel, oil, banks, wood and others as important for the national economy. The proposal of deployment of economic police officers for the supervision of public assets is based on two arguments, which confirm the effectiveness of it: the prior experience of the system in the 1996s in Romania; the existence if such a system and practice in the US, Great Britain, The Netherlands and other Member Sates. What is worth to be remembered is that each state seeks to implement modern and effective ALEXANDRU IOAN CUZA POLICE ACADEMY solutions to protect public property which generates wealth, trust and stability. 3. An important field amended by the Law no. 187/2012 refers to copyright and related rights, regulated by the Law no. 8/1996. Thus, art shall stipulate: (1) the following acts are considered crimes and punished with imprisonment from 6 months to three years or fine: a) manufacturing for delivery counterfeited goods; b) placing counterfeited goods under a certain customs regime for import and export or under a customs suspensive regime or in free areas; c) any other ways to introduce counterfeited goods on the domestic market. (2) There shall be punishable, according to par. (1) any act of giving, delivering, storage or transport of counterfeited goods. (3) If the crimes stipulated in par. (1) and (2) are committed with a commercial purpose they are punishable with imprisonment from 2 to 7 years. (4) The act of renting a space for storage of counterfeited goods is punishable with a sentence stipulated in par. (3). (5) promotion of counterfeited goods by advertising them, by presenting catalogues with them to the public is a crime and shall be punished with imprisonment from 3 months to 2 years or fine. (6) according to the law under the definition of counterfeited goods fall all copies, regardless of the support, including the cover, manufactured without the consent of the owner or the legal authorized person and which are produced, directly or indirectly, totally or partially, from a product with copyright or related rights or from its package or cover. (7) According to the law, commercial purpose represents the action of obtaining a material or economic advantage. (8) the commercial purpose is assumed if the counterfeited goods are identified at the company s headquarters or at the working points, in the premises or in the means of transportation used by the traders who work in the field of reproduction, distribution, renting, storage or transportation of products with copyright or related rights. ~ 9 ~
10 Art shall be amended and shall stipulate: It is regarded as an offence and it is punishable with imprisonment from 6 months to 3 years or with fine the act of making available to the public, through Internet or other IT networks the products with copyright and related rights or sui generis rights of the manufacturers of data bases or their copies, at any time or place individually chosen. Art shall be amended as follows: It constitutes an offense punishable by imprisonment from 6 months to 3 years or a fine piracy of computer programs in any of the following cases: downloading, storage, running or performance, display or transmission of the internal network. Article 140 shall be amended as follows: It constitutes an offence and is punishable by imprisonment from 1 month to 1 year or with fine the following acts committed without the authority or consent of the holder of the rights recognized by this law: a) reproduction of works of products with copyright or connected rights; b) distribution, renting, import on the internal market of works or products with copyright or related rights, other than counterfeited goods; c) broadcasting of works or products with copyright or related rights; d) broadcasting through cable TV works or products with copyright or related rights; e) producing of derived works; f) establishing, for commercial purposes, of TV or radio programs, artistic products or performances. Also, it was amended art.141 which stipulates that any act of an individual that illegally acquires partially or totally the work of another author and presents it as his own intellectual creation is a crime and it punishable with imprisonment from 6 months to 3 years or fine. Par. (2), stipulates that reconciliation removes criminal liability. In our opinion the amendments for the Law no. 8/1996 reflect the will of the law maker to ensure a more effective protection for copyright and related rights due to the complexity and spread of the phenomenon.. It is unanimously accepted that prevention and combating of any crime is linked to four essential elements: JOURNAL OF CRIMINAL INVESTIGATIONS a clearly defined and updated legislative framework, harmonized with international and European regulations; an institutional framework tailored to the realities in the field the crimes are committed, which shall include monitoring and surveillance agencies and authorities with investigative powers; a procedural-investigative framework which has to be flexible and professionalized in order to regulate the standard modalities of intervention and investigation of the crimes committed in the competence area of legally empowered structures; a framework for institutional cooperation materialized in programmes, protocols or strategies signed by the competent authorities. Intellectual property protection and enforcement of specific legislation cannot be done effectively unless at least the following conditions are met: keeping the national legislation updated and harmonized with international and European regulations; consolidation of structures that manage intellectual property; they must promote practices and modern techniques to identify criminal modus operandi in this area; setting up an authority with investigative and criminal investigation powers made of by economic police and prosecutors; appointing specialized judges to handle cases related to crimes committed in this area. We believe that the current system of preventing and combating intellectual property crime is poor, unprofessional and clearly marked by amateurism. An integrated concept set through a coherent strategy that can enable effective interventions on groups of offenders acting in this difficult area is missing. In this criminal area specific and sophisticated crimes related to cybercrime and new technology, business related to production, transport and sale of counterfeited products are being committed. This is an area professionalized and intelligent with its own combustion, generating huge profits. Such criminal acts, most of them unknown to law enforcement structures, have characteristics of pyramid and spider criminal activities. References: 1. Law no. 187 from 24 October 2012 to enforce the Law no. 286/ Law no. 286 from 17 July 2009 on the Criminal Code ~ 10 ~
11 ALEXANDRU IOAN CUZA POLICE ACADEMY FORGERY AND PIRACY WITHIN SLOT-MACHINE GAMING FIELD Associate Professor Marius PANTEA Ph.D Police Faculty Alexandru Ioan Cuza Police Academy Within this present article we refer to the modalities by which the intellectual property rights are flagrantly violated, leading to important injuries for the beneficial owners, the State, and the consumers of these rights too. Keywords: gambling, forgery, piracy, trade mark, industrial drawing, infringement Gamblings represent, within this crisis time, a way by which most of the affected people hopes to survive, more then that, to get reach over night. Wheter we talk about loto, bettings or slotmachines which may bring earnings, on the Romanian terrotory, gamblings are present at every corner. We do not exaggerate when we make this affirmation, considering that in every center of each city, you can easily find a drog store, a bank and a gambling club, and in every village or small town you may find an inn or watering hole), where beside the traditional drinks consumed by the locals, with great pleasure, they offer, more or less legal, the possibility to earn money to pacaneleslot machines) 1. Short summary about how did Slot machines appeared These gambling machines, known as slotmachines were invented more then a century ago, by August Fey 1, a german mechanic who emigrated in San Francisco. His invention, called Liberty Bell was a metallic device with spinning reels containing symbols like horseshoes, stars and bells and the money were earned when the three bells used to appear in the window of the machine. In colloquial language, this machine was named Bell machine, a name which resisted for a long time referring to other machines too 2. In 1907, Herbert Mills 2, a manufacturer from Chicago, copied Fey s machine and started the process manufacturing 3. Mills made some changes to the machine, such the external feature, the 1 Previous name Charles Fey, pls link to org/wiki/charles_fey G. R. Williamson, Frontier Gambling: The Games, the Gamblers & the Great Gambling Halls of the Old West, G.R. Williamson, 2011, p ~ 11 ~ number of symbols on each reel dubled ( reached to 20) an enlarged the window, thus, the gambler had the possibility to also see the symbols above and below the winner symbol About forgery and piracy within the gambling field The criminality withi the intellectual property rights field has become a global problem, having a strong transfrontier character, its negative effects leading to serious infringement of human rights, financial losses and economic damages of the States, becoming very dangerous for health and life of great human beings and representing a threat to the national security of States, with an enormous devasting effect upon the society. This is an important signal that activity of criminal transfrontier groups has become a challenge for the national authorities and international community, the implication of organized crime groups and the complexity of infractional networks at the transfrontier level leading to the neccesity to give an interpretation more ample to the global criminal phenomenon. From a certain point of view, it may be noticed that the organized crime acts, generally, in the same way, to any economic agent who is services supplier or producer of material goods, leading to the increase of own earnings and with the scope of reducing the expenses from the total of gross criminal revenue. This new forgery industry which deeply involved in the gambling field, brings, by its performed activity, tremendous prejudice to the beneficial owners of rights. Within this present article, we only intend to give an warning signal, regarding the danger 4 O. Teci, Prejudecată şi slot machines, articol publicat în Revista jocurilor de noroc, , disponibil la 3-C5%9Fi-slot-machines
12 represented by this new millenium s flaggelum, within the global crisis conditions, which affect the State, nations and Continents too. Forgery and piracy of slot-machines gamblings, is often considered to be an infringement without victims and, in general, its not a priority for Police Agencies. A briefing of Administrative Authorities regarding the relevant prejudices caused by slot-machine local producers and regarding the consequences upon the national economy, is a must. More important then that, we must bring into public attention the danger brought by these products to the gambling concept, considering how is is to change the characteristics of awarded prices 5. For Romania, the reality shows that the agresivity of groups which forger and pirate slotmachines, in parallel with activities of local producers, have become very concerning, considering that first of them are looking new forms and modalities to illegally cross border with components of the gaming machines and the second cathegory (producers), offer type of good prices games, which may lead to substantial earnings for the ones and the others,by non-paying the income taxes and taxes due to the State and by cheating the gamblers. The development of specialized networks in slot-machines ilegal business was influenced by the high potential of Romanian trade market but also by the oportunities subject to the transit through the Romanian theritory. The Groups acting on the Romanian theritory have connections abroad and within these connections, they may consequently supply, with significant quantities, Romanian trade market. The networks have created the infrastructure neccesary for taking over the transportation sector, the placement of the goods in different warehouses or en-gros and distribution centers across the country. In order to diminish the risk of being discovered they resort to corruption of law enforcement agents, with competence within the field. The networks are, usually, formed by foreign cetezens and are supported by local entites willing to obtain illicit earnings. Since the begining of 2007, in Romania, have been identified industrial drawings and trade marks forged by slot-machines gambling games but also by pirate computing programs used in gambling 5 M. Pantea, Managementul activităţilor de prevenire şi combatere a ilegalităţilor în domeniul jocurilor de noroc în Uniunea Europeană, Publishing House Pro Universitaria, Bucharest, ~ 12 ~ JOURNAL OF CRIMINAL INVESTIGATIONS industry. In order to be demanding, we shall present below some of the cases instrumented by National Police. In 2011 there were information regarding aprox of forged slot-machines available on the market 6, leading to prejudices to the State, many of them oficially still not-recorded, but a prejudice among the gamblers, considering the winning coeficient is very diminished but also, a prejudice for the trademark owner whi cannot distribute his own machines. In 2011, Police Department inspected aprox gaming clubs and discovered 299 crimes within this field, and 277 persons were investigated. On national level, Police Department discovered 438 forged machines. The differences between the originals and forged machines are very difficult to find. Romanian Police requested the gaming machines producers to create a database of all legal machines available on the market, permitting nonstop full access for National Authorities with competence within this field. More then that, Romanian Police requested that every machine legally imported to be accompanied by a technical passport of conformity in which to be presented characteristics and safety elements. Following a financial-economic inspection, the specialized policemen identified more forged slotmachines. Fraud Investigation Service s agents carried on an investigation together with the representatives of D.G.F.P. Prahova, A.I.F. and C.J.P.C. Prahova in order to inspect the compliance of legal standards in the organisation and operation of gamings machines, in more places situated in Prahova. With this occasion, 9 forged slot-machines were discovered. On this basis, the forged machines were confiscated in order to continue the investigation, under the commitment of a crime provided by the legislation in force 7. Other issues were also discovered in the places subject to the investigation mentioned above, leading to fines in the amount of lei. On , the polimen and inspectors from the Fraud Squad discovered, in a gaming club located in district 2 of Bucharest, 4 slot-machines having installed forged programs. The investigators were informed for some time about some companies that use forged programs for slot-machines. Three of these companies were discovered in Fundeni neighburhood. The administrators of thes 6
13 companies were subject to criminal investigations. A gaming club located behind Fundeni Hospital was the most affected. 4 from 5 slot machines were having forged programs and they were confiscated. The total value of goods being estimated to lei. Police gave a fine in the amount of lei and confiscated also the amount of lei. The owner is under penal investigation 7. In January, 2012, 4 criminal files were registered In Iasi following to which the authorities were notified ex officio. These companies had as business activity operation of gambling games and they were subject to an investigation of pirate goods promovation, unauthorized duplication of computing programs, in any of the followings methods: installation, DOS, running or execution, dispay or internal network operation and introducing on the market of products with similar or identical trade mark with a trademark. Police concluded that the representatives of these companies ilegally reproduced a program belonging to an international group operating within this field using a similar trade mark of this group without having any legal right. The soft of the machines was very similar or even identical from some points of view, with the program produced by the prejudiced company. Under search warrants issued by Law Court of Iasi, the officers within S.I.F., together with Police Department of Iasi and Criminal Service carried on 19 searches to the working points of 4 companies, located in Iasi city. 34 slot-machines were picked up in order to continue investigation, together with all the daily records of incomes and video recordings of the surveillance cameras from all 19 gaming clubs subject to search investigation 8. Another police investigation took place in Suceava were the specialized policemen searched, on March 15th, 2012, 5 locations, 24 slot-machines being sealed and confiscated. Under the search investigation, the officers descovered that the companies did not have license for the soft of the machines. In this regard, 16 motherboards with running programs were confiscated, within the value of Euros 9. 7 V. Cupă Păcănele cu programe contrafăcute, confiscate dintr-o sală de jocuri din Bucureşti, disponibil la e-cu-programe-contrafacute-confiscate-dintr-o-sala-dejocuri-din-bucuresti html 8 A. Hurbea, articol Poliţiştii bat la păcănele, 9 Nereguli grave înregistrate la sălile de jocuri de noroc din municipiul Suceava, disponibil la /v2/local/nereguli-grave- ~ 13 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY Other illegal activities were discovered at S.C. P.W. S.R.L., trade company functioning in Botosani County, having more working points in Suceava county. Under the investigations carried on by the Police Department, it was proven that the slot-machines were having installed unauthorized programs, violating the legal provision in force, within the intellectual property rights. As a result of these investigations, 9 slot-machines and 9 motherboards with running programs were confiscated, in the value of Euros. The objects were subject to expertize and search proceed.the administators of the companies were criminally investigated for commiting the promotion of pirated goods crime and unauthorized duplication of computing programs by way of: installation, DOS, running or execution, dispay or internal network operation and introducing on the market of products with similar or identical trade mark with a trademark crime. In June 2012, in Sibiu county, 60 forged slotmachine were discovered, in 10 localities within the county. The prejudice of using illegal softs was of Euros. With this occasion, more locations within Sibiu, Medias and other localities were inspected 10. Starting with November 2012, The Fraud Investigation Department from IGPR carried on an investigation in order to prevent and fight against the illegalities within this field, such as illegal programs, forged slot-machines and gaming equipment and the operation of these machines. Following this investigation, 40 criminal files were registered under commiting of fiscal evasion, violation of intellectual property rights and the violation of operation of slot-machines. 147 slotmachines or equipment were confiscated and police department gave fines in the amount of lei 10. With this occasion, the Fraud Investigation Department within IPJ Constanta, together with Information and Internal Protection General Directorate, confiscated 156 video-electronic machines, which were having installed gaming programs likely to be forged. Within Intellectual property rights protection, police investigated the criminal activity of B.D. and C.I, bothe persons with domicile in Hârşova. These two, as representatives of some companies from Harsova, installed and traded,in the period within January 2007 and until the present, gaming nregistrate-la-salile-de-jocuri-de-noroc-din-municipiulsuceava/ 10
14 programs for the video-electronic machines, likely to be forged. Thus, following 18 financial-economic investigations and domicile searches at the headquarters of these companies and to their working points, policemen identified and picked up, subject to confiscation, 156 video-electronic machines, which were having installed gaming programes likely to be forged, the trademark owner being a company from Austria. Following the investigations, police concluded that the forged gaming programs were traded to some beneficiaries from the country, at the aprox. Price of 2500 Euro for device, resulting a value difference of 6500 Euros for each device The gaming machines were manufactured in a location situated in Hârşova, belonging to the above-mentioned company, the forged softs being implemented in these machines. The prejudice was estimated to Euros. The two persons mentioned above were criminally investigated under commitment of the crimes liable to punishment stupulated at paragraph 83, letter a and b from the Law no. 84/1998 regarding the trade marks and geographical indications, art 5, paragraph 1, letter a, b and g from the Law no. 11/1991 regarding the preventing of unloyal concurrence, art 139, ind 6, paragraph 2,5 and 6, art. 139, ind 9, both from the Law no. 8/1996 regarding the copyright and related rights and fiscal evasion provided by law 241/ The DIICOT Dolj District Attorney caused the investigation of 4 police officers from Slatina, under the commitment of organizing a criminal group of 24 accused people, a group specialized in commitment of the following crimes: blackmail, fiscal evasion, abuse while on duty, fraud and money laundering. Under supervision of police officers, the members of the criminal group obtaine finacial beneficies by ilegally introducing on the Romanian territory of slot-machines and by replacing the original motherboard with a forged one. The slot-machines were placed in bars or disco-clubs in Olt, Dolj, teleorman and Mehedinti 12 The Fraud Squad s inspectors carried on an inspection in Arges county. Subhect to this inspection was a gaming machines s transportation. The driver presented an international transportation letter from which resulted that the goods had as destination Mioveni, county Arges, being delivered JOURNAL OF CRIMINAL INVESTIGATIONS by a company from Milan, Italy. Attached to this letter was the invoice no. 1/ having as buyer of the 80 slot-machines a natural person from Mioveni and the supplier was the same written on the CMR. For the other machines, the driver presented invoice no. 2/ , having another supplier from Milan, Italy, but the same buyer from Mioveni. In accordance with the legislation in force, a gamblig games organizer must be a legal person authorized to organize and operate gambling games. 12. Considering that the Fraud Squad s imspectors did not find any authorization on the name of the buyer, they confiscated the 120 slot-machines and also gave an warning to this one. The above-mentioned aspects are not singular, the intellectual property right being very often violated, and the prejudices brought are very importnant and affect the interests of the beneficial owners, of the consumers and of the State. In Romania, there were discovered forged slot machines trade marks and industrial drawings but also pirated computing programs used in gaming industry. In order to be demanding, we shall present below, the legal regulations regarding the three crimes mentioned above. 3. Forged Trade mark As for legal industrial rights violation, respectively the trade mark and the industrial drawing, we hereby specify that they are protected within our country under provisions of Law 84/1998 regarding the geographical indications and trade marks and, respectively, the law no. 129/1992 regarding protection of models and drawings. In accordance with art 15 TRIPs, the trade mark is any sign or combination of signs capable to make distinction between the goods or services of one company from the ones of other company. In accordance with art 2 from the Law 84/ , a trade mark may be any sign likely to be a geographical representation, such as: words, including names of people, drawings, letters, numbers, figurative elements, tridimensional forms and, especially, the form of the products or of its package, colours, combination of colours, hologram, sound signals, or combination of all these, under condition to allow the recognition and distinction of products or services of an enterprice from those of other enterprises ~ 14 ~ 12
15 The registration and protection of trade marks system helps the consumers to choose and buy a product or service due to the fact that the nature and quality of it, indicated by its unique trade mark, correspond to their needs 13. Theoretically, most of the trade marks may be registered 14. Trade marks are distinctive signs, such as: words, including names of people, drawings, letters, numbers, figurative elements, tridimensional forms and, especially, the form of the products or of its package, colours, combination of colours, hologram, sound signals, or combination of all these. The registration of a trade mark gives the owner an exclusive right upon it, for a period of 10 years but, by repeated re-registrations, they may obtain an unlimited protection. Within the trademark forgery field, the commited crime is provided by art 90 parag. (1) from the Law no. 84/1998. Thus, a crime is defined as follows: a) forgery of a trade mark ; b) placing in the public circuit of a product bearing an identical or similar mark with the original products and which brings a prejudice of the beneficial owner of the trade mark; herein below we present a few community marks registered within the gaming industry. ALEXANDRU IOAN CUZA POLICE ACADEMY 4. Forgery of industrial drawing. On the Romanian territory, the industrial drawings rights are recognized and protected under OSIM registration following to which is issued a registration certificate. This certificate represents the industrial drawing protection title. In order to beneficiate of protection, the industrial drawings must fulfill more conditions, namely: to represent an industrial drawing, to be new and to have individual character. The industrial drawing represents the aspect of a product taken as a total or just a part from the total, framed in two dimensions, resulted from the specific characteristics as: lines, shapes, colours, forms, textures or the material of the product or even its decorative surface. An industrial drawing has, primarly, an esthetic part, and protection does not apply to any of its technical characteristics. As examples of industrial drawings, we present: floral setting or other type of setting, graphical symbols, draw of a cloth, an assembley of new dots for lace, motif setting a painted paper and computer icons or sculptures. Graphical representations and motifs created on paper, plastic products, fabrics, porcelain, ceramic or wood. Within the gaming industry, by drawing industry are protected the stylized playing cards used for the gaming machines which can bring earnings. 15 The forgery crime is provided under art. 52 from the Law no. 129/1992 regarding the protection of drawings and industrial models and has the following content:,,(1) Represents a forgery crime and is punished with prison from 6 months to 5 years, the commitment without right of any action provided under art.30, after the registration date of the drawing or model. (2) In case the facts stipulated at parag. (1) represent a social dangerfor the safety or health of the consumers, the punishment consists of 2 to 10 years prison and forbidden of any rights. (3) The penal investigation organs may cause, by default, within the precedent steps, the necessary measures in order to sequester the products bearing forged drawings of models and to preserve the evidences in accordance with the common law and the provisions in force M. Pantea, op.cit., p M. Pantea, op.cit., p ~ 15 ~
16 (4) For the caused prejudices, the owner is entitled to indemnity, in accordance with common law, and may request to the Court, to cause to confiscation, or, depending on the case, to destroy the forged products; these dispositions are applied also for materials and equipment which served to the commitment of forgery crimes. Article 30 has the following content: during the validity of the registration of drawings or JOURNAL OF CRIMINAL INVESTIGATIONS models, the owner has the exclusive right to use it and to prevent their use by third parties without his consent. The owner has the right to forbid the thirds parties to perform, without his consent, the following measures: duplication, manufacter, trade or sale, import, export or use of any product in which the drawing or the model are incorporated or attached to ti or the store of such a product within this scopes. The pictures below, we present a few of the OHIM certificates issued within this industry. ~ 16 ~
17 ALEXANDRU IOAN CUZA POLICE ACADEMY ~ 17 ~
18 JOURNAL OF CRIMINAL INVESTIGATIONS 5. Pirated computing programs. In accordance with the provision of art from the Law no. 8/1996 regarding the copyright and related rights, represent a crime and is punished with prison from 1 to 4 years or with a fine, the unauthorized duplication of computing programs in any of the following modalities: installation, DOS, running or execution, dispay or internal network operation and introducing on the market of products with similar or identical trade mark with a trademark. The legl statute of protection of products within different fields, including the computing programs, considered to be an intellectual creation, has significant differences in European States, previous to 90 s, of nature to affect and perturbate unique market, to which shall be added the massive utilisation of some artwork, such as computing programs 16. In accordance with Intellectual Property World organisation, computing program is an aggregate of instructions which may lead to the fulfillment of a function, a task or a special result by a machine capable of processing the information. Chaptor IX from the law. No. 8/1996, amended and supplemented 17, is dedicated to the computing programs and represents a transposition of protection rules formulated by The Committe s Directive no. 91/250.CEE dated on May 14, 1991 regarding the legal protection of computing programs. The patrimonial rights upon computing programs have unditermined validity, and after the death of the owner, the pass into property of their inheritors, in accordance with the civile legislation, within a period of 70 years. The beneficiars of violated Copyrights may request to the competent courts or other competent bodies the recognition of their rights, to ascertain their violation and to claim the remedies, in accordance with the law 18. As well known, the software piracy 19 means the unauthorized and without copyright utilisation of computing programs. Software piracy, along with forgery, represent a commercial flagellum turned into an universal social phenomenon and represent one of the most increasing forms of economic crime, in Romania but also in the other states, representing a threat for economy of all countries. The software piracy phenomenon is one of the most common, reaching concerning rates within our country. In legal literature, software piracy is defined as follows: including any activities related to computing programs protected by copyright (as such: the copying, loan, import or making it available to the public through the internet or other means performed without the owner s rights consent 20. The surveys are shown that the soft piracy rate in Romania is one of the most highest from the entire world. Gunter von Gravenreuth, as engineer, but also attorney at law and a very qualified specialist within soft piracy lawsuits, afirmed that: even police has started to get trained and to get used to these kind of crimes, still there are big differences, especially, of regional nature, regarding the training of search bodies 21 within computing field, referring to the different ways is seen the phenomenon in important states and localities. As for the software piracy, there is a dissenting opinion on this matter. Some still consider that any computing program should be a public good, because only a general tax should be paid, as it is practiced for the tax related to the use of highways or a bridge. Others, contrary. Consider that a computing program is an act of creation, which implies some production costs and it should be sold as any manufactured product. 22 Within the slot-machine gaming industry, there were identified computing programs having menus identical with originals, as you can see below: 16 M. Pantea, op.cit., p Cele mai recente modificări şi completări au fost cuprinse în cadrul Deciziei nr. 571 din 29 aprilie 2010 şi în cadrul Legii nr. 202 din 25 octombrie C. Moisescu, Protecţia legală a programelor pentru calculator în România, Dreptul, nr. 8/2003, p Prin aceasta înţelegem multiplicarea şi distribuirea ilegală de programe pentru calculator pirat (după ce acestora le au fost înlăturate în prealabil dispozitivele de protecţie), precum şi reproducerea pe suporturile de stocare a informaţiei şi utilizarea unor programe pentru calculator, fără a avea consimţământul titularului drepturilor recunoscute de lege sub forma licenţei de utilizare. 20 C.R. Romiţan, Reproducerea neautorizată a programelor informatice protejate, Dreptul nr. 6/2007, p. 204 şi urm. 21 M. Pantea, Managementul activităţilor de prevenire şi combatere a ilegalităţilor în domeniul jocurilor de noroc în Uniunea Europeană, Publishing House Pro Universitaria, Bucharest, 2011, p zone.ro/despre%20hacking.htm. ~ 18 ~
19 ISSUE 2/2012 ALEXANDRU IOAN CUZA POLICE ACADEMY ~ 19 ~
20 6. Practical aspects related to the identification of pirated and forged programs within slotmachine field Below we present some results of the expertise reports by which are revealed the violations of JOURNAL OF CRIMINAL INVESTIGATIONS intellectual property rights within the slotmachines gaming field. The documents presented are taken from Novomatic Group, and made public under the Forgery Prevention Seminar in Comparison Hot Spot Admiral vs. Hot Spot Admiral BELATRIX Mainboard HOT SPOT ORIGINAL PIRATED VERSION 6.1. Form of presenation ORIGINAL PIRATED VERSION The protection encasement, which might be seen This pirated version does not have a in the picture above, is manufactured from antistatic material, in which the producer delivers the game plate, protecting against the electrostatic discharge through the electronic components placed inside. The electrostatic discharge, may produce in the middle of a running game, and the plate may require a technical intervention These discahrges may affect some electronic protection encasement, as it can be seen from the picture above. The lake of it may lead to deteriorationof the plate due to the shortciurcuit which may appear durin a technical intervention or due to the use of the gaming devices by the players. In the absence of the encasement, the plate is subject to the electrostatic discharges, which components such as RAM memory (random access lead to alteration of the memory areas memory) of the plate, where are stored information related to the credits of the player ( which allow to this to play the game), the awards paid to the player, earned by this one from using the slot-machine. These information are necessary to the organizer in order to calculate the daily incomes, compared to the index of electromechanical counter. responsible for the store of the gaming program and information related to the input and out impulse. Without these there is a risk that the gaming organizer to erroneous calculate the daily earnings, because does not have the possibility to check the calculated sold with the help of the index of electromechanical counter. ~ 20 ~
21 ALEXANDRU IOAN CUZA POLICE ACADEMY 6.2. Hardware components ORIGINAL PIRATED VERSION To the acquisition of the plate, the manufacturere makes available to the buyer an user s manual with In the moment of acquisition, the buyer does not receive any kind of documentation specific indication for the installation of the game plate, with regard to the related installation or and information about the components of the plate and settings. This user s manual is important for installation, setting and acurrate operation of the game plate Admiral Hot Spot game plate was manufactured on modules settings. The game plate is not provided with modules, having all integrated in one plate. In case of any failure, the buyer does not have the possibility to remedy the issue, due to the absence of a user s manual. The way the plate is inslatted in the gaming device is very risky As you may see the plate is not provided with any type of connectors Logical unit Input/ouput signals Sound processing PCB terminals being let it outside, in the air. (textolite plate on which are mounted circuits). The installation is made by direct paste of the wirings inside the game cabinet, directly on the plate s terminals ( see picture B2, B3) This operation may lead to permanent deterioration of the plate, by incorrect paste of the wires, such those related to the alimentation the game plate. The manufacturer equiped the plate with a storage battery, for permanent alimentation of the memory used by the game plate, needed for the operation of the game and the store of financial operations. The manufacturer did not included in the design of the plate, a surge protection circuit. In case the main power supply is defecting, and the game plate is fueled with a voltage higher then 5V (5,4 V), the integrated circuited responsible for the supply of video image, shall resist only a few minutes, overheating and collapsing, making the plate unusable In case of a power failure, a deffect power supply may lead to surge exactly in the moment the voltage becomes normal, so, it may distroy the game plate, making impossible to retake the game from the moment there was at the time of power failure, and also making unavailable the access of electronic technician ~ 21 ~
22 This type of design allows a faster and safer debugging, by replacing the debroken module and minimization the risks of producing another deffects. The game plate is supplied with key connectors of mounting. These connectors allow a fast and safe installation operation. The key, existent on each connector, does not allow a wrong connection of it. The game plate is provided with a protection circuit, with diode zener, which protect all modules in case of a surge, given by the power supply of the game plate. The processor module is supplied with a storage battery of 3,3 V which permanently supplies the memory of the plate related to the financial transaction information (cashed credits/paid) which confers the organizer the possibility to check the incomes. The same storage battery non stop supplies, RAM memory, used by the game plate during the running games, ensuring the player, in case of power failure, that in the moment the game is retaken,the credit will be the same. The game plate allows small changes to the computing program. This option is useful when the organizer finds out the installed game is not attractive anymore. The computing program may be replaced by changing the memories and game plate. JOURNAL OF CRIMINAL INVESTIGATIONS moment the voltage becomes normal, so, it may distroy the game plate, making impossible to retake the game from the moment there was at the time of power failure, and also making unavailable the access of electronic technician to the financial operations storage place The way it was designed the game plate does not allow the replacement of the game in case is not attractive anymore for the players. In order to change the game, the organizer must acquire another game plate. The replacement costs are very high The game loader The game loader is a very important component foe every game plate. This component contains binary information which are interpreted by the processing module, having the following effects: The display of related information on the display of game devices, in accordance with the buttons pushed by the user; To generate the related sounds, in accordance with the status of the game (test, special game, the increase of the stake game, pushing start button in order to start the game etc) The module for input/output signals sends and receives information from the processor which must take many decission on which depends the good operation of the game. All these decisions can be finded in the code of the game program and they were designed by the programmer, in order to provide a secure game for the player but for the organizer too. The display of the impulses on the game s display. In the moment the operator cashes the money from the player, the impluses are opened for the player. The opened impulses are stored by the processor of the plate memory, where the binary code of the program tels to; Financial operations are stored in electronic registries (in RAM memory), but they are recorded by the electromechanical counters too ( an input counter- cashed money and an output counter-paid money). The registration command of operations is placed in the code of game program and is given by the processor. The fisical support of the code of game program is an eprom memory (erasable programmable read-only memory),available at any electronic components store. The pass of the code game program from themachine on which it was created (PC) to the fisical support, is made with a device called eprom memory programmer with a help of a commercial program which commands the programmer. At the end of transfer operation of the binary code, the binary program generates a checksum in hexadecimal base (using characters from 0 to 9 and letters from A to F), using a complexe algoritm. The checksum is unique for every program code. It can not exist two different codes of a program, with the same checksum. This checksum may be determined, no matter the PC where the code of the program was designed. ~ 22 ~
23 The sounds of the game, are in binary format and stored in flash memory. The processor, reads the information from these memories and send it to the sound generator. In the code of the game program it is specified what sounds must issue the sound module, based on the stage of the game. ORIGINAL The checksum of the originalprogram is 01E38C24 PIRATED VERSION The checksum of the pirated program is 01E38C24 This fact demonstrates that in both cases, the original and pirated plate, the code of the program used for the runing operation of the game ( the display of images on the display, the generation of sounds, the revealing of financialoperations in electronic and mechanical matters) is the same Visual and auditive interface and DOS In eprom memory are stored images appearing on the display of the game. Their succession on the display is given by the processor, which takes ORIGINAL ALEXANDRU IOAN CUZA POLICE ACADEMY decisions based on the code sequence of the program and based on information transmitted by the input output signals module After installing both game plates and set on the power supply, the game plate effectuates a test of modules shown on the display of the game, by dispaying the text test in the 4th corners of the image and of the,,admiral s loggo: with the mention:,,registred TRADETRADE MARK OF NOVOMATIC INDUSTRIES The test takes 30 seconds, during on which the butoon s light turn on and turn off periodically, and the speaker provides with a test sound ( once at every 5 seconds). After the testing stage, on the display are shown available games, the message:,,select GAME, and in the down right corner, available credit, on a blue background. There are 5 available games: 1. BURNING HOT 2. ULRA HOT 3. AMERICAN POKER II 4. BURNING TARGET 5. SIZZLING HOT PIRATED VERSION The user may select the game using the buttons placed on the encasement. In the selection moment of the game ( from the 5th available games dispayed) the start image, displayed after the ending of the test, is lossing in the blue background, from where, fgradually, appears the image of the selected game and from the speaker it can be heared the specific sound of the selected game. By selecting BURNING HOT and ULTRA HOT, you shall notice, on the up right corner, ADMIRAL word. Jocul American Poker II uses as symbols for winnings, the playing cards. On the back of the playing cards, which appear in the moment the game is selected, Novomatic loggo shall appear and Liberty Statue, with N letter instead of the flame. The ruling games and the winning chart, for all 5 components of Hot Spot game plate are identical with the originals. BURNING HOT. This game is accessed by pushing HOLD 1 button. This game is running on 5 lines, the symbols being displayed on 3 rotary tambours. The stake may be established by the user, bu pushing RED/RISK button. The winning chart may be displayed by pushing BLACK/RISK button, and by pushing RED/RISK button, it may be seen that the values of the winning chart is chaning based on the setted stake ~ 23 ~
24 The game starts by pushing START butoon. In this moment, the third rotary tambours start moving, and in the moment they stop, it may be checked wheter the winnings are displayed on the 5 lines of the game. In case they are, and the winning is collected directly in the CREDIT, a new game may start. This game has no dubbing option. In any moment, after a game is finished, the user may select another game, by pushing Select Game button. ORIGINAL JOURNAL OF CRIMINAL INVESTIGATIONS ULTRA HOT. This game is very similar with Burning Hot but differs the symbols of the winnings. In case on the third taboures appear same fruits (cherries, lemons, oranges, plums), the related winning is dubled and collected. This is the only possibility to double the winning, beciase the game is not provided with dupping option. PIRATED VERSION ORIGINAL PIRATED VERSION ORIGINAL PIRATED VERSION ~ 24 ~
25 AMERICAN POKER II. After pushing,,start button, there can be seen on the display 5 playing cards, and the amount chosen is deducted from the CREDIT display. The player has the option to retain the wanted number of the playing cards, by pushing HOLD button, and by repeated push of START button, to display new playing cards instead of the ones retained. In case of more winning possibilities, the highest are valorized being displayed on WIN display. For every JACKS or BETTER (bigger pairs) the amount is increased by pushing MINI BONUS. When accomplishing 100 points, the winnings collected by JACKS or BETTER are accidentally paid after several games, and the amounts over 100 points are stored and displayed on MINIBONUS display. Exemple: the 50 amount played,mini BONUS displays 70, JACKS or BETTER it gets to MINI BONUS ORIGINAL ALEXANDRU IOAN CUZA POLICE ACADEMY after which 100 is displayed, the passing to CREDIT MINI BONUS displayes 20. The player has the possibility, by pushing one of the 2 GAMBLE buttons, to increase the winning to the next level or not to stake. By pushing COLLECT button, the game risk is interrupted and the winning is transfered on the available display. With the help of CASH button, the total amount displayed is paid. The player my decide before and after the game what to the with the winnings, to use it in order to continue the game or to be paid. The game is considered finished if: no winningshave been registered, a possible winning has been lost in the risk game or a winning has been transferred in the available winnings option, respectively, when the winning has been paid. The machine is now ready for a new game. PIRATED VERSION BURNING TARGET. This game is running on 5 rotary tamboures, displayed on the monitore of the machine. The lines of the game are 5 and become active based on the stake. The active lines are presented in up right corner of the display. The stake is established with the help of the RED/RISK button and the access to information related to the game and winning chart is done by pushing BLACK/INFO button. After pushing START button, the tamboures are moving and in the moment they stop the winnings are searched all the winnings forms and the related winning is displayed in WIN position. In this moment, its the user s decision what to do, wheter to collect or dupping risk. The access to dupping is made by one push of the 2 risk buttons: RED or Black, then he can play the amount doubled accumulated in WIN ~ 25 ~
26 In case on the tamboures appear 3 red stars, one of each tamboure, a special game shall start, wich includes 10 free games, in which the credit is not affected but the accumulated winnings are collected in WIN, and in case, during these 10 free games, on the third tamboure appears the symbol ORIGINAL JOURNAL OF CRIMINAL INVESTIGATIONS of a flame, all the winnings accumulated in WIN is doubled. At the end of these 10 free games, the total winning may bu doubled. In case the user wants to play one of the other available games, he shall push Select Game button. PIRATED VERSION SIZZLING HOT. All winnings are for one way combination and are paid from the left to right, on the game line, less the scatters. The scatters are paid anywhere on the display, and the winning is added to the winning of the respective line (if the case). In this moment, the decision of the user is expected, who has to choose between collection or dupping risk. The access to dupping is done by one push of one of two buttons: RED or BLACK, then they may risk to double the amount collected in WIN. The game maybe be finished at any moment by pushing Select Game button. The winnings plans for all 5 games are identical with those of the original game Menus and options The access to the menu is made by the help of PAGE 1 key or PAGE 2 key. The navigation is made under NEXT PAGE command displayed on the right down corner of the monitor, and the function is assimilated to the HOLD 5 button and PREVIEWS PAGE is assimilated to the HOLD 4 button. It may easily seen that, on every electronic page of the menu is dispayed an white line with the text: All rights for this machine are reserved by NOVOMATIC. Considering that the checksum of the game program code found on the pirated version, is identical with the original producted by Austrian Gaming Industries - NovomatiC Group of Companies, all the menus related to the financial operations and all the settings are identical with original. ~ 26 ~
27 ORIGINAL ALEXANDRU IOAN CUZA POLICE ACADEMY PIRATED VERSION ORIGINAL PIRATED VERSION ~ 27 ~
28 JOURNAL OF CRIMINAL INVESTIGATIONS 6.6. Conclusions of the expertise Similarities. The code of the program used by the pirated plate is identical with the original, held by Austrian Gaming Industries - NovomatiC Group of Companies, which is the designer and the distributor of the game. The graphical and the sound interfaces, as the accounting menus and also the settings, are identical with the original, from the moment the game devices, equiped with pirated plate, is supplied with power supply. Differencesi. Starting with the design principle and getting to the execution way or the installation of the plate within the encasement of game devices, the pirated plate (excludin the eprom memory) has nothin in common with the original. The pirated plate is not safe at all. The use of this kind of plates, represent a risk factor, for the organizer and buyer too, who may or not be aware of the quality of the plate, but also for the player, who definiteley is not aware of the risks he is exposed by using these machines The player has access only to the visual and sound interface of the game plate, aspects that are identical with the original plate, due to the use of the original game program. The access of the player to the pirated game plate or to the its menus is firbidden by the organizer, in order to avoid fraud. The player is making a mistaked opinion about the original game, in case the game plate fails. 7. Instead of conclusions. We recommend to the intellectual property rights owners who produce and trade slotmachines, to exercise due diligence in order to register to ORDA the used computing programs and to OSIM the trademarks and industrial drawings within the gaming field. This way, they can help authorities with competence in this field to easily identify the companies using forged or pirated slotmachines. References: 1. C.Moisescu, Protecţia legală a programelor pentru calculator în România, Dreptul, nr. 8/ C.R. Romiţan, Reproducerea neautorizată a programelor informatice protejate, Dreptul nr. 6/ G. R. Williamson, Frontier Gambling: The Games, the Gamblers & the Great Gambling Halls of the Old West, G.R. Williamson, zone.ro M. Pantea, Managementul activităţilor de prevenire şi combatere a ilegalităţilor în domeniul jocurilor de noroc în Uniunea Europeană, Publishing House Pro Universitaria, Bucharest, William Norman Thompson, Gambling in America: An Encyclopedia of History, Issues, and Society, Editura ABC-CLIO, ~ 28 ~
29 ALEXANDRU IOAN CUZA POLICE ACADEMY LA MONDIALISATION DE L INFORMATION Asist. univ. drd. Ligia Cristina Maria STANCU [email protected] Academia de Poliţie, Bucureşti The theme proposed for this paper is justified by the fact that globalization of information is a contemporary problem for the Romanian society but also because the field of information security is one highly studied. By analyzing these issue aspects as globalization of information, risks and threats against national security can be more easily understood, even by people that are not experts in the field. Key words: information, globalization, risk, security, threat 1. Introduction La mondialisation est un phénomène multidimensionnel, elle peut apparemment être décrite sans problème, mais, en regardant de plus près, sa description implique de sérieuses difficultés. Elle peut être source de pouvoir par acquis et peut être aussi incroyablement coercitive, la mondialisation peut homogénéiser les cultures, mais peut donner en même temps à l individu l occasion de partager l individualité dans des zones plus larges et plus éloignées. 2. La mondialisation positive La signification positive de la mondialisation est: une évolution, un échange d informations et une économie sans restrictions et sans obstacles, un jeu libre des pouvoirs du marché. Par conséquent, parmi de nombreux d autres aspects de la mondialisation, il y a une augmentation du rôle des moyens d information et de communication modernes, notamment Internet. Si le siècle dernier a été le siècle de la technologie, culminant dans les dernières décennies avec un développement spectaculaire de l informatique, ce siècle sera certainement celui de la communication. La plupart des experts s accordent à dire que «la révolution informatique» est la plus importante transformation mondiale depuis la Révolution Industrielle du milieu du XVIIIe siècle 1. Son expansion rapide est due à la baisse des coûts des équipements et à la demande accrue. Jusqu en 2015, la technologie de l information fera de grands progrès à la fois en milieu urbain et en milieu rural. Toutefois, certains pays ne 1 Global Trends A Dialogue about the Future with Nongovernment Experts, National Foreign Intelligence Board, december ~ 29 ~ bénéficieront pas pleinement de cette technologie, parmi lesquels les pays en développement. 3.La mondialisation négative La mondialisation, à coté des avantages et des changements positifs qu elle apporte aux nations, implique souvent des problèmes et des préoccupations, y compris le problème très important de la sécurisation du cyberespace, Internet, d autant plus que le phénomène du terrorisme a une ampleur sans précédent, supposant aussi le terrorisme informatique. A cause de la mondialisation des dimensions économiques, politiques et militaires, de l expansion des réseaux et des systèmes d information mondiaux, les gouvernements et les organismes internationaux sont contraints de concentrer davantage leurs efforts pour assurer la sécurité mondiale, car les risques sont beaucoup plus accrus aujourd hui, à cause de l effet de propagation en chaîne. Si, jusqu à l émergence d un réseau mondial, la sécurisation des systèmes d information était une question de politique nationale, actuellement il faut être pris en compte aussi les questions d harmonisation et de standardisation au niveau mondial quant à l élaboration des politiques et des stratégies de sécurisation du cyberespace. La mondialisation du cyberespace conduit les décideurs à concentrer leur attention sur les caractéristiques des systèmes d information mondiaux, sur les nouvelles menaces entourant les dangers potentiels auxquels ils sont exposés, menaces qui peuvent se transformer réellement en guerre informatique, il faut donc qu ils examinent la manière d assurance de la sécurité des informations par leur classification et surtout le développement de stratégies viables pour sécuriser le cyberespace.
30 4. Systèmes mondiaux d information Les systèmes mondiaux d information visent à étudier l influence mutuelle des systèmes d information et des tendances de mondialisation dans le monde. Il est tout à fait reconnu que de nombreux facteurs jouent un rôle important dans la détermination de la tendance à la mondialisation, mais les spécialistes des systèmes mondiaux d information considèrent que les technologies de l information sont parmi les principaux facteurs de cette situation et cherchent à établir la relation avec les autres facteurs d influence. Les systèmes mondiaux d information affectent la mondialisation à trois niveaux: infrastructurel, opérationnel et organisationnel: Les questions infrastructurelles concernes les informations, le traitement automatique des données, les standards et les des technologies de la télécommunication et les normes Internet - tout en aidant à dépasser les frontières traditionnelles des relations entre les différents systèmes, nationaux en particulier. Les problèmes opérationnels couvrent les aspects nationaux de la culture, de l éducation et de la formation, de la gestion du personnel, de la gouvernance, des structures légales et des facteurs organisationnels. Les aspects organisationnels jouent un rôle crucial pour la réussite des systèmes mondiaux d information au niveau des organisations. Pour le cas des sociétés multinationales, il est nécessaire d assurer la complémentarité entre la stratégie d utilisation des systèmes d information et celle de l affaire afin d atteindre les objectifs poursuivis. On s attend à ce que le rôle des systèmes d information mondiaux soit renforcé au cours du IIIe millénaire, dans lequel est définie la nouvelle société de la connaissance. Dans cette société, les informations et les connaissances remplaceront les biens matériels comme la principale source d appui de la compétitivité dans le monde des affaires. Les affaires auront principalement une dimension informationnelle, le pouvoir se fondant sur les efforts dirigés vers ce domaine. Encore aujourd hui, de nombreuses affaires dans divers domaines d activité dirigent vers le traitement des informations 30-40% de la structure des coûts. Il y a de nombreux domaines dans lesquels l information joue le rôle principal dans l établissement des hiérarchies du marché JOURNAL OF CRIMINAL INVESTIGATIONS (l éducation, les transports aériens, le commerce en détail, etc.). Savoir c est pouvoir, et le pouvoir est envisagé par toutes les composantes de la scène internationale. La mondialisation des communications produit un tissu des flux et des réseaux de transports et de communication qui donne lieu à une interconnexion généralisée dont les effets sont complexes. Les systèmes internationaux ne pourraient pas fonctionner sans information, leurs niveaux interagissent et survivent grâce aux informations (des états, des organisations gouvernementales, des entreprises transnationales, etc.). Par contre, le but de recherche et de possession d informations est différent, les moyens d obtenir des informations aussi. Le besoin d avoir un support informationnel est devenu la principale dimension de la vie quotidienne. L information, avec tous ses attributs: la fiabilité, la rapidité, l adéquation, la pertinence, la disponibilité et l abordabilité de l accès, la précision, le traitement facile, la résistance aux facteurs destructeurs, la mobilité ou la portabilité, la sécurité et la stabilité, domine toute la vie de la planète. Par conséquent, la nouvelle «guerre» du XXIe siècle est appelée «guerre de l information» et la lutte ne se déroule plus sur les zones militaires classiques de référence - terre, air, eau -, mais sur le nouveau espace informationnel, délimité par les télécommunications, les ordinateurs et les satellites, le danger d une attaque peut venir, avec la même probabilité, d un ennemi ou des amis. Après l incident du 11 Septembre 2001 des Etats-Unis, les pays ont commencé à travailler ensemble contre une éventuelle attaque terroriste mondiale, à travers le cyberespace, le cyberespace de la planète. Peut-être en raison de la menace à laquelle ils sont exposés, mais aussi en raison de l expérience tragique vécue en septembre 2001, les Etats-Unis ont lancé, en février 2003, le signal le plus catégorique, par la Stratégie nationale pour la sécurité du cyberespace. Dans l introduction de cette stratégie, lors de son discours à la nation, le président américain George W. Bush a mentionné: «Le fondement de la stratégie de sécurité du cyberespace de l Amérique est et restera un partenariat public-privé pour mettre en œuvre cette stratégie. Ce n est qu en agissant ensemble, nous pouvons construire un avenir plus sûr dans le cyberespace». ~ 30 ~
31 Avant cette déclaration, le président a marqué l importance de la stratégie au niveau de la société dans son ensemble: «Sécuriser le cyberespace est un objectif stratégique extrêmement difficile qui exige des efforts coordonnés et ciblés de notre société tout entière du gouvernement fédéral, des gouvernements des états et locaux, du secteur privé et du peuple américain». Éclairant est aussi le fait que, lorsqu il définit les priorités nationales pour sécuriser le cyberespace, une d entre elles est intitulée: «La sécurité nationale et la coopération internationale pour sécuriser le cyberespace», ce qui montre que les Américains reconnaissent que la sécurité d un pays dépend de la sécurité planétaire et la composante essentielle est actuellement le cyberespace. Selon des études menées dans les pays développés, il est conclu que, après les attaques terroristes du 11 Septembre 2001, le logiciel de sécurité, trouvé sur une position de priorité presque négligeable (le cinquième dans le meilleur des cas), est devenu la priorité no. 1. Les coûts globaux avec les technologies de sécurité ont augmenté en 2001 de 28% par rapport à 2000, en enregistrant les années suivantes une nouvelle hausse. Si, en 2001, les pays ont alloué 6 milliards de dollars, en 2005 ils ont dépensé plus de 13 milliards pour la sécurité sur Internet. La plupart des attaques sont ciblées sur les domaines.com, ce qui signifie 30% des attaques contre les sites web. Ensuite, quant à la fréquence des attaques, il est à remarquer celles orientées vers les noms de domaine des certains pays (.cn pour la Chine,.tw pour Taïwan les deux représentant 9% des attaques mondiales). Les domaines.gov ont enregistré une hausse des attaques de 38% et les domaines militaires (.mil) une augmentation de 128% par rapport à Le nom de domaine.il (Israël) a été victime d une augmentation des attaques de 220%, de 250%.in (Inde), de 300%.pk (Pakistan) et, sur la première place, avec une augmentation de 378%, se situe le domaine gov.uk (le Gouvernement du Royaume-Uni). Les bombardements du cyberespace mondial sont orientés vers certaines zones planétaires et certains domaines, ce qui conduit à l idée qu il se déclenche effectivement une réelle guerre des informations. ALEXANDRU IOAN CUZA POLICE ACADEMY 5. L information et la guerre de l information La guerre de l information représente les mesures prises en vue pour protéger, exploiter, altérer, détruire ou refuser des informations ou des sources d informations, afin d obtenir un avantage, d atteindre un objectif ou de gagner une grande victoire contre l ennemi. Les opérations déclenchées par la guerre de l information peuvent être parmi les catégories suivantes: la pénétration informatique, les espions humains, les satellites espions, les écoutes, la surveillance vidéo, la guerre électronique, la destruction physique des composants de communication ou des systèmes énergétiques, la falsification de documents, la gestion de la perception, les opérations psychologiques, les virus, les vers, les chevaux de Troie, les faux virus, le vol du secret commercial, l interception des données personnelles, la contrefaçon des s et plus encore. De leur simple énumération, nous pouvons conclure que ces actes peuvent être commis pendant les guerres réelles (telles que celles d Irak, Yougoslavie, Afghanistan) ou pendant la soi-disant guerre froide. Selon les circonstances, certains sont classés comme des crimes, d autres sont légitimes, mais condamnables en termes d éthique. Le nouveau phénomène appelé «guerre de l information» a été défini par FAM US comme «tout acte visant la désapprobation, l exploitation, la dégradation ou la destruction des informations de l ennemi et de leurs fonctions, la protection des informations propres contre les actions de l ennemi en contrôlant les opérations propres d information». On estime que les actions caractérisant la conduite de la guerre de l information sont regroupées en trois domaines (composants) de base. Ceux-ci sont les suivants: fournir/rechercher de l information, l attaque informationnel, la protection des informations. Certains partis ou gouvernements considèrent les opérations déclenchées par la guerre informationnelle de la pratique normale. Dans le domaine militaire, ces opérations sont considérées des conflits. En tout cas, tout ce qu ils ont en commun est le but poursuivi, celui d exploiter les ressources informationnelles pour le bénéfice de l agresseur et le désavantage de l autre partie, l attaquant ou le défenseur. Ainsi, nous pouvons diviser les opérations en deux: de défense et d attaque. ~ 31 ~
32 Les opérations offensives visent à accroître la valeur d une ressource-cible pour le profit de l agresseur et à réduire sa valeur pour le défenseur, alors que les opérations de défense visent à contrer les attaques potentielles pour prévenir ou réduire les pertes potentielles. Les valeurs obtenues ne sont pas toujours de nature monétaire ou matérielle, mais militaire, conventionnelle ou d autre nature. La valeur des ressources d information pour un acteur/joueur est une fonction de six facteurs: 1. Le premier concerne la pertinence de la ressource en termes de préoccupations et de l engagement du joueur. 2. Le second se réfère aux compétences du joueur. Il peut avoir des connaissances, des compétences et des moyens quant à l utilisation efficace des ressources. 3. Le troisième facteur est la disponibilité des ressources pour le joueur. 4. Le quatrième se réfère à la disponibilité des ressources pour les autres joueurs. Si un document secret est capturé par un joueur, la valeur du document est énorme, plus grande qu avant. 5. Le cinquième facteur met en évidence l intégrité de la ressource, ce qui signifie globalement de la qualité, de l exhaustivité, de l exactitude, de l authenticité. Si un attaquant transmet par l intermédiaire des chaînes de télévision d un autre pays des informations par lesquelles ce dernier est discrédité, c est un réel avantage en faveur de l attaquant. 6. Le sixième facteur concerne le facteur temps. La valeur d une ressource d information peut augmenter ou diminuer au fil du temps. Les opérations des guerres d information d attaque produisent des résultats gagnant-vaincu, en modifiant la disponibilité et l intégrité des ressources d information en faveur de l attaquant et contre le défenseur. Nous pouvons parler de trois résultats suite à une attaque: a) l attaquant obtient un accès meilleur aux ressources d information; b) la défense perd l accès total ou partiel aux ressources; c) l intégrité des ressources est diminuée. Les opérations de défense visent à protéger les ressources d information contre les attaques éventuelles. Leur objectif est de maintenir la valeur des ressources ou, en cas d attaque réussie, de JOURNAL OF CRIMINAL INVESTIGATIONS retrouver les valeurs perdues. La défense peut être considérée comme un tout divisé en cinq parties: la prévention, la dissuasion, les indications et les avertissements, la détection, la préparation en cas d urgence et la réponse. Les actions entreprises et les technologies utilisées peuvent être classées dans plusieurs domaines de ceux énumérés. La sécurité de l information est étroitement liée à la guerre défensive d information, mais ce n est pas la même chose, parce que la sécurité des informations vise principalement les ressources propres et les mesures de protection contre les erreurs, les accidents et les catastrophes naturelles, et aussi contre les actes intentionnels. La guerre informationnelle défensive aborde les ressources sans propriétaire, en particulier celles du domaine public et ne concerne pas les actes non intentionnels. La sécurité de l information et la guerre informationnelle défensive à la fois sont souvent inclues dans l expression «protection informationnelle». Les guerres informationnelles impliquent non seulement les ordinateurs et les réseaux informatiques, mais aussi les informations sous toutes ses formes et leur transmission par tout moyen. Elles couvrent toutes les opérations engagées à l encontre du contenu de l information et des systèmes, y compris les disques au dur, dans lesquels il y a les logiciels et les pratiques humaines. Dans le contexte de la guerre informationnelle, la sécurité de l information (INFOSEC Information Security) est la protection et la défense des informations et des systèmes d information contre tout accès non autorisé, contre l altération du contenu des informations se trouvant dans la phase de stockage, de traitement ou de transport et pour fournir aux utilisateurs autorisés l accès libre à ces informations. Les mesures INFOSEC sont conçues pour la découverte, l information et la lutte contre ces types d actions. Les composantes INFOSEC sont les suivantes: la sécurité des équipements informatiques (COMPUSEC - Computer Security); la sécurité des communications (COMSEC - Communications Security et TRANSEC - Transmission Security). COMPUSEC comprend les mesures et les éléments de contrôle qui assurent la confidentialité, l'intégrité et la disponibilité des informations traitées et stockées par les ordinateurs. Il s'agit notamment des procédures et des outils hardware et des logiciels nécessaires à la ~ 32 ~
33 protection des systèmes d'information et des informations qui y sont stockées. COMSEC comprend les mesures destinées à empêcher l'accès non autorisé à des informations qui peuvent être obtenues à partir des systèmes de communication et à protection de l authenticité des correspondants sur ces lignes. Il utilise la codification ou les techniques cryptographiques pour rendre l'information inintelligible pour le personnel non autorisé qui intercepte les communications. TRANSEC utilise un certain nombre de techniques pour éviter la détection ou le brouillage du signal sur la voie de transmission. Ces techniques comprennent soit "la dissimulation" du canal, soit la transformation du canal en une cible mouvante. La gravité des menaces et des dangers contre les systèmes de communication et informatiques détermine qu'ils soient soumis à des risques générés par l'existence des ressources techniques et procédurales qui permettent l'accès non autorisé à des informations classifiées. L'une des exigences fondamentales des systèmes de communication informatiques modernes est de réaliser la protection des services de communication fournis et de l'information. En conséquence, la nécessité d'une haute sécurité des systèmes de communication et d'information contre les menaces du champ de bataille est un problème fondamental de la commande militaire moderne. Dans le domaine des systèmes de communication et d'information, la vulnérabilité est représentée par le point où un système est susceptible d'être attaqué. Tout système informatique ou ayant un degré significatif d'informatisation est vulnérable aux attaques. La vulnérabilité du réseau se produit à deux niveaux: la possibilité de modification ou de destruction de l'information, c'est à dire l attaque contre son intégrité physique; la possibilité d'une utilisation non autorisée des informations, c'est à dire leur transfert du cercle d'utilisateurs fixé. Les experts du monde entier se sont mis totalement d accord à ce qu il n existe pas un système entièrement sécurisé, donc les vulnérabilités sont présentes même dans les systèmes les plus perfectionnés. Pour obtenir les résultats envisagés, un attaquant doit profiter d une vulnérabilité de l ordinateur ou du réseau, qui est définie comme une faiblesse du système qui permet une action ALEXANDRU IOAN CUZA POLICE ACADEMY non autorisée. Ces erreurs se produisent à différents stades de développement ou d'utilisation des systèmes et peuvent donc être classées dans les catégories suivantes: vulnérabilité de conception (design vulnerability) - une erreur qui apparaît dans la première phase de la vie du produit, celle de la conception, et que même une mise en œuvre parfaite ultérieure ne la fera pas disparaître; vulnérabilité de mise en œuvre (implementation vulnerability) - est due à la phase de mise en œuvre; vulnérabilité de configuration (configuration vulnerability) - se produit en raison d'erreurs commises dans la configuration des systèmes, tels que l utilisation des codes implicites d'accès ou des droits d'écrire des fichiers à mot de passe. Les systèmes informatiques sont menacés à la fois à l'intérieur et à l'extérieur. Il se peut être des gens bien intentionnés qui font de différentes erreurs d'exploitation ou des personnes malveillantes. Nous ne savons pas ce que l'avenir nous réserve en ce qui concerne les confrontations futures, mais il est certain qu'il appartiendra aux opérations conjointes. Inconditionnellement, elles se produiront dans un environnement complexe et entièrement informatisé qui va augmenter la vitesse de traitement et de transfert des décisions, des rapports ou des autres informations consultative et va optimiser les performances des actions des moyens de combat. Le défi consiste à les adapter aux réalités actuelles dures (confrontations asymétriques) dans lesquelles se confrontent des acteurs appartenant à des stades très différents de développement. 6. Conclusions La mondialisation peut être définie à partir de trois perspectives: de la théorie du système mondial, de l'organisation politique du monde et de la culture mondiale, ayant à la fois des effets positif et négatifs. La capacité de trouver un équilibre entre les aspects inhérents de la mondialisation qui donne le pouvoir et les aspects humains et ceux aussi inhérents de la mondialisation qui annulent le pouvoir et qui sont déshumanisantes décidera si la mondialisation est ou n est pas un phénomène passager ou une révolution fondamentale dans l'évolution de la société humaine. La dépendance des informations est de plus en plus grande, voire dangereuse. Il y a des États qui ~ 33 ~
34 sont entièrement tributaires aux informations fournies par les composantes du cyberespace national. Le blocage du cyberespace national pendant plusieurs heures peut conduire au chaos, affectant principalement la sécurité du système JOURNAL OF CRIMINAL INVESTIGATIONS informationnel global. C'est pourquoi il est exigé d accorder une attention spéciale à la sécurité des informations, essentiellement en veillant à leur bon classement, mais aussi en développant des stratégies cohérentes pour assurer le cyberespace. Bibliographie: 1. D.E. Denning, Information Warfare and Security, Addison-Wesley, Reading, Massachusetts, Florin Gh. Filip (coordonator) Societatea informaţională, societatea cunoaşterii. Concepte, soluţii şi strategii pentru România, 2001, Bucureşti, Editura Expert 3. Howard, D. LeBlanc, Writing Secure Code, 2nd Edition, Microsoft Press, Redmond, Washington, M. Igbaria, M. Anandarajan, C.C.-H Chen, Global Information Systems, în Encyclopedia of Information Systems, Academic Press, San Diego, CA, 2003, vol Securing the Cloud. A Survey of Digital Security, în The Economist, October 26th-November 1st, 2002, Volume 365, Number Strategia de Securitate Naţională a României, securitate 7. The National Strategy to Secure Cyberspace, February 2003, The White House, Washington, whitehouse. gov/ pcipb /cyberspace_strategy 8. Timofte A.R., Originile şi mărirea, declinul şi renaşterea lumii informaţiilor secrete, Editura A.N.I., Bucureşti, W. Schwartan, Information Warfare, 2nd edition, Thunder s Mouth Press, New York, Dumitru OPREA, Protecţia şi securitatea informaţiilor, Polirom, Iaşi ~ 34 ~
35 ALEXANDRU IOAN CUZA POLICE ACADEMY INTEGRATING CULTURE AND MANAGEMENT Emil STANIMIR Ph.D student Judicial police officer - Teleorman County Police A major challenge of doing business internationally is to adapt effectively to different cultures. Such adaptation requires an understanding of cultural diversity, perceptions, stereotypes, and values. Because different cultures exist in the world, an understanding of the impact of culture on behavior is critical to the study of international management. If international managers do not know something about the cultures of the countries they deal with, the results can be quite disastrous. Keywords: culture, cultural knowledge, organizational culture, values, management. 1. Introduction A major challenge of doing business internationally is to adapt effectively to different cultures. Such adaptation requires an understanding of cultural diversity, perceptions, stereotypes, and values. Because different cultures exist in the world, an understanding of the impact of culture on behavior is critical to the study of international management. If international managers do not know something about the cultures of the countries they deal with, the results can be quite disastrous. A quick overview (Table-1) illustrated below, shows a great deal of cultural diversity around the world. But thanks to the nine GLOBE dimensions, we have more precise understanding of how cultures vary. Closer study reveals telling cultural patterns, or cultural fingerprints for nations. For example, the United States (US) managerial sample, for instance, scored high on assertiveness and performance orientation. Accordingly, Americans are widely perceived as pushy and hardworking. Switzerland s high scores on uncertainty avoidance and future orientation help explain its centuries of political neutrality and world-renowned banking industry. Singapore is known as a great place to do business because it is clean and safe and its people are well educated and hardworking. This is no surprise, considering Singapore s high scores on social collectivism, future orientation, and performance orientation. In contrast, Russia s low scores on future orientation and performance orientation could foreshadow a slower than hoped for transition from a centrally planned economy to free enterprise capitalism. 1 1 Hofstede, G. Cultural Dimensions.,Hodgetts, R., & Luthans, F. (2006). International management: Culture, strategy, and behavior (6th ed.). New York: McGraw-Hill. ~ 35 ~ Culture has various meanings and manifestations. Culture is complex and dynamic, is cognitive and tangible, has power to influence, and can be produced and consumed. A definition of culture was provided by the late anthropologist Clifford Geertz 2,. Accountic to Geertz, culture is a historically transmitted pattern of meanings embodied in symbols, a system of inherited conceptions expressed in symbolic form by means of wich men communicate, perpetuate, and develop their knowledge about and attitude towards life 3. Described in this way, culture grows and spreds over time, has specific contents associated with it, and leads to emotional and cognitive actions among its followers. In the world today, cultural knowledge should mean knowledge related to all aspects of culture, not confined only to the arts. Cultural knowledge is not only cultural competence, or an understanding of customs and practices at selected social settings, but a broader understanding of the various meanings and manifestations of the culture. Cultural knowledge is very important because culture orients human beings, gives them identities and influences their interactions. Responsible use of cultural knowledge can provide advantages to decision makers managing the multidimensional challenges of the organizations. 4 2 Clifford James Geertz (August 23, 1926 October 30, 2006) was an American anthropologist who is remembered mostly for his strong support for and influence on the practice of symbolic anthropology, and who was considered "for three decades...the single most influential cultural anthropologist in the United States."[1] He served until his death as professor emeritus at the Institute for Advanced Study, Princeton. 3 Baylis, Wirtz & Gray, 2010 p K. Ashequi Haque Culture Shapes Security
36 Table -1 JOURNAL OF CRIMINAL INVESTIGATIONS Countries Ranking Highest and Lowest on the GLOBE Cultural Dimensions Dimension Description Highest Lowest Power distance Defined as the degree to which members of an organization or society expect and agree that power should be unequally shared Morocco, Argentina, Thailand, Spain, Russia, South Korea, India Denmark, Netherlands, South Africa-black sample, Israel, Costa Rica Uncertainty avoidance Societal collectivism In-group collectivism Gender egalitarianism Assertiveness Future orientation Performance orientation Humane orientation Defined as the extent to which members of an organization or society strive to avoid uncertainty by reliance on social norms, rituals, and bureaucratic practices to alleviate the unpredictability of future events Refers to the degree to which organizational and societal institutional practices encourage and reward collective distribution of resources and collective action Refers to the degree to which individuals express pride, loyalty, and cohesiveness in their organizations or families Defined as the extent to which an organization or a society minimizes gender role differences and gender discrimination Defined as the degree to which individuals in organizations or societies are assertive, confrontational, and aggressive in social relationships Defined as the degree to which individuals in organizations or societies engage in futureoriented behaviors such as planning, investing in the future, and delaying gratification Refers to the extent to which an organization or society encourages and rewards group members for performance improvement and excellence Defined as the degree to which individuals in organizations or societies encourage and reward individuals for being fair, altruistic, friendly, generous, caring, and kind to others ~ 36 ~ Switzerland, Sweden, German-former West, Austria, Japan, Spain Sweden, South Korea, Japan, Singapore, Denmark Iran, India, Morocco, China, Egypt, Indonesia, Pakistan Hungary, Poland, Slovenia, Denmark, Sweden Germany-former East, Austria, Greece, United States (US), Spain Singapore, Switzerland, Netherlands, Canada- English speaking, Denmark Singapore, Hong Kong, New Zealand, Taiwan, United States (US) Philippines, Ireland, Malaysia, Egypt, Indonesia Russia, Hungary, Bolivia, Greece, Venzuela, Denmark, Great Britan Greece, Hungary, Germany-former east, Argentina, Italy Denmark, Sweden, New Zealand, Netherlands, Finland, United States (US), Canada, Australia South Korea, Egypt, Morocco, India, China Sweden, New Zealand, Switzerland, Japan, Kuwait Russia, Argentina, Poland, Italy, Kuwait Russia, Argentina, Greece, Venzuela, Italy Gremany-former West, Spain, France, Singapore, Brazil
37 2. Culture as Mental Programming Every person carries within him- or herself patterns of thinking, feeling, and potential acting that were learned throughout the person s lifetime. Much of it was acquired in early childhood, because at that time a person is most susceptible to learning and assimilating. As soon as certain patterns of thinking, feeling, and acting have established themselves within a person s mind, he or she must unlearn these patterns before being able to learn something different, and unlearning is more difficult than learning for the fi rst time. Using the analogy of the way computers are programmed, we can call such patterns of thinking, feeling, and acting mental programs, or, software of the mind. This does not mean, of course, that people are programmed the way computers are. A person s behavior is only partially pre determined by his or her mental programs: he or she has a basic ability to deviate from them and to react in ways that are new, creative, destructive, or unexpected. The software of the mind only indicates what reactions are likely and understandable, given one s past. The sources of one s mental programs lie within the social environments in which one grew up and collected one s life experiences. The programming starts within the family; it continues within the neighborhood, at school, in youth groups, at the workplace, and in the living community. The European watch maker from the quote at the beginning of this chapter came from a country and a social class in which polite behavior is still at a premium today. Most people in that environment would have reacted as he did. The American garage owner, who worked himself up from the slums, acquired quite different mental programs. Mental programs vary as much as the social environ ments in which they were acquired. A customary term for such mental software is culture. This word has several meanings, all derived from its Latin source, which refers to the tilling of the soil. In most Western languages culture commonly means civilization or refinement of the mind and in particular the results of such refinement, such as education, art, and literature. This is culture in thenarrow sense. Culture as mental software, however, corresponds to a much broader use of the word that is common among sociologists and, especially, anthropologists 1 Social (or cultural) anthropology is the science of human societies in particular (although not ALEXANDRU IOAN CUZA POLICE ACADEMY only) traditional or primitive ones. In social anthropology, culture is a catchword for all those patterns of thinking, feeling, and acting referred to in the previous paragraphs. Not only activities supposed to refine the mind are included, but also the ordinary and menial things in life: greeting, eating, showing or not showing feelings, keeping a certain physical distance from others, making love, and maintaining body hygiene. Talking about culture in any way is surprisingly hard - even describing what our own culture is like can be difficult, and it s even harder to say how our culture affects the way we behave. And what about foreign cultures? We may have a few ideas about what foreigners are like, but are these ideas based on truth, or are they just stereotypes simple and inaccurate pictures of people we don t know very well. 2 Rebecca Fong-England: When I was quite young I went to live in Japan, and after having been there for a little while I was asked by some of the women I was working with if I'd like to do 'Ikebana' which is Japanese flower arranging. I decided not to but I did go to many flower arranging exhibitions and one day I was at one of these exhibitions and I saw an arrangement and I laughed and I said 'oh well that one was obviously done by a beginner ' and the person I was with who had been studying for a long time said 'no no that was done by an expert and I could never do that, that's very hard'. I later discovered that when the Japanese are looking at flower arrangement they see something that we don't see. Because they've been trained in flower arranging and trained in the understanding or appreciation of the art of flower arranging they can appreciate it for its beauty in a way that I was completely unable to see when I first went to the country. Think about what this implies for the way that we see beauty. We were both looking at the same object at the same time but they were seeing something completely different. What this implies is that we're all wearing culture tinted glasses if you like. We're looking at things and judging their value from our own cultural backgrounds and our own experience, which is often very different. We look at things and judge their value from our own cultural backgrounds. No problem with that, of course. until we meet people who see, judge, and do things differently. You don't actually notice culture very much until you meet someone from another culture. And in the first week or two or maybe even the first month or 1 this is the meaning that will be used throughout this study 2 Rebecca Fong ~ 37 ~
38 two, you might not notice any differences; you might get on quite well with that person. But then a misunderstanding might suddenly occur. The reason that something has gone wrong is that your culture and the other person's culture have collided. When the Venezuelan president came to Spain for an official visit he came to the king in Spain and he hugged him. That s something that you never never do. You don t go and hug the King of a country just like that. And the president of Venezuela did it because he s used to that and for him I m sure that was the normal thing to do and if that happened with a president and a king that happen everywhere. Kjung-Ja Yoo: One of my husband's colleagues came to the house and he kissed me, kissed me, hugged me you know as a friendly terms. But in Tokyo I'm someone's wife and then someone westerner - kissing my cheek is an embarrassing thing. I didn't want to embarrass him, so I just accepted and then when I looked at my husband he just pretended - not seeing anything, typical! We all grow up inside our own cultures and what this means is that we assume without thinking a number of different values, attitudes, beliefs, ways of doing things, ways of saying things which come to us naturally - but the way we do things isn't necessarily the same as the way people in other cultures do them and it's not until something goes wrong that you're going to realise that the way someone else does something is different from the way that you do it. Rajni Baldani: When I first went to England I was absolutely, absolutely shocked. There were three of us, two of us Indians and there was one English person, who whilst he was talking, right in the middle of the conversation he takes out a banana, peels it and starts eating it. And he's peeling this banana and eating it without even saying excuse me or whatever. We expect to be offered. That is something that is culturally very different. When there's a cultural misunderstanding like this, the temptation can be to think 'Well they've got a stupid way of doing it - why don't they do it like we do it' and you find that your standards become the standards by which you judge everybody else. And lead to a lot of conflict. So how can we avoid cultural misunderstanding and the possibility of conflict? What do we need to learn to be able to communicate better with people from other cultures and so become inter-culturally competent? We could study the other culture - find out what JOURNAL OF CRIMINAL INVESTIGATIONS food people eat, what their economy is like, learn about their history, read books, get the facts. Intercultural communication is a bit more sophisticated than that if you like. It's not really only about the knowledge that we gain by reading books or watching documentaries about a certain other culture. It's really much more about what happens when we meet someone from that culture and we interact with them. Their behaviour patterns will be culturally specific - just as ours are. So how do we act in different situations, how do we respond to things - do we respond verbally or nonverbally, how close can we stand to someone when we're talking to them. Time, how do we use time, how do we use space. So what that involves is not just learning facts about another culture but also the competence that you get from actually engaging in an encounter with someone from another culture. Studying culture and intercultural communication can help make communication across cultures easier. It can help make us more tolerant of difference and things that are strange or foreign. One very broad definition suggests that culture consists of ideals, values and assumptions about life that are widely shared among people and that guide specific behaviours. So we're talking here about shared assumptions or patterns of behaviour within specific societies. En-shala is a very popular phrase in the Middle East it means 'if it is the will of God' literally. Now it doesn't necessarily have such overt religious connotations as we might expect. But what it does reflect is a certain fatalism amongst many people. They feel that life is, to an extent, controlled by external factors. So the concept of the Westerner as someone who is constantly striving to improve themselves and their situation is an anathema to people there who don't feel that there's very much in a practical way they can do to change that Quite a practical way of looking at culture is to divide it into three groups : products, behaviours and ideas and in the first group - products - we think about all those things that a culture produces - its architecture and its food, its music and folklore and literature - those are the visible products of a culture. 3. Symbols, Heroes, Rituals, and Values Cultural differences manifest themselves in several ways. From the many terms used to describe manifestations of culture, the following ~ 38 ~
39 four together cover the total concept rather neatly: symbols, heroes, rituals, and values. Symbols are words, gestures, pictures, or objects that carry a particular meaning that is recognized as such only by those who share the culture. The words in a language or jargon belong to this category, as do dress, hairstyles, fl ags, and status symbols. New symbols are easily developed and old ones disappear; symbols from one cultural group are regularly copied by others. Heroes are persons, alive or dead, real or imaginary, who possess characteristics that are highly prized in a culture and thus serve as models for behavior. Even Barbie, Batman, or, as a contrast, Snoopy in the United States, Asterix in France, or Ollie B. Bommel (Mr. Bumble) in the Netherlands have served as cultural heroes. In this age of television, outward appearances have become more important in the choice of heroes than they were before. Rituals are collective activities that are technically superfl uous to reach desired ends but that, within a culture, are considered socially essential. 4. Organizational culture Culture is both a dynamic phenomenon that surrounds us at all times, being constantly enacted and created by our interactions with others and shaped by leadership behavior, and a set of structures, routines rules, and norms that guide and constrain behavior. 3 When we brings culture to the level of the organizations and even down to groups within the organizations, one can see clearly how the culture is created, embedded, evolved, and ultimately manipulated, and, at the same time, how, culture constrains, stabilizes, and provides structure and meaning to the group members. These dynamic processes of culture creation and management are the essence of leathership and make one realize that leadership and culture are two sides of the same coin. A single definition of organizational culture has proven to be very elusive. No one definition of organizational culture has emerged in the literature. One of the issues involving culture is that it is defined both in terms of its causes and effect. For example, these are the two ways in which cultures often defined. 3 Edgar H.Schein, Organizational Culture and Leadership 2004,p.1 ~ 39 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY 1. Outcomes- Defining culture as a manifest pattern of behavior- Many people use the term culture to describe patterns of cross individual behavioral consistency For example, when people say that culture is The way we do things around here, they are defining consistent way is in which people perform tasks, solve problems, resolve conflicts, treat customers, and treat employees. 2. Process- Defining culture as a set of mechanisms creating cross individual behavioral consistency- In this case culture is defined as the informal values, norms, and beliefs that control how individuals and groups in an organization interact with each other and with people outside the organization. Both of these approaches are relevant to understanding culture. It is important to know on what types of behavior culture has greatest impact (outcomes) and how culture works to control the behavior of organizational members. Functions of organizational culture 1. Behavioral control 2. Encourages stability 3. Provides source of identity Draw backs of culture 1. Barrier to change and improvement 2. Barrier to diversity 3. Barrier to cross departmental and cross organizational cooperation 4. Barrier to mergers and acquisitions What Types of Behavior Does Culture Control? Using the outcome approach, cultures are described in terms of the following variables: Innovation versus Stability- The degree to which organizational members are encouraged to be innovative, creative and to take risks. Strategic versus Operational Focus- The degree to which the members of the management team focus on the long term big picture versus attention to detail. Outcome versus Process Orientation- The degree to which management focuses on outcomes, goals and results rather than on techniques, processes, or methods used to achieve these results. Task Versus Social Focus- The relative emphasis on effect of decisions on organizational members and relationships over task accomplishment at all costs
40 JOURNAL OF CRIMINAL INVESTIGATIONS Team versus Individual orientation- The degree to which work activities are organized around teams rather than individuals Customer Focus versus Cost Control- The degree to which managers and employees are concerned about customer satisfaction and Service rather than minimizing costs Internal verses External Orientation- The degree to which the organization focuses on and is adaptive to changes in its environment Cultural Control Mechanisms How does organizational culture control the behavior of organizational members? If consistent behavioral patterns are the outcomes or products of a culture, what is it that causes many people to act in a similar manner? There are four basic ways in which a culture, or more accurately members of a reference group representing a culture, creates high levels of cross individual behavioral consistency. There are: Social Norms Social norms are the most basic and most obvious of cultural control mechanisms. In its basic form, a social norm is simply a behavioral expectation that people will act in a certain way in certain situations. Norms (as opposed to rules) are enforced by other members of a reference group by the use of social sanctions. Norms have been categorized by level. A. Peripheral norms are general expectations that make interactions easier and more pleasant. Because adherence of these norms is not essential to the functioning of the group, violation of these norms general results in mild social sanctions. B. Relevant norms encompass behaviors that are important to group functioning. Violation of these norms often results in non-inclusion in important group functions and activities C. Pivotal norms represent behaviors that are essential to effective group functioning. Individuals violating these norms are often subject to expulsion from the group. 1. Organisational culture is same as organisational climate: In management literature there is often ambiguity about the two concepts organisational culture and organisational climate. As explained earlier, organisational culture is a macro phenomenon which refers to the patterns of beliefs, assumptions, values, and behaviours reflecting commonality in people working together. However, organisational climate is a micro phenomenon and reflects how employees in an organisation feel about the characteristics and quality of culture like morale, goodwill, employee relations, job satisfaction, commitmrnt at the organisational, department or unit level. It refers to the psychological enviornment in which behaviour of organisational members occurs. It is a relatively persistent set of perceptions held by organisational members about the organisational culture. Another viewpoint about climate is that various variables get subsumed under the concept of climate, whereas has unique indicators like symbols, rites, myths, and stories. 2. Culture is same as groupthink : Since culture refers to shared assumptions and beliefs, it is likely to cause confusion. Groupthink refers to group members hiding any differences in how they feel and think and behave in a certain way. The phenomenon of groupthink is mostly used in a face to face situation when dealing with small groups. Culture, on the other hand, is a much larger phenomenon characterised by historical myths, symbols, beliefs, and artifacts. 3. Culture is same as organisation: Culture is a result of sustained interaction among people in organisations and exists commonly in thoughts, feelings, and behaviour of people. Organisations on the other hand, consist of a set of expectations and a system of reward and punishment substained by rules, regulations, and norms of behaviour. 4. Culture is a social structure : Social structures in various collectives exhibit tangible and specific ways in which people relate to one another overtly. 5. Conclusions Culture is a complex, dynamic, and constantly changing concept that rsides in both the metaphysical, cognitive, domain and in the tangible physical domain. Culture lives within human beings, and each person adheres to many cultures either simultaneously or contextually. As members of social structures, we all interact with the cultures of societies and are guided by them. In the same manner, a nation is guided and influenced by its culture. ~ 40 ~
41 Culture influences organizations by the virtue of its influence over people in generating values, in ALEXANDRU IOAN CUZA POLICE ACADEMY interpreting situations, in creating expectations of the other and making decisions. References: 1. Abo, T.,The Japanise Production System în the United States -Oxford University Press, editura, Hybrid Factory (1994) Ahn, B. The College Admission and the Fam ily: Centering on the Role of the Father - Korean Journal (1995) 2. Brown, A.D. (1998), organizaţional culture, Financial Times Management, Londra 3. Budean, A.(2007), Abordari ale studiului culturii organizaţionale, lucrare publicata în Volumul Congresului International de Psihologie, 8-10 iunie Sibiu 4. Cameron, K.S., şi Quinn, R.E.(1999), Diagnosing and changing organizaţional culture, Addison Wesley, Reading, MA (editie revizuita: Jossey-Bass, San Francisco) 5. Edgar H.Schein, Organizational Culture and Leadership Eugen Avram si Caru L.Cooper (2008) Psihologie organizaţional-manageriala, Tendinte actuale, Editura Polirom 7. Hall, Edward T. Beyond Culture, Editura Anchor Press/Doubleday, Garden City, N.Y. (1976) 8. Hannerz, U., Cultur al Complexity. Studies în the Social Organization of Meaning, Editura Columbia University Press, New York. (1992) 9. Hofstede, G., Nevijen B., Daval Ohavy D. e Sanders G., Measuring organizaţional cultures:a qualitative and quantitative study across twenty cases,editura Administrative Science Quarterly, (1990) 10. Hofstede, G., Nevijen B., Daval Ohavy D. e Sanders G., Cultures and Organizations: Software of the Mind, Editura London, Mc Graw-Hill. (1991) 11. K. Ashequi Haque Culture Shapes Security- Concordiam Journal of European Security and Defense Issues 12. Olimpia State, Cultura Organizaţiei si Managementul 13. Pruna Stefan (2007), Psihologie organizaţională, Editura ProUniversitaria, Bucureşti ~ 41 ~
42 JOURNAL OF CRIMINAL INVESTIGATIONS 42
43
44 JOURNAL OF CRIMINAL INVESTIGATIONS 44
45 ALEXANDRU IOAN CUZA POLICE ACADEMY LE PROFIT DE L ENTREPRISE CRIMINELLE Dan BUCUR Ph.D [email protected] Romanian Police General Inspectorate Fraud Investigation Directorate Lawyer Lia Andreea DAN [email protected] Bucharest Bar Association In the context of big global and European changes, organized crime has gained new dimensions. This is a serious concern for most of the states. Organized crime is structured in associations, cartels and crime groups which aim at exploiting legislative systems in order to obtain profits and influence resorting to lehal and illicit means. This article analyses the way cross border criminal groups are financed using legitimate bussiness means. Keywords: criminal contracting, organized crime, economic-financial crime, money laundering 1. L Entreprise criminnelle Les États, par le biais des institutions spécialisées agissant dans le cadre juridique existant à un moment donné, prennent des mesures contre ceux qui commettent des crimes, les autorités en utilisant toutes les méthodes et les techniques de recherche médico-légale et d'information, les techniques de surveillance et la procédure pénale ou la coopération juridique institutionnelle et internationale pour condamner les auteurs ou les rééduquer, mais aussi pour rétablir la situation antérieure en ce qui concerne les aspects matériaux et civils de l affaire. Les organes spécialisés de l État, par leur travail de découverte de l infraction, d identification et d arrestation des auteurs des infractions et leur condamnation, entreprennent une action complexe, réaction de la société contre ceux qui violent la loi, suite à leurs activités de création et de renforcement du cadre réglementaire. En même temps, dans le contexte des changements majeurs, survenus à la fois en Europe et au niveau mondial, la criminalité organisée a acquis une nouvelle dimension par l extension de la zone de couverture et par la portée de l'activité, raison de souci pour la plupart des pays. Le crime organisé a son origine et se manifeste par la structuration dans des associations, des cartels et des groupes criminels visant à exploiter les systèmes juridiques dans un but lucratif, pour obtenir de l'influence et du pouvoir par des moyens légaux et illégaux. La criminalité est devenue un problème mondial, avec un fort caractère transfrontalier, ses effets négatifs impliquant souvent des violations graves des droits de l'homme, des pertes ~ 45 ~ financières et des dommages économiques infligés aux États, mettant en danger la vie et la santé de beaucoup d'êtres humains et constituant une menace pour la sécurité nationale des États ayant un effet dévastateur sur la société humaine. C'est un signal clair que l activité des groupes criminels transfrontaliers est devenue un défi pour les autorités nationales et pour la communauté internationale, l implication du crime organisé et la complexité des réseaux criminels transnationaux nécessitant une interprétation plus large du phénomène criminel mondial 1. D'un certain point de vue, on peut observer que les groupes criminels organisés opèrent généralement d une manière similaire à n'importe quel opérateur économique, fournisseur de services ou producteur de biens matériels dans le but d'augmenter leurs revenus et pour réduire le montant des dépenses du revenu criminel brut. Qu'il s'agisse de la fourniture de services illicites (prostitution, pédophilie, travail illégal, jeux, transmissions illégales sur Internet, etc.) ou des biens matériaux (drogues, armes, cigarettes ou alcool de contrebande, contrefaçons ou biens piratés), les activités entreprises sont en grande partie similaires à celles des opérateurs économiques des secteurs respectifs 2. 1 M. Pantea, La criminalité économique et financière. Facteur de risque pour la sécurité nationale, Revista Curentul Juridic, anul IX, nr. 4 (47), 2011, p M. Pantea, Antrepriza criminală în domeniul drepturilor de proprietate intelectuală, Revista Română de Dreptul Proprietăţii Intelectuale, Anul VIII, nr. 3 (28) septembrie 2011, p
46 Ainsi, dans le domaine des services illégaux, sont recrutés les personnes qui peuvent faire les travaux respectifs (femmes et enfants, ouvriers qualifiés ou non qualifiés, concessionnaires et connaisseurs de la technique informatique et des transmissions sur Internet, etc.) en utilisant la violence, l'extorsion ou la persuasion, y compris évidemment la récompense matérielle. Les revenus illégaux obtenus visent à satisfaire les besoins personnels opulentes, les paiements de personnel, les frais de promotion des services illégaux et les dépenses d achat et les coûts de maintenance des matériaux et des moyens techniques nécessaires aux paiements, destinés à assurer la protection fournie par les autorités policières ou les politiciens. En ce qui concerne les groupes criminels qui fournissent des biens matériels, il est à mentionner qu'ils effectuent des opérations (l approvisionnement ou l'importation de matières premières, la création d'installations de production clandestines en général, l'achat de véhicules, le bail des dépôts, la création de pages promotionnelles Internet, la création des réseaux de distribution et de commercialisation) visant à offrir des biens sur le marché noir, en continu développement et diversification. Au sein de ces deux types d'activités décrites ci-dessus, il y a une spécialisation des participants, une distribution des rôles qui se cristallisent au fil du temps, assurant le fonctionnement de l'entreprise criminelle, la matrice caractéristique des rôles de chaque type d'une telle organisation. Compte tenu de ce que nous avons mis en lumière jusqu ici, on peut définir l entreprise criminelle comme une entité structurée et spécialisée qui vise à maximiser les profits en utilisant des moyens et des méthodes sanctionnés par la loi, notamment par la loi pénale, donc à satisfaire, dans une mesure ou autre, les besoins matériels de ses membres, en veillant à la protection des activités déroulées par la corruption des autorités et en fournissant les moyens nécessaires pour rétablir et augmenter le processus criminel. Souvent entre les entreprises criminelles assurant l'existence et le fonctionnement de l'économie souterraine et l'économie formelle il y a des connexions elles ne pourraient pas exister et sans lesquelles leurs organisateurs ne pourraient pas profiter du produit des activités criminelles. Le blanchiment d'argent criminel des entreprises, à travers les étapes déjà connues, ayant comme objectif l insertion dans les circuits financiers légaux, est une partie nécessaire des ~ 46 ~ JOURNAL OF CRIMINAL INVESTIGATIONS activités criminelles qui consomme beaucoup de ressources, mais, une fois accompli, ce processus assure l'expansion de l entreprise criminelle, apporte une touche de respectabilité et des opportunités accrues de corruption des environnements décisionnels. Pour les services de police qui luttent contre la criminalité organisée transnationale un objectif clé devrait être le démantèlement à la fois matériel et humain des entreprises criminelles, par la poursuite, l'identification et la saisie des biens et des valeurs issus du processus criminel, mais aussi la condamnation ferme des membres de ces réseaux. Seulement les peines de prison ferme infligées aux criminels ne suffisent pas pour démanteler les réseaux. Il est nécessaire premièrement d identifier les étapes de l'activité criminelle (recrutement, approvisionnement, fabrication, services, transport, vente, réinvestissement des bénéfices criminels), d'établir les flux financiers et les techniques utilisées pour le blanchiment d'argent de la sorte que l action de la justice se déplace de façon égale sur l'argent et sur les biens matériels appartenant à l'entreprise criminelle de la manière qu elle soit privée de la possibilité de reprendre ses activités illégales 3. Toutefois, l'environnement d où une entreprise criminelle a été retirée doit être surveillé, car la place demeurée libre dans l'économie souterraine sera remplie par l extension de l activité d une autre entreprise criminelle ou par la création d une autre entreprise criminelle, afin de couvrir la demande sur le marché noir. Un élément clé est la création et l'adoption d'un cadre juridique permanent pour permettre aux autorités de mener des activités de prévention et de lutte contre les activités des entreprises criminelles, de la sorte que le principe conformément auquel le crime ne doit pas produire un bénéfice soit appliqué dans la pratique. Egalement, il est nécessaire de créer une stratégie globale suite à laquelle la lutte contre la criminalité menée par les autorités nationales soit coordonnée et interprétée dans une vision unifiée. Les principaux objectifs d'une telle stratégie devraient inclure le lancement, l'exploration et le développement de méthodes et d'instruments horizontaux pour la prévention stratégique et pour 3 M. Pantea, D. Bucur Present Legislative and Practical Aspects in the Field of Fighting Tax Evasion, publicat în 6th Edition of International confrence The European Integration - Realities and Perspectives, Editura Danubius University Press Galaţi, Volume 6/2011, p
47 la lutte contre la criminalité transfrontalière, l'identification et la diffusion de bonnes pratiques, la diffusion de leurs connaissances et le développement de la coordination, de la coopération et de la compréhension mutuelle entre les organismes responsables de l application de la loi, au niveau national et mondial. Les résultats attendus comprennent la mise en œuvre de certaines stratégies efficaces de prévention et de contrôle du problème à l'échelle nationale, dans chaque Etat et, par extension, au niveau mondial. Le développement des capacités opérationnelles et d'enquête des services de police de chaque pays contribue de manière significative à la lutte contre les entreprises criminelles transfrontalières et peut être bénéfique au niveau mondial. 2. La recuperation des benefices tires d ectivites criminelles 2.1. L identification, l histoire et les dimensions du problème Comme indiqué à plusieurs reprises dans le cadre du Mécanisme de coopération et de vérification entre les États membres de l'union Européenne, la faiblesse du système judiciaire roumain est l'intérêt majeur sur l'identification et sur la condamnation des criminels, la récupération des préjudices créés suite aux infractions ou l interdiction d utiliser les revenus illégaux se situant en arrière-plan. Même l'une des définitions généralement acceptées du droit criminel appartenant à Dr. Ion Neagu: l activité réglementée par la loi, effectuée par les organes compétents avec les parties participantes et avec d'autres personnes, afin de trouver à temps et complètement les faits constituant des infractions, de sorte que toute personne qui a commis une infraction soit condamnée selon la gravité de sa faute et aucune personne innocente ne soit pas être tenue pour responsable 1 inspire la plupart des définitions énoncées dans la littérature de spécialité. La récupération des créances résultées des crimes est une activité relativement récente des systèmes de justice, l'un des premiers exemples de l'utilisation des moyens financiers contre les criminels est le procès d Al Capone dans la première moitié du XIXe siècle aux États-Unis. Son activité d organisateur d'une entreprise criminelle spécialisée dans la contrebande d'alcool et de tabac et d'autres crimes très graves, la corruption et le jeu illégal, n ont pas pu être prouvés, mais il a été prouvé par les organes judiciaires que les activités ALEXANDRU IOAN CUZA POLICE ACADEMY réalisées ont fourni des profits illicites et en conséquence il a été condamné à la prison et à une amende considérable, donc un groupe criminel a été démantelé. Toutefois, les sanctions appliquées au chef du crime organisé de Chicago à l'époque n ont pas été pleinement efficaces, et, après sa libération, il a vécu le reste de sa vie sur une propriété de luxe en Floride avec sa famille, qui a hérité une fortune considérable. La leçon Capone a été apprise par les membres des structures du crime organisé, suite au développement du commerce illégal des substances psychotropes et plusieurs criminels ont pensé à utiliser les systèmes juridiques étrangers et les procédures de dépôt et de virement bancaire plus rapides pour cacher ou déguiser l'origine de l'argent, pour qu'ils puissent ensuite rapatrier les bénéfices apparemment sous une forme légitime. En réalité, le crime organisé a augmenté ses actions au niveau mondial et a réussi mondialiser les systèmes de blanchiment des capitaux issus des crimes bien avant que la libéralisation des circuits des capitaux et des marchandises soit une réalité. Il a fallu beaucoup de temps jusqu à l'argent sale soit inclue dans les stratégies internationales de représailles contre la criminalité transfrontalière. Ainsi, bien que la Convention conjointe des Nations Unies de 1961 relative au trafic de drogues ait produit un certain degré d'harmonisation des législations des États sur le contrôle du commerce des principaux stupéfiants, aucune action n'a pas été engagée sur la confiscation et les poursuites des bénéfices réalisés par ceux qui sont impliqués dans cette activité illégale. La chute du communisme, la fin de la guerre froide, la création et l'élargissement de l'union Européenne ont offert des possibilités multiples à la coopération internationale dans la lutte contre le crime organisé, mais la criminalité transfrontière a profité de ces nouvelles possibilités de déplacement, de l'élargissement du marché des activités illégales et du progrès technique, en particulier du réseau Internet. Au cours des deux dernières décennies du XXe siècle, un nouveau cadre de poursuite des produits de la criminalité et du blanchiment d'argent a été initié et de nouveaux accords internationaux et des conventions internationales d'aide et de coopération en matière judiciaire ont été signés. Initialement créés pour lutter contre le trafic international de drogue et des stupéfiants, les mesures et les efforts de récupération des ~ 47 ~
48 bénéfices de ces crimes ont progressivement élargi leur zone de couverture concernant d'autres activités criminelles dans la mesure où l activité des entreprises criminelles a été mise en lumière et la complexité et la nocivité de ce phénomène ont été comprises. Les réglementations juridiques nationales et internationales et les politiques publiques en matière connaissent un processus de développement dynamique, de nouveaux concepts apparaissent dans la réalité actuelle, bien que les États soient encore à différents niveaux de réglementation influencés par les réalités internes, mais aussi par les principaux acteurs de la politique internationale: ONU, l'union Européenne, des institutions financières mondiales ou régionales, etc. L évaluation des dimensions de la criminalité transnationale implique une dose de relativité, puisqu il s agit des activités souterraines et les dimensions de la criminalité inconnue sont évidemment inconnues. Une évaluation relativement récente de l'unodc a estimé le chiffre d'affaires des groupes du crime organisé à une moyenne de 2,5% du PIB mondial, mais avec de grandes variations entre les divers pays. Cette estimation calcule le volume du produit criminel à 1.1 milliards d euros par an, soit au niveau de 6 PIB nationaux (Roumanie). Compte tenu de la quantité de flux financiers underground et du niveau estimé de la criminalité internationale, la plupart des États ont pris conscience de la menace qu elle représente contre la sécurité nationale et contre le système global, ainsi que les gouvernements responsables ont réagi par une nouvelle approche en mesure de donner une réponse adéquate à ce problème Les éléments de stratégie internationale La stratégie développée comprend généralement les directions suivantes: l approche de la criminalité organisée comme une activité économique; la prise de conscience du produit du crime comme facteur criminogène ou facteur de motivation; l utilisation de la procédure pénale comme un outil efficace de lutte et de dissuasion des activités criminelles; le blocage, la saisie et la confiscation des fonds et des produits issus du crime; l'utilisation d'autres mesures (fiscales, civiles), à part la condamnation pénale. JOURNAL OF CRIMINAL INVESTIGATIONS Beaucoup de pays ont adopté cette approche (avec, bien sûr, des différences spécifiques) en enregistrant certains progrès et succès dans la lutte contre la criminalité. Dans l'union Européenne, la construction législative est renforcée par les directives fixant des normes minimales pour les États membres. Des pays comme le Royaume-Uni, l Irlande, la Belgique, les Pays-Bas sont des avant-postes de la réglementation législative, établissant des possibilités de confiscation sans prononcer des condamnations pénales pour les biens provenant de la criminalité, des mesures fiscales, civiles ou administratives dans le but de priver les criminels de bénéficier de leurs fortunes illégales. Malgré les critiques dirigées contre ces mesures pour des raisons de droit de propriété, la pratique de la Cour Suprême et de la Cour Européenne des Droits de l'homme a confirmé la pertinence de ces mesures. 3. L evolution du cadre juridique en roumanie dans le domaine des recouvrement des creances issues des activites illegales En Roumanie, l approche du problème du recouvrement des biens acquis suite aux infractions a certains aspects spécifiques, l'un d'entre eux concerne la mentalité comme réflexe négatif de la mémoire juridique quant au régime communiste durant lequel la Loi 18/ concernant le contrôle de l'origine des fortunes privées illégales était en vigueur (il y avait la possibilité à cette époque-là de saisir les biens, suite à une procédure spéciale, le cas où le propriétaire ne pouvait pas justifier leur possession légale). Le système actuel roumain de récupération des biens acquis par la commission de crimes est le résultat d'un processus élaboré au fil du temps en raison des besoins d'ordre interne et à la suite de la mise en œuvre des directives de l'ue en matière La legislation nationale inclut: Le Code de procédure pénale et le Code de procédure fiscale qui contiennent des dispositions relatives à la manière d application de la mesure de confiscation des biens, de demande de saisie, de blocage des comptes bancaires; La Loi 656/2002 sur la prévention et la lutte contre le blanchiment d'argent contenant des dispositions relatives à la compétence et au fonctionnement de l'office National pour la Prévention et pour la Lutte contre le Blanchiment des Capitaux (unité d informations financières de type administratif) et les obligations de rapport des transactions suspectes; ~ 48 ~
49 La Loi 39/2002 sur le crime organisé qui contient des dispositions relatives à la saisie de biens ou d une valeur équivalente et à l'utilisation des techniques spéciales d'enquête; La Loi 143/2000 sur la lutte contre le trafic de drogue qui contient des dispositions relatives à la confiscation des drogues et des biens acquis suit à la pratique de ce trafic; La Loi 78/2000 sur la prévention de la corruption et des autres faits similaires ou connexes qui prévoit la saisie et la confiscation de l'objet matériel du crime ou de l'équivalent matériel lorsqu'ils ne sont pas trouvés; La Loi 115/1996 sur la déclaration et le contrôle des fortunes des officiels, des magistrats, des fonctionnaires et des personnes en postes de direction prévoit la confiscation des biens que le tribunal les a déclarés indûment acquis ou de leurs équivalents bancaire; La Loi 678/2001 sur la lutte contre la traite des personnes qui prévoit la confiscation des biens acquis à la suite de la participation à la traite des personnes; La Loi 241/2005 sur la lutte contre la fraude fiscale qui prévoit comme mesure obligatoire la récupération du préjudice et la possibilité d'exécution volontaire des obligations fiscales pendant le procès pénal; L OG 14/2007 qui prévoit les mesures concernant l'évaluation et la vente des biens entrés en possession de l'état; La Loi 420/2006 qui ratifie la Convention du Conseil Européen relative au blanchiment, au dépistage, à la saisie et à la confiscation des produits du crime et au financement du terrorisme conclue à Varsovie le 16 mai; La Loi 302/2004 sur la coopération judiciaire internationale en matière pénale qui, entre autres, prévoit la possibilité d'accéder à des comptes bancaires à la demande des autres États membres; La Loi 222/2008 qui met en œuvre les décisions européennes concernant le recouvrement des biens La legislation internationale intégrée dans la législation nationale: La Convention d'entraide judiciaire mutuelle de 2000 et le Protocole de 2001, mis en œuvre par la Loi 302/2004, qui prévoit la possibilité d'identifier l'existence des comptes bancaires d une personne en Roumanie, notamment à la demande d'un autre État membre et la possibilité de transmission d'informations concernant l activité sur ce compte et la mise en place de la ALEXANDRU IOAN CUZA POLICE ACADEMY surveillance du compte. En outre, le protocole qualifie comme infraction la divulgation d'informations privilégiées, disposition transposée dans la législation roumaine (la Loi 56/2002); La Décision-cadre UE 2003/577 relative à l'exécution dans l'union Européenne des injonctions de blocage des biens ou des preuves, transposée dans la législation roumaine par la Loi 302/2004 modifiée par la Loi 222/2008; La Décision-cadre UE 2005/212 sur la confiscation des produits, des instruments et des biens liés à l infraction. Ce document vise à garantir que tous les États membres aient des dispositions adéquates et efficaces de confiscation. Toutefois, ce document exige aux États membres d adopter des dispositions juridiques sur «la confiscation élargie», mesure qui n est pas totalement prévue par la loi roumaine; La Décision-cadre UE 2006/783 sur la mise en œuvre de la reconnaissance mutuelle des injonctions de confiscation. C est un complément de la Décision 2003/577 qui prévoit uniquement la reconnaissance mutuelle des décisions de blocage, disposition intégrée dans la Loi 222/2008; La Décision du Conseil de l'ue 845/2007 sur la coopération entre les bureaux de recouvrement des créances qui impose aux États membres de désigner ou de créer un Bureau national de recouvrement des créances pour tracer et identifier les produits des infractions et les biens liés à l infraction. Ce bureau a été créé dans le cadre du Ministère de la Justice, à savoir le Bureau pour la prévention de la criminalité et de coopération avec les bureaux de recouvrement des créances des États membres; La Convention du Conseil UE de 2005 relative au blanchiment, au dépistage, à la saisie et à la confiscation des produits du crime et au financement du terrorisme. C est un outil qui oblige les États signataires à adopter des mesures législatives nationales efficaces qui conduisent au contrôle de la criminalité au niveau national et international pour assurer l'échange efficace de renseignements. Les Etats signataires s'engagent à créer le cadre juridique nécessaire à la confiscation et à l'investigation pour identifier, dépister, bloquer ou pour saisir rapidement les biens susceptibles à être confisqués. Toutefois, elle exige aux Etats signataires de permettre la saisie des biens acquis auprès de sources légitimes si le produit du crime a été mêlé à tout ou à partie avec des biens acquis d une infraction; ~ 49 ~
50 La Convention européenne d'entraide judiciaire en matière pénale (Strasbourg, le 20 Avril 1959) et les protocoles 1 et 2 du 17 Mars 1978, respectivement, le 8 Novembre 2001, conclus à Strasbourg Les institutions compétentes en matière de recouvrement des créances résultant d une infraction En Roumanie, il y a un assez grand nombre d'organismes compétentes en matière qui ont été mis en place et développés au fil du temps en réponse à certaines situations et besoins spécifiques au niveau de la société sans être le résultat de certaines politiques visant à créer un système intégré et cohérent. La gestion coordonnée et la coopération de ces entités a un niveau limité à cause de la véritable concurrence, souvent observée, entre elles, une situation susceptible de nuire à l'efficacité des mesures anticriminelles 4. LES TRIBUNAUX qui sont tenus de se prononcer, dans les cadre des solutions énoncées, sur les aspects civils de réparation des préjudices et de saisie lorsque la cause a des éléments de cette nature; LES PARQUETS du Ministère du Public qui conduisent, coordonnent, supervisent et, selon le cas, effectuent l'enquête pénale et soutiennent l accusation devant les tribunaux. Le procureur est celui qui dispose la saisie, le blocage des comptes, la confiscation des biens dans certaines situations (art CP) et supervise les enquêtes dans lesquelles on identifie les biens illicitement acquis; Dans le cadre des parquets il y a les suivantes structures spécifiques: - La Direction Nationale Anticorruption rattaché au Parquet auprès la Haute Cour de Cassation et de Justice qui s occupe de l enquête des cas graves de corruption et d'autres infractions selon la loi et a des sous-unités territoriales au niveau des cours d'appel; - La Direction d'investigation des Infractions de Crime Organisé et de Terrorisme intégrée dans la structure organisationnelle du Parquet auprès la Haute Cour de Cassation et de Justice, compétente en poursuite pénale des infractions graves, commises par des groupes de crime organisé et terrorisme. Cette structure a des sous-unités au niveau des cours d'appel et des tribunaux. 4 C. Voicu, D. Bucur, M. Pantea, Securitatea financiară a Uniunii Europene în viziunea Tratatului de la Lisabona, vol.ii, Editura Pro Universitaria, Bucureşti, ~ 50 ~ JOURNAL OF CRIMINAL INVESTIGATIONS LA DIRECTION GENERALE DE LA POLICE ROUMAINE est l'unité de police centrale à compétence territoriale et matérielle générale qui effectue le travail de renseignement, d'enquête et de poursuite pénale sous la supervision des procureurs compétents ayant toutefois un certain degré d'autonomie; Ayant des attributions spécifiques dans la structure de La Direction Générale de la Police Roumaine il y a la Direction de la lutte contre le terrorisme et contre le blanchiment d'argent qui a comme juridiction les infractions de financement du terrorisme, le trafic de substances nucléaires, radioactives et chimiques, le blanchiment d'argent résultant des activités du crime organisé, les infractions de faux et les infractions spécifiques des marchés financiers. La Direction d investigation des fraudes est l unité spécialisée dans la prévention et la lutte contre la criminalité économique-financière. Au niveau local, il existe des structures spécialisées coordonnées par les deux directions en vertu de leurs compétences. LA DIRECTION GENERALE DE LA POLICE AUX FRONTIERES qui est compétente en ce qui concerne les infractions spécifiques du régime de la frontière d état et aussi les infractions économiques et financières commises dans cette zone; L AGENCE NATIONALE D'ADMINISTRATION FISCALE sous le contrôle du Ministère des Finances, ayant comme fonction générale l obligation de fiscaliser, y compris la mise en œuvre des politiques fiscales, la collecte de l'impôt et l établissement des relations de coopération avec les institutions partenaires. L'Agence a des attributions spécifiques concernant la valorisation des biens saisis; L AUTORITÉ NATIONALE DES DOUANES est une organisation de type administratif sans pouvoirs de police judiciaire, mais ayant toutefois la capacité de conclure des documents pouvant se constituer en actes de saisie ou en preuves dans le processus pénal. Elle effectue le contrôle de douane à la frontière et aux douanes intérieures et exerce des activités de contrôle et de vérification dans le domaine des accises; LA GARDE FINANCIÈRE qui, selon ses compétences, effectue des contrôles pour prévenir, combattre et détecter les actes de fraude et d'évasion fiscale, ayant des
51 pouvoirs de saisie et de confiscation des biens et de l'argent; L AGENCE NATIONALE POUR L'INTÉGRITÉ est une institution autonome d'enquête, mise en place pour contrôler les biens en possession des fonctionnaires du système public, juridique et administratif, dont l'activité est sous le contrôle du Parlement, ses membres étant désignés par le Sénat. Les inspecteurs de l'agence ont des pouvoirs d'enquête afin de détecter les infractions. L'activité principale de l'agence est de vérifier la conformité des déclarations de patrimoine des fonctionnaires publics en rapport avec les biens qu'ils détiennent en réalité et d'évaluer les situations de conflit d'intérêts ou d incompatibilité, d engager une action administrative s'il est constaté l'existence d'une telle situation; LE DÉPARTEMENT DE LUTTE ANTI-FRAUDE est une structure administrative créée au sein du Secrétariat du Premier Ministre et a la responsabilité d'assurer l'exécution des obligations de la Roumanie selon les dispositions de l'art. 325 du Traité sur le fonctionnement de l'union Européenne et selon la législation secondaire relative à la protection des intérêts financiers de l UE; LE BUREAU DE PRÉVENTION DE LA CRIMINALITÉ ET DE COOPERATION AVEC LES BUREAUX DE RÉCUPÉRATION DES CRÉANCES DES ETATS MEMBRES DE L'UNION EUROPÉENNE du Ministère de la Justice a été désigné par l HG 32/2011 comme Office National de Recouvrement des Créances. Le but de sa création est de faciliter la poursuite et l'identification des produits du crime et d autres biens en liaison avec le crime qui pourraient être soumis aux dispositions de blocage, de saisie ou de confiscation émises par une autorité judiciaire compétente; LE BUREAU NATIONAL POUR LA PRÉVENTION ET LA LUTTE CONTRE LE BLANCHIMENT DES CAPITAUX, structure spécialisée placée sous le contrôle du Gouvernement roumain représente l unité de renseignements financiers nationale qui a comme objet d activité la prévention et la lutte contre le blanchiment d'argent et contre le financement du terrorisme. ALEXANDRU IOAN CUZA POLICE ACADEMY 4. Quelques dysfonctionnements dans le système national de recouvrement des créances Le Protocole de 2001 additionnel à la Convention sur l'assistance judiciaire mutuelle entre les États membres UE de 2000 prévoit l'inclusion dans les législations nationales de l incrimination de l avertissement illégal (tippingoff), disposition intégrée dans la Loi 656/2002 sur la prévention et la lutte contre le blanchiment d'argent, mais ces dispositions ne couvrent pas les autres domaines qui devraient être protégés. Bien que la Décision-cadre 2003/577 de l'ue sur la mise en œuvre des injonctions de blocage des actifs ou des preuves dans les États membres de l'ue ait été transposée en droit national par la Loi 302/2004, modifiée par la Loi 222/2008, les dispositions relatives à la confiscation dans d'autres États membres n ont pas été mises en pratique, en utilisant toutefois les commissions rogatoires internationales, ce nouvel instrument juridique n'a pas encore trouvé son utilité. La Décision-cadre 2005/2012 de l'ue relative à la confiscation des bénéfices, des moyens ou des propriétés obtenus illégalement a été développée afin d assurer, dans tous les États membres, des moyens légaux adéquats et efficaces pour la confiscation. La décision impose également aux États membres d'établir des pouvoirs étendus pour saisir les biens dans certains cas, ces dispositions n'ont pas été mises en œuvre jusqu'à présent dans la législation roumaine. La Décision-cadre 2006/783 de l'ue sur l application du principe de reconnaissance mutuelle des demandes de confiscation a été transposée dans la législation roumaine par l adoption de la Loi 222/2008, mais comme les dispositions relatives à l'exécution des injonctions de blocage des actifs ou des preuves, elle n'a pas été utilisée, la voie suivie est celle des commissions rogatoires. La Décision 845/2007 du Conseil de l'ue sur la coopération entre les bureaux de recouvrement des créances a été transposée par l adoption de la DG 32/2011 par laquelle le Bureau de la prévention de la criminalité et de la coopération entre les bureaux de recouvrement des créances des États membres de l UE a été désigné comme Office national de recouvrement des créances en matière de la poursuite et d'identification des produits du crime, en relation avec les infractions. Toutefois, son insertion au sein du Ministère de la Justice, institution administrative sans compétences opérationnelles, provoque des difficultés dans la réalisation des fins pour lesquelles il a été créé et ne ~ 51 ~
52 couvre que formellement la résolution des demandes d autres ARO. En ce qui concerne la Convention relative au blanchiment, au dépistage, à la saisie et à la confiscation des bénéfices obtenus illégalement et au financement du terrorisme de 2005 elle s heurte aussi à des difficultés quant à la mettre en œuvre pratique et législative en Roumanie. Dans l'art. 4 de la Convention est prévu le blocage immédiat des biens, pas du tout prévu dans la législation nationale, ce qui implique des mesures tardives et inefficaces au cours du procès pénal en raison de la lenteur avec laquelle il progresse. Ni l art. 5 de la Convention n est pleinement mis en œuvre, parce qu il exige la formulation de certaines mesures visant à assurer le blocage des biens obtenus grâce aux bénéfices illégales. Bien que dans l'art. 118 CP il soit prévu «la situation où les biens soumis à la confiscation ne sont pas trouvés, il sera confisqué de l'argent et des biens jusqu à une valeur équivalente», cette disposition ne s'applique pas d une manière pertinente, ce qui signifie qu'il est nécessaire de faire des modifications législatives afin de renforcer la procédure prévue par la loi. Un problème particulier du système roumain est la gestion, l'enregistrement et la poursuite des biens saisis et leur manière de valorisation. Actuellement, il n'existe aucune évidence locale ou centralisée indiquant le volume de biens saisis, leur dynamique et la manière où ils ont été valorisés. A noter également l'absence d'un système de poursuite financière du condamné, de sorte qu'après la sanction privative de liberté, ou immédiatement sinon, il profitera de suite facilement des produits de l infraction, une situation qui est en total désaccord avec l'art. 6 de la Convention. Considérant conclusions de l'évaluation de MONEYVAL de 2008, révisé en 2009, le système judiciaire roumain manifeste des dysfonctionnements relatifs à la mise en œuvre inefficace de la loi sur le blanchiment d'argent, en particulier sur l'existence indépendante de cette infraction, dans la pratique elle est incriminée uniquement en présence d'une autre infraction passible d'une sanction judiciaire. En d'autres termes, il n y a pas des situations de condamnations pour l'infraction de blanchiment de l'argent sans avoir été incriminée l'infraction principale. En outre, comme dans le cas d'autres infractions, les biens qui peuvent être poursuivis et saisis sont uniquement ceux pour lesquels il y a la preuve de leur origine illicite, même si les propriétés détenues dépassent les possibilités légales d'accumulation. Il est confisqué à un trafiquant de drogue seulement les biens pour ~ 52 ~ JOURNAL OF CRIMINAL INVESTIGATIONS lesquels il y a la preuve de leurs origine illégale connue par les enquêteurs, et le reste, également acquis du produit de l infraction, demeure en possession du criminel. En outre, contrairement à la recommandation Moneyval, il est à noter qu'il n'y a pratiquement aucune possibilité de confiscation des biens appartenant à un tiers, à l'exception des articles qui ont été utilisées pour commettre des infractions, appartenant au tiers qui était au courant de leur origine illégale. Dans le cas contraire, la charge de la preuve sur la connaissance du tiers de l origine illicite des biens s'avère pratiquement impossible, même si la Convention prévoit que l'état de connaissance de l'origine illicite des biens dans la possession du tiers soit déduit à partir des circonstances concrètes et seulement sur la base des preuves irréfutables. De cette façon la durée considérable du procès pénal, jusqu à la mise en accusation et à la condamnation et la probation difficile offrent aux criminels la possibilité de cacher ou de céder les biens afin de s assurer leur utilisation ultérieure. D autres problèmes liés au recouvrement des créances Le système actuel est caractérisé par plusieurs dysfonctionnements que réalisations 5 : Le manque de personnel spécialisé dans les enquêtes financières et même l inexistence de la culture juridique spécifique à ce type d'enquête; Le modèle du bureau de recouvrement des créances est de nature administrative ayant un volet limité de tâches relatives à la coopération internationale avec leurs homologues européens sans la capacité de gérer le problème au niveau national et de formuler des politiques dans le domaine; Le grand nombre de cas où il s'agit de la collecte de la dette, sans aucune évaluation et coordination au niveau national; Un grand nombre d'institutions impliquées dans le domaine, chacune avec des compétences, des normes, des objectifs de performance différents qui traite ces affaires d une manière spécifique et séquentielle; La permanence des redondances de compétence et des priorités différentes des autorités concernées; Le sous-financement du système et le nombre réduit de personnes impliquées, souvent avec un minimum de connaissances spécifiques; 5 M. Pantea, D. Bucur, Metode şi tehnici de investigare a fraudelor, Editura Sitech, Craiova, 2009.
53 Un système non-coordonné de mise en œuvre des décisions de justice et de poursuivie financière ultérieure des condamnés; L'absence d'un mécanisme de surveillance et de gestion des biens saisis conduisant à des pertes importantes. Un obstacle majeur à la réalisation du recouvrement des créances et du découragement des actes criminels c'est la Constitution elle-même qui dans l'art prévoit: La fortune acquise légalement ne peut pas être saisie. Le caractère licite de l'acquisition est présumé. Ainsi, la charge de prouver l'origine illicite des biens reste en permanence en charge de l'accusation 6. C'est quelque chose de bien connus chez les praticiens que les faits comme le trafic de toute sorte et les infractions économiques ne peuvent pas être entièrement prouvés. Dans de nombreux cas, l objet des affaires pénales est seulement une partie des actes criminels, parce que les criminels prennent des mesures de protection en détruisant les preuves qui pourraient les incriminer, résultant ainsi un produit criminel beaucoup plus faible qu en réalité. Une enquête financière efficace peut révéler une fortune de provenance inexpliquée légalement, supérieure à celle résultant des preuves, mais le cadre juridique actuel ne permet pas une approche civile ou pénale menant à la saisie. Nous croyons qu'il est nécessaire d imposer de mesures légales pour inverser la charge de prouver la légalité de l'origine de la fortune le cas où l'accusation ou la condamnation est produite, de la sorte que la mesure de saisie soit étendue à tous les biens acquis à la suite des actes criminels. L art. 44 de la Constitution ont un impact négatif sur le volume de la confiscation des produits criminels et n est pas conforme à la Décision-cadre 2015/212/JAI du Conseil du 24 février 2005 sur la confiscation élargie des ALEXANDRU IOAN CUZA POLICE ACADEMY produits, des outils et de biens liés à l'infraction. Cela donne lieu à une limitation importante des possibilités des autorités roumaines compétentes de mettre en œuvre la mesure de la saisie. Les rapports Moneyval de 2008 et de 2009 révèlent la mauvaise performance du système roumain de confiscation du bénéfice découlant des crimes et l énorme écart entre la valeur des biens saisis et la valeur des décisions de confiscation et met également en évidence le faible nombre de décisions de justice, parfois inexistantes, de confiscation. Inquiétante est aussi l'incapacité su système roumain de mise en exécution des décisions de confiscation par les inspecteurs fiscaux de l'administration fiscale locale. Leur travail dans ce domaine est pratiquement inconnu dans l absence de toute situation statistique ou financière. Fondamentalement les organes de poursuite, les juges et personne d autre n examine le processus de valorisation des biens saisis. Des situations de ce type sont dues à l'absence d'un système cohérent, au manque de coopération entre les organes judiciaires et ceux d exécution et à la documentation insuffisante de ces derniers cas. Finalement, nous croyons qu'il est une priorité au niveau national que le système judiciaire ait un cadre juridique adéquat, qu il soit crées des structures institutionnelles à compétences opérationnelles de gestion des biens soumis à la confiscation, ayant un nombre suffisant de personnel qualifié et des fonds selon l'importance du problème, étant donnés les besoins de l acte de justice et surtout les besoins du budget de l'état et l'effet destructif qu'il peut avoir sur la criminalité. Bibliografie: 1. C. Voicu, D. Bucur, M. Pantea, Securitatea financiară a Uniunii Europene în viziunea Tratatului de la Lisabona, vol.ii, Editura Pro Universitaria, Bucureşti, I. Neagu, Tratat de Drept procesual penal, Editura Global Lex, Bucureşti, M. Pantea, Investigarea Fraudelor, vol.i, Editura Pro Universitaria, Bucureşti, M. Pantea, La criminalité économique et financière. Facteur de risque pour la sécurité nationale, Revista Curentul Juridic, anul IX, nr. 4 (47), M. Pantea, articol Antrepriza criminală în domeniul drepturilor de proprietate intelectuală, Revista Română de Dreptul Proprietăţii Intelectuale, Anul VIII, nr. 3(28) septembrie M. Pantea, D. Bucur, articol Present Legislative and Practical Aspects in the Field of Fighting Tax Evasion, publicat în 6th Edition of International confrence The European Integration - Realities and Perspectives, Editura Danubius University Press Galaţi, Volume 6/ M. Pantea, Investigarea Fraudelor, vol.i, Editura Pro Universitaria, Bucureşti, ~ 53 ~
54 JOURNAL OF CRIMINAL INVESTIGATIONS EUROPEAN LEGAL SYSTEM OF POLICE COOPERATION IN THE FIGHT AGAINST TERRORISM AND ORGANIZED CRIME Assistant Cristian-Eduard ŞTEFAN Ph.D Alexandru Ioan Cuza Police Academy Terrorism and organized crime, through the danger posed to public security, have led to the creation of defense mechanisms of the states at European level, both in legal and institutional front. This study analyzes the evolution of European legal system of police cooperation in fighting terrorism and organized crime. Keyswords: terrorism, organized crime, legal system, cooperation, police. At European level, the work of police cooperation was initiated in 1888, when three countries (Austria, Belgium and the Netherlands) decided the establishment of a joint collaboration to more effectively fight against terrorism and crime. Thus, in Hamburg has been put in place a joint information center to collect, analyze and distribute data on criminals who acted in several states 1. In the early twentieth century, judicial authorities in different countries have found it difficult to investigate certain types of crimes committed by individuals, and especially the inability to find, catch, try and convict the criminals after committing crimes, who were leaving the country, hiding in other countries. This has imposed as a great need, the cooperation between the police of the states for information, discovery, catching, trial and conviction of these categories of international offenders under national law of each State 2. Repeatedly committed anarchist attacks in several countries in Eastern Europe have led the Italian government in 1898 to organize a conference in Rome to encourage other countries to promote cooperation between police of different countries. Governments prefigured for an authority that could centralize information in each country regarding anarchy. This is done in August 1914, at the first congress of judicial police in Monaco, 1 Serge Brammertz, La coopération policière en Europe et dans l'euregio Meuse-Rhin, Deviance et Societe, vol.16/1992, p Chindea Trajan, Romanian-Hungarian cooperation between police forces in areas where the population is mostly Hungarian (doctoral thesis), Police Academy "AI Cuza "University, Bucharest, ~ 54 ~ which brought together with a personal basis magistrates, lawyers and policemen from various European countries, deciding to create centers to exchange information on criminal matters. Also it was stipulated the creation of a record of international criminals. The implementation of this ambitious project was abandoned during World War I, the idea of cooperation was resumed in 1924, during the second congress of the judicial police. It was decided then to create a permanent authority called the International Commission of Criminal Police. The Commission determined in the coming decades largely the police cooperation in criminal matters, even outside the borders of Europe. The usefulness of this Commission has been demonstrated, the discussions held have led to the creation of research centers in an increased number of countries. The consequence was a certain uniformity of police activity in different countries, especially in writing the work reports and dactyloscopy. In parallel with the work carried out within this Commission, the numerous international conferences of police carried out since the early 20s in Germany and Austria, had an influence on the expansion of certain police methods and the specific equipment of the police. There was even a police specialized literature, in those days, in Austria, Germany and France, authors such as H. Gross, H. Schneikert and E. Locard addressing in their work topics related to police practice and research, which have become professional guides in many countries 3. 3 Fijnaut, C., Tussen misdaadbestrijding en strafrechtspelging: de internationale samenwerking van de politie in West- Europa, Frankfurt, 1980.
55 The years preceding the Second World War demonstrated the fragility of the system of this commission, falling under the influence of Nazi power, who abused the organization to achieve their criminal objectives and to seek out and destroy enemies of the Nazi system. These unhappy experiences have led therefore to the statutory exclusion of the intervention area of Interpol in political, religious or racial problems. In 1946, the Commission resumed its work and was subsequently restructured in 1956, under a new name: Interpol International Criminal Police Organization (ICPO-Interpol). One of the basic principles of Interpol is that any form of cooperation is exercised respecting the national sovereignty. Jean Nepote, General Secretary of the ICPO- Interpol at the time, remarked in a speech in Brussels in 1968, that the terms of the Benelux treat are primarily an abandonment of national sovereignty. This news in police cooperation has generated many discussions in the police world, especially regarding the future direction of police cooperation. Jean Nepote referred also to the future of police cooperation in Europe, being very skeptical about such an agreement for extension to other European countries. He predicted the future of police cooperation by strengthening the structures of Interpol. The great threat in police activity of the '60s constituted the fight against drugs, with considerable repercussions on European crime. The consequence was a professionalization of the device and police activity. Some police techniques already practiced on a small scale in Europe, were used mainly in the U.S.A, such as pseudo-purchases and infiltration. Subsequent fight against international crime becoming more and more organized has required police specific methods, and especially a rapid and effective intervention. Faced with these threats, Interpol structure proved to be sometimes too difficult or slow. Thus, except the requests for judicial assistance, police cooperation is done almost entirely outside the framework of Interpol, directly between the countries' police forces 4. On the other hand, police cooperation on terrorism in the 70s could not be part of the Interpol, incompetent in political problems. The search of other effective ways of cooperation led to the idea of a European police institutions with executive power. 4 /article ~ 55 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY Since 1970 in Europe have established working groups composed of representatives of Member States. Among these, some authors mention the Club of Berne (1971), a group having as participants the heads of security services from Member States of the European Economic Community. The organization created aimed the coordination of the efforts in the suppression of espionage and international terrorism. Police cooperation developed primarily bilaterally in border areas to combat local cross-border crime. Since 1970, development of transnational crime determined the police officials to have contacts increasingly. With the adoption of the Single European Act in 1986, free movement of persons was defined as one of four main components of the single market. Along with the development of free movement of persons, the strengthening of police cooperation has emerged as indispensable in order to avoid the expansion of crime 5. Early 1990s marked a turn. On the one hand, police cooperation is strengthened by the Schengen cooperation. The convention of implementing the Schengen Agreement of 14th June 1990 contains many provisions, especially the exchange of information, the right of prosecution and of means of communication. On the other hand, police cooperation is one of the areas of EU competence. The activities are conducted in the framework of the intergovernmental third pillar. This is the context in which it was founded being European Police Office (Europol), which has the mission to support and strengthen the police authorities action and other law enforcement services in the Member States and their cooperation in preventing and combating serious crime affecting two or more Member States, terrorism and forms of crime which affect a common interest covered by a Union policy 6. Police cooperation is settled within the Convention implementing the Schengen Agreement in Section III entitled Police and security, Chapter I is suggestively called Police cooperation. According to the Convention, the Schengen police cooperation between Member States is made in the following forms: mutual assistance, border 5 Ségolène Moreau Delattre, Echange d informations et protection des données à caractère personnel dans le cadre de la coopération policière en Europe, Université Paris I Panthéon-Sorbonne, /zoom_in/ 19_fr.htm
56 surveillance, cross-border pursuit, public order and safety, exchange of information for the purpose of effective controls and surveillance at external borders; appointment of liaison officers; intensifying police cooperation in border regions by concluding bilateral agreements, creating and maintaining a common computer system, the Schengen Information System (SIS). Maastricht Treaty on European Union within Title VI entitled Provisions on cooperation in Justice and Internal Affairs, provides as a matter of common interest, police cooperation in preventing and combating terrorism, illegal drug trafficking and other serious forms of international crime, including, if necessary certain aspects of customs cooperation, in connection with the organization of a Union-wide system for exchanging information within a European Police Office (Europol). Amsterdam Treaty is a new step in the inclusion of police cooperation as an element designed to provide an area of freedom, security and justice. Thus, Article 73 of the Treaty of Amsterdam states that to create an area of freedom, security and justice, the Council adopts... measures on police cooperation which aim a high level of security by preventing crime and combating this phenomenon within the Union in accordance with the Treaty on European Union. The most significant legislations with impact on police cooperation adopted over time in Europe, are the following: The Convention of 26th July 1995 regarding the establishment of the European Police Office (Europol); The Executive Committee Decision of 16th December 1998 on the Handbook on crossborder police cooperation; The Executive Committee Decision of 28th April 1999 regarding the improvement of police cooperation in preventing and detecting crime; The Executive Committee Decision of 28th April 1999 regarding liaison officers; The Executive Committee Decision of 28th April 1999 regarding the general principles governing the payment of informers; EC Regulation nr.377/2004 of the Council of 19th February 2004 setting up a network of liaison officers in immigration; 2004/919/CE EU Council Decision of 22nd December 2004 on combating crime regarding vehicles and having cross-border implications; Decision 2005/681/JIA of the Council of 20th September 2005 establishing the European Police College (EPOLC) and repealing the Decision 2000/820/JIA; The Framework Decision 2006/960/JIA of 18th December 2006 on simplifying the exchange of information and JOURNAL OF CRIMINAL INVESTIGATIONS operative data between law enforcement authorities of Member States; EU Council Decision 2009/371/JIA of 6th April 2009 regarding the establishment of the European Police Office (Europol). At European level, in internal business domain, the complexity of unconventional threats to internal security of member states established the public recognition of the political need to contribute, through governmental measures, on the identification of additional elements to create depth opportunities to combat terrorism, organized crime and illegal migration. In the context of the increasing of different approaches on the issue of cross-border crime and the need for identifying new opportunities for cooperation which include the latest developments in various types of data storage that can quickly help identify offenders of serious transnational crime, including the use of DNA bases data, a number of representatives of EU Member States (Germany, Austria, Belgium, Netherlands, France, Luxembourg and Spain) have signed on May 27th, 2005, the Treaty of Prüm regarding the intensification of cross-border cooperation, especially in combating terrorism, cross border crime and illegal migration. The treaty aims the intensification of cooperation between the signatory states in combating terrorism, cross border crime and illegal migration through the exchange of data on genetic information (DNA), fingerprints, vehicle registrations and other personal data. The treaty also provides the constitution of joint patrols and other forms of assistance (security attendants on the board of aircraft, joint support to major events etc.). The treaty is structured in 52 articles and has two appendices that include General Information under Article 17, paragraph. (5), for the written notification that is going to be made prior to flight missions and armed attendants and service weapons, ammunition and means of intervention authorized under Article 28, paragraph. (2), sentences 1 and 2, which can be used in a common mission in the territory of another State Party to the Treaty. Express stipulations establish the rules and data protection regime and use of weapons and ammunition, in all cases of cooperation is required the obligation to comply with the provisions of national legislation of the host State. The Treaty also establishes within the Article 47 the priority of the community right on international cooperation provisions of the document, if its provisions are contrary to community right ~ 56 ~
57 The Treaty of Lisbon amending the Treaty on European Union and the Treaty establishing the European Community, in Chapter 5 entitled Police cooperation of Title V, establishes the police cooperation between Member States of the EU. Article 69F of the Lisbon Treaty states that The Union establishes a police cooperation involving all the Member States competent authorities, including police, customs and other specialized law enforcement services in the domain of preventing, detecting and investigating offences. For the implementation of these provisions, the European Parliament and the Council, acting in accordance with the ordinary legislative procedure, may establish measures concerning: (a) collecting, storing, processing and analyzing relevant ALEXANDRU IOAN CUZA POLICE ACADEMY information and exchange of information; (b) support the training of personnel, the cooperation regarding the exchange of personnel, equipment and forensic research; (c) common investigative techniques regarding the detection of serious forms of organized crime. In conclusion, European police cooperation includes the exchange of information, which is made with in the various legislative acts, such as the Convention implementing the Schengen Agreement, Europol Convention or bilateral agreements. However, we should not overlook the role of Interpol, whose field of action is beyond Europe, that the Member States often uses for exchanging information. References: 1. Chindea Traian, Romanian-Hungarian cooperation between police forces in areas where the population is mostly Hungarian (doctoral thesis), Police Academy AI Cuza University, Bucharest, Fijnaut, C., Tussen misdaadbestrijding en strafrechtspelging: de internationale samenwerking van de politie in West-Europa, Frankfurt, Ségolène Moreau Delattre, Echange d informations et protection des données à caractère personnel dans le cadre de la coopération policière en Europe, Université Paris I Panthéon-Sorbonne, Serge Brammertz, La coopération policière en Europe et dans l'euregio Meuse-Rhin, Deviance et Societe, vol.16/ ~ 57 ~
58 JOURNAL OF CRIMINAL INVESTIGATIONS ZUSAMMENARBEIT UND INFORMATIONSAUSTAUSCH BEI DER BEKÄMPFUNG VON FINANZDELIKTEN Lect. Iuliana JIDOVU Ph.D Alexandru Ioan Cuza Police Academy The article Cooperation and information exchange in combating economic crime employs the concept of economic crime as a starting point. This type of crime is one of the gravest threats to national safety, but it also causes severe material, social and moral damage. Cooperation among law enforcement agencies, judicial bodies and other state institutions can help solve and stop this phenomenon. Keywords: economic crime, financial crime, tax evasion, cooperation, information exchange. Einführung Die Wirtschaftskriminalität ist seit einiger Zeit in den Fokus der entscheidenden Strukturen gelangt, weil in ihr erhebliche Bedrohungspotenziale für Wirtschaft, Gesellschaft und Staat vermutet werden. Die durch sie verursachten wirtschaftlichen Schäden seien enorm, sie belasteten den legalen Wirtschaftsverkehr und führten im Verein mit der Organisierten Kriminalität zu einer politischen Unterwanderung. Zudem habe sich die bisherige Vorgehensweise gegen die Wirtschaftskriminalität in hohem Maße ineffizient erwiesen 1. Die Straftaten, die wirtschaftliche Bezüge aufweisen, werden unter der Bezeichnung Wirtschaftskriminalität verstanden. Die kriminellen Handlungen können sich dabei gegen Privatpersonen, andere Unternehmen oder den Staat richten. Obwohl diese Kriminalitätsart eine relativ kurze Geschichte hat, bedeutet sie eine der höchsten Gefahren, die die Staatssicherheit bedroht und gleichzeitig riesige materielle und sozial-ethische Schäden verursacht. Der Gründer der Theorie der Wirtschaftskriminalität ist der amerikanische Kriminalsoziologe E.Sutherland, der im Jahre 1939 den Begriff Weiße Kragen Kriminalität eingeführt hat. Die Wirtschaftskriminalität (Polizeikürzel: Wikri) ist als Kernbereich aller schwersten Kriminalitätsarten bekannt. Diese Sicht ist durch ungezählte geschichtliche Fakten, kritische Analysen über die Differenz zwischen geltendem Recht und tatsächlichem Wirtschaftsgeschehen, Polizeistatistiken und Alltagserfahrung bewiesen. Besonders in der letzten Zeit kann man hören, wie das Konto von der Bank oder Versicherung geplündert wurde. Aufsehenerregende Studien über die Kriminalität von Großunternehmen haben schon früher gezeigt, was seit den 70er Jahren auch in Europa unter Fachleuten intern unbestritten ist, dass Wirtschaftskriminalität (Sutherland nannte sie white-collar-crime ) - auch wenn man sie nur in Geldbeträgen ausdrückt - höhere Schäden verursacht als alle übrigen Kriminalitätsformen zusammen. Es gelang Sutherland mit seinen Untersuchungen erstmals, der traditionell nur an Gewalt- und Armutskriminalität interessierten Kriminalsoziologie den wissenschaftlichen Beweis vorzulegen, dass es nicht nur die blue-collarcrime der kleinen Leute, sondern auch eine Kriminalität der feinen Leute gab. Er nannte sie - um im Bild von der Kriminalität der Leute mit dem blauen Kragen zu bleiben - Weiße-Kragen- Kriminalität 2. Er hätte sie besser Weiße-Westen- Kriminalität nennen sollen. Denn auch die abhängig beschäftigten kleinen Angestellten tragen weiße Kragen, was dazu verführt, auch deren wirtschaftsschädliche Straftaten der Wirtschaftskriminalität zuzuordnen. Seine Theorie der differentiellen Kontakte wurde zu einer der einflussreichsten soziologischen Kriminalitätstheorien. Sutherland geht davon aus, dass kriminelles Verhalten in Interaktion mit anderen Personen in einem Kommunikationsprozess gelernt wird. Wichtig ist für Sutherland, was gelernt werden muss, damit es zu kriminellem Verhalten kommt. Für ihn schließt das Lernen kriminellen Verhaltens zweierlei ein: das Erlernen der Techniken zur Ausführung des Verbrechens (die sogenannten modi operandi) und das Erlernen der spezifischen 1 Wirtschaftslexikon.gabler.de/Definition/wirtschaftskriminal ität; 2 Sutherland, Edwin H. (1949), White Collar Crime, New York; ~ 58 ~
59 Richtung von Motiven, Trieben, Rationalisierungen (d. h. verstandesmäßigen Rechtfertigungen) und Attitüden (Einstellungen). 3 Wichtig zu erwähnen ist, dass die Wirtschaftskriminalität nicht nur von den wirtschaftlichen Beziehungen beeinflusst wird. Auch die sozial-politischen, kulturellen, psychologischen und Rechtsbeziehungen bilden den günstigen Rahmen zu solchen strafrechtlichen Taten. Wirtschaftsstraftäter verstossen nicht nur gegen strafrechtliche Normen. Sie berühren Rechtsgebiete des Strafrechts (Betrug), des Verwaltungsrechts (Bankengesetz), des Privatrechts (vertragliche Vereinbarungen mit Anlegern werden nicht eingehalten). Die wirkungsvolle Bekämpfung der Wirtschaftskriminalität hat eigentlich die bekannte 3-Schwerter-Theorie 4 zugrunde. Die Strafverfolgungsbehörde kann nicht alleine alle drei Rechtsgebiete abdecken. Die Zusammenarbeit und auch ein Informationsaustausch mit anderen Behörden und Institutionen ergänzen sich in der Bekämpfung der Wirtschaftskriminalität. Wir werden in den folgenden einige Möglichkeiten erwähnen, die eigentlich die Teamarbeit als Hauptpunkt in die Diskussion bringen. Zusammenarbeit innerhalb der eigenen Polizeiorganisation Bei der Bekämpfung der Wirtschaftskriminalität durch die Polizei ist Teamarbeit gefragt. Anders ist es nicht möglich, die oftmals riesigen Aktenberge zu bearbeiten und das nötige Fachwissen einzusetzen. Es ist wichtig, im Team die Stärken des Einzelnen zu erkennen und zu nutzen. Jemand ist vielleicht besonders geschickt bei der Auswertung von Buchhaltungsunterlagen, andere wiederum kennen sich in der Befragungstaktik aus. Die Teamarbeit hat einen weiteren Vorteil. Wirtschaftsstraffälle beschäftigen die Ermittler meist über Monate oder Jahre. Das Team hilft mit, während dieser Zeit die Motivation zu erhalten. Ermittlungen in Wirtschaftsdelikten sind nicht nur Sache von Finanzspezialisten. Die Zusammenarbeit mit der Uniformpolizei, welche sich vor Ort und in Bezug auf bestimmte Personen oftmals besser auskennt als die Kriminalpolizei, kann durchaus angezeigt sein. Zur Spurensicherung oder zur Dokumentation einer Situation im Falle einer Hausdurchsuchung können Kriminaltechniker dem Finanzermittler zur Seite stehen. Schließlich setzen Wirtschaftstäter meist Informatikmittel ein, so dass 3 Han See /Eckart Spoo (Hg.), Wirtschaftskriminalität kriminelle Wirtschaft, Distel Verlag, Heilbronn, 1997; 4 Christoph Müller KMU und Wirtschaftsförderung: Ergebnisse einer explorativen Studie, Sankt Gallen, 1999; ~ 59 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY es sich empfiehlt, Kollegen mit Spezialwissen auf diesem Gebiet beizuziehen. Zusammenarbeit mit der Justiz Das Zusammenwirken von Polizei und Justiz ist absolut zentral bei einer erfoglreichen Finanzermittlung. Wenn alle Untersuchungsschritte nicht in Verbindung sind, dann gehen viele Informationen auf diese Weise verloren und Doppelspurigkeiten zögern die Ermittlung hinaus. Polizei und Justiz sind ein Team und müssen bei Ermittlungen laufend auf demselben Informationsstand sein. Grundlage für ein erfolgreiches Resultat ist die Vertrauensbasis zwischen dem Finanzermittler und dem zuständigen Staatsanwalt. Für die Zusammenarbeit spielt der Europäische Haftbefehl eine wichtige Rolle, besonders in der gegenseitigen Anerkennung von Auslieferungsversuchen. Auf diese Weise wurden die Rahmenbeschlüsse erlassen, die die wechselseitige Anerkennung und Vollstreckung von Geldstrafen und Geldbußen vorsehen 5. Hierzu kommt ein Beschluss über den Austausch von Informationen aus dem Strafregister 6. Internationale Zusammenarbeit zwischen Justizund Polizeibehörden In der Praxis funktioniert die internationale Zusammenarbeit genug schwierig und trotzdem ist sie von großer Bedeutung bei der Bekämpfung von Wirtschaftsdelikten, welche oft über die Landesgrenzen hinaus begangen werden. Interpol spielt eine bedeutende Rolle, und zwar sowohl bei der eigentlichen Rechtshilfe zwischen Justizbehörden, als auch beim polizeilichen Nachrichtenaustausch. Durch die informellen Kontakten, welche von Interpol oder von FBI gefördert werden, kann man auf einen raschen Informationsaustausch zukommen. Nur die Informationen, die auf dem offiziellen Interpolweg ausgetauscht werden, können in einem Verfahren vor Gericht verwertet werden. Auch die Abschöpfung des durch Drogen- und Menschenhandel und durch Wirtschaftskriminalität erzielten Vermögens ist ein wesentliches Mittel im Kampf gegen die internationale Kriminalität; es ist die Rede über ein Abkommen zwischen der Republik Österreich und den USA über die Aufteilung entzogener Erträge aus Straftaten. Zusammenarbeit und Informationsaustausch mit anderen Behörden 5 Rahmenbeschluss 2003/577/JI des Rates vom über die Vollstreckung von Entscheidungen üner die Sicherstellung von Vermögensgegenständen oder Beweismitteln in der EU Abl. L 196 vom ; 6 Beschluss 2005/876/JI des Rates vom über den Austausch von Informationen aus dem Strafregister, Abl. 322 vom ;
60 Zum Unterschied von der Zusammenarbeit zwischen Justiz- und Polizeibehörden, die gesetzlich klar geregelt ist, erscheint dieser Versuch in Verbindung mit anderen Behörden sehr schwierig; das Spannungsfeld zwischen Amtsgeheimnis und Informationspflicht erschwert diese Zusammenarbeit. Bei der Verfolgung von Wirtschaftsdelikten können verschiedene Behörde ihre Rolle beweisen. Zum Beispiel: Die Meldestelle Geldwäscherei. Zwischen dieser Stelle und den Strafverfolgungsbehörden ist weitgehend gesetzlich geregelt. Bei den Vorermittlungen kann diese Stelle wichtige Auskünfte erteilen, weil sie Zugriff auf nationale und internationale Datenbanken im Zusammenhang mit Geldwäscherei hat. Die Bankenaufsicht. Diese Behörde unterstützt bei der Verfolgung von Anlagebetrügern, welche ohne bankengesetzliche Bewilligung agieren. Die Steuerbehörden. Die Zusammenarbeit funktioniert sehr gut bei der Bearbeitung von Steurbetrugsfällen. Es ist die Rede von Steuerhinterziehung mit Hilfe gefälschter Urkunden; diese Urkunden müssen von der Steuerverwaltung als auch von der Strafverfolgungsbehörde bearbeitet werden. Die Polizei kann die Steuerbehörden bei Verdacht auf einen Hinterziehungstatbestand informieren. Diese Informationen sind für den Fiskus im Rahmen der polizeilichen Vorermittlungen von großer Interesse. Sozialversicherungen. Auch die Beiträge an den Sozialversicherungen vertreten eine wichtige Geldsumme für die Volkswirtschaft aber auch für uns alle. Zusammenarbeit und Informationsaustausch zwischen den Behörden der Mitgliedstaaten Behörden der Mitgliedstaaten des europäischen Wirtschaftsraums (EWR), die an der Anwendung und Durchführung von Regeln des Binnenmarktes arbeiten, müssen zusammenarbeiten, um sicherzustellen, dass die Regeln in einer effektiven und konsequenten Weise angewandt werden. Das Binnenmarkt-Informationssystem 7 (IMI) wird entwickelt, um die Kommunikation zwischen den Behörden der Mitgliedstaaten zu verbessern. Das IMI ist ein elektronisches System für den Austausch von Informationen, mit dessen Hilfe die Mitgliedstaaten bei der alltäglichen Anwendung der Binnenmarktvorschriften effizienter zusammenarbeiten können. 7 ec.europa.eu... Binnenmarkt IMI ~ 60 ~ JOURNAL OF CRIMINAL INVESTIGATIONS Analyse, Informationsaustausch und Terrorismusprävention haben als Ziel den Ausbau von grenzüberschreitenden Informationssammlungssystemen 8 und Austausch von Criminal- Intelligence-Information sowie Aufklärungsinformation von Financial Units, bezogen auf Organisierte Kriminalität (speziell Finanzdelikte), illegalen Drogenhandel und Terrorabwehr. Die EU wird weiterhin Transparenz und einen wirksamen Informationsaustausch zwischen den Behörden fördern, um den Kampf gegen Korruption und Unternehmens - und Finanzdelikte zu verstärken. Bei der aktiven Förderung bewährter Praktiken gemäß der Mitteilung der Kommission über die Verhütung und Bekämpfung von Unternehmens- und Finanzdelikten könnte sich das Programm Fiscalis auch als nützliches Instrument für Reformen in den sogenannten kooperativen Steueroasen und allgemein in den Partnerländern der EU erweisen. Es gilt insbesondere mit Blick auf die komplexen und undurchsichtigen Strukturen (einschließlich bestimmter Derivate) mancher Tochtergesellschaften sowie die Zweckgesellschaften, auf die manche Unternehmen zur Begehung und Verschleierung von Finanz- und Steuerdelikten zurückgreifen, neue Methoden der Verhütung 9 und Bekämpfung von Finanzdelikten zu entwickeln. Die Schaffung des Binnenmarktes und damit die Beseitigung von Hindernissen begünstigt nicht nur rechtmäßiges geschäftliches Handeln, sondern könnte auch Geldwäsche und Wirtschaftskriminalität erleichtern. Daher wurden europäische Rechtsvorschriften erlassen 10, um das Finanzwesen wie auch andere verwundbare Berufszweige und Betätigungsfelder vor dem Missbrauch durch Geldwäsche zu schützen. Hinzu kommen die verschiedenen Strategien der Bekämpfung von Finanzdelikten, der Geldwäsche und der Kriminalität im Internet. Gemeinsame Aufwände in der Ausbildung von Spezialisten im Bereich der Betrugsbekämpfung Diese Koordinierungsbemühungen haben ihr Pendant in der Forschung. Bei der Bekämpfung von Betrug und Verbrechen sind wir auf die laufenden Fortschritte in der Metrologie zur Identifizierung und Aufdeckung von Straftaten und ihren Tätern angewiesen. 11 Die wissenschfatlichen 8 Projekt "DET-ILECUs II" - Zweite internationale Konferenz in Zadar, Kroatien; 9 eur-lex.europa.eu; 10 ec.europa.eu... Binnenmarkt - Gesellschaftsrecht ; 11 Kimmo Himberg Sachverständiger am finnischen Labor für Verbrechensforschung - Konferenz Towards an integrated infrastructure for measurements, im Juni 2002 in Warschau;
61 Grundlagen sind in vielen Disziplinen noch ungewiss, deshalb wird der Informationsaustausch zudem umso dringender, je mehr sich das Verbrechen internationalisiert. Und wir brauchen mehr Methoden zur schnellen Verifikation, unmittelbar an den Tatorten selbst unterstreicht Kimmo Himberg. Die Europäische Kommission unterstützt finanziell das Europäische Amt für Betrugsbekämpfung (OLAF) durch das Förderprogramm Hercule II (Schulungsmaßnahmen im Bereich der Betrugsbekämpfung). Es handelt sich über die genannten Tätigkeiten, wie: Schulungen, Seminare und Konferenzen. Für die im Jahre 2012 zu finanzierenden Maßnahmen hat die Kommission folgende Prioritäten 12 festgelegt: 1.Informationsaustausch über verdächtige Transaktionen zum Zwecke der Betrugsbekämpfung: Bank-, Treuhand- und Steuergeheimnis sowie wirksame Amts- oder Rechtshilfe bei Wirtschaftsdelikten; 2. länderübergreifende Unternehmensstrukturen und (zivil- und strafrechtliche) Haftung für Finanzdelikte. ALEXANDRU IOAN CUZA POLICE ACADEMY Schlussbemerkungen Im Zusammenhang mit der Zusammenarbeit und dem Informationsaustausch gilt es abschließend folgendes zu bedenken: Unsere Gegenseite (die Kriminellen) arbeiten bestens zusammen; Informationsaustausch ist keine Einbahnstrasse, im Sinne, die Behörden müssen bereit sein, auch eine Gegenleistung zu erbringen; Zusammenarbeit mit anderen Behörden oder auch privaten Institutionen ist ein Lernprozess, welcher alle Beteilligten weiter bringt. Die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) hat in der letzten Zeit zwei neue Berichte hinsichtlich des Informationsaustausches und des Steuergeheimnises. Eine solche gemeinsame Entscheidung unterstreicht den Aufwand zur Verstärkung einer internationalen Zusammenarbeit in der Bekämpfung der Steuerflucht und der Betrugskriminalität. Bibliografie: 1. europa.eu/anti_fraud/documents/legal-training 2. Han See /Eckart Spoo (Hg.), Wirtschaftskriminalität kriminelle Wirtschaft, Distel Verlag, Heilbronn, 1997; 3. Beschluss 2005/876/JI des Rates vom über den Austausch von Informationen aus dem Strafregister, Abl. 322 vom ; 4. Christoph Müller KMU und Wirtschaftsförderung: Ergebnisse einer explorativen Studie, Sankt Gallen, 1999; 5. ec.europa.eu... Binnenmarkt - Gesellschaftsrecht ; 6. eur-lex.europa.eu 7. Kimmo Himberg Sachverständiger am finnischen Labor für Verbrechensforschung - Konferenz Towards an integrated infrastructure for measurements, im Juni 2002 in Warschau; 8. Rahmenbeschluss 2003/577/JI des Rates vom über die Vollstreckung von Entscheidungen üner die Sicherstellung von Vermögensgegenständen oder Beweismitteln in der EU Abl. L 196 vom ; 9. Sutherland, Edwin H. (1949), White Collar Crime, New York; 10. Wirtschaftslexikon.gabler. de/definition/wirtschaftskriminalität; 11. ec.europa.eu... Binnenmarkt IMI 12 europa.eu/anti_fraud/documents/legal-trening. ~ 61 ~
62 JOURNAL OF CRIMINAL INVESTIGATIONS REFLECTIONS ON THE ACTIVE SUBJECT AND THE ESSENTIAL CONDITIONS FOR THE OFFENSE OF BRIBE RECEIPT Lect. Ionuţ Andrei BARBU, Ph.D Alexandru Ioan Cuza Police Academy This paper presents an approach that combines theory with practical legal examples of issues related to the active subject and the essential conditions for the commission of the offense of receipt of bribes, which is a corruption offense contained in article 254 paragraph1 of the Criminal Code and article 254 paragraph 2 of the Criminal Code in an aggravated variant and in conjunction with article 7 of Law No.78/2000 on preventing, discovering and sanctioning corruption acts. The first part exposes those categories of persons who can assume the quality of the active subject of this crime, and the second part explains in detail the essential conditions for the commission of this offense. Keywords: receipt of bribes, active subject, essential conditions, official, public official According to the provisions of article 254 of the Criminal Code, the legislator has criminalized under the name receipt of bribes the act of an official who, directly or indirectly, demands or receives money or other benefits to which he is not entitled, or accepts a promise of such an advantage or does not reject it in order to perform, not to perform 1 or delay the performance of an act concerning the duties of his office or in order to perform an act contrary to these duties. Preexisting conditions A. Object of the offense. a) Special legal object. Receipt of bribes has as special legal object the social relations referring to the optimum and honest performance of their duties by the public servants and other officials 2. b) The material object. The receipt of bribes as an offense does not have a material object, not even in exceptional cases 3. B. Subjects of the offense. a) Active subject of the offense of receipt of bribes can only be a public 1 The offense of a police officer consisting in the receipt of undue benefits in exchange for not filing documents related to the criminal investigation of a traffic offense and for not filling in the police report that he has pulled the driver over for a traffic control constitutes the offense of bribe receipt for the failure to perform an official duty, but not the offense of intellectual forgery by omission, the latter offense being part of the objective element of the receipt of bribes. (The Supreme Court of Justice., Criminal division, decision no. 3952/2001; 2 See O. Loghin, T. Toader, Romanian Criminal Law. The Special Part, fourth edition, Chance Publishing and Media House Lmt., Bucharest, pp See I.Pascu, M.Gorunescu, Criminal Law. The Special Part, Hamangiu Publishing House, Bucharest, 2008, pp ~ 62 ~ official or an official 4. Co-participation is also possible, but for it to exist the perpetrators should have the legally required the special quality of the offender. Any person can be an instigator or an accomplice. The accomplice cannot have the same quality as the perpetrator of the crime 5. We believe that the briber is not a participant to the receipt of bribes, but the perpetrator of a different crime (offering of bribes). According to art. 147 par. (1), the term "public official" means any person exercising, in any form and regardless of how it was invested, a permanent or temporary assignment of any kind, remunerated or not, in the service of a unit referred to in article 145 of the Criminal Code. The term "public" means everything that concerns the public authorities, the public institutions or other legal persons of public interest, the administration, use or exploitation of public assets, services of public interest, and property of any kind which is of public interest under the law. An employee cannot be an active subject of the offense consisting in the receipt of bribes as long as he is not an official according to the meaning attributed to this term by art. 254 of the Criminal 4 If the perpetrator while committing the offense did not have as an official responsibility to perform that action, but he implies that he had, then he is guilty of committing fraud. (art. 215 of the Criminal Code). 5 In a case the defendant, who was the warden of a students hostel, received money and goods from various students to facilitate their lodging with the help of the door keeper. The defendant was convicted of bribe receipt and the door keeper for being accessory to the offense of bribe receipt. (Suceava Appeals Court, decision no. 316/2001, Law Journal no. 6/2002, p. 176).
63 Code, if he receives material benefits so as not to fulfill the general obligation to guard against thefts from his workplace as stipulated in the employment contract by virtue of which he had been hired in the position of electrician 6. The following persons can also be active subjects of a crime 7 : the persons performing a public function, regardless of how they were vested as public authorities or in public institutions; the persons who, under the law, permanently or temporarily perform a function or task, if they participate in or may influence the decision making in public services, autonomous administrations, trade companies, national companies, co-operative associations or other economic agents; the persons performing duties of control according to the law; the persons who, regardless of their quality, implement, control or offer specialized assistance if they participate in or may influence the decision making concerning operations which involve the movement of capital, bank transactions, currency exchange or credit operations, placement operations in scholarships, insurance, mutual investment or regarding bank accounts and the assimilated accounts, domestic and international commercial transactions; the persons who hold a leading position in a political party or faction, a trade union, employers' organization or an a non-profit organization or foundation; other natural persons than those mentioned above as provided by the law. The offense of receiving bribes can also be committed by the following active subjects 8 : managers, directors, administrators, auditors or other persons with control responsibilities in trade companies, national companies and businesses, autonomous companies and any other economic agents; officials or persons operating under an employment agreement or other persons having similar responsibilities within an 6 The Supreme Court of Justice, Criminal division, decision no of J , www. legalis. ro 7 Art. 1 of Law no. 78/2000 on the prevention, detection, and sanctioning of corruption acts, published in the Official Gazette no.219 of May, 18, Art. 8 and art.. 81 of Law no. 78/2000 on the prevention, detection, and sanctioning of corruption acts. ~ 63 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY international public organization of which Romania is a member; members of parliamentary assemblies of international organizations of which Romania is a member; officials or persons operating under an employment agreement or other persons having similar responsibilities within the European Communities; persons having judicial positions within the international courts of law whose jurisdiction is accepted by Romania, as well as officials from the administrative offices of these courts; officials of a foreign state; members of parliamentary or administrative assemblies of a foreign state; Constitutive content A. The objective element. a) The material element. The receipt of bribes can take the form of the material element, either by an action or inaction. The action may consist of demanding or receiving money or other undue benefits by the offender, or in accepting the promise of such benefits, and the inaction consists in the acceptance of such promises. To claim something is to ask something, to make a claim. This method of committing the crime is represented by the initiative which belongs to the perpetrator. The claim does not need to be satisfied. To receive something means to take possession of something. In this case, the initiative belongs to the briber and receiving is not conceivable without his remittance 9. To accept a promise is to express consent to the promise made by someone. The acceptance always involves accepting an offer. To not reject a promise means not to express disagreement with someone s promise. Acceptance of a promise can not be conceived without the promise made by another person. 9 On the 22nd of January 2013, officers of the Bucharest Division for Fighting (S.A.M.B.) conducted by the prosecutor from the Prosecutor s Office of the Bucharest Tribunal, organized a sting operation and caught D.Z., an expert photographer while he was receiving a bribe amounting to 500 lei from the denouncing witness D.C. in exchange for the favorable performance of a topographic survey. Actually, on the 6th of December 2012, the defendant D.Z. was appointed by the Buftea Court of Justice as an expert for the performance of a topographic survey in a case, the fee set by the court for this activity amounting to 1000 lei, which was paid to the denouncing witness at the beginning of January 2013 (
64 b) Essential conditions: 1. Solicitation, receipt, acceptance or nonrejection of a promise must relate to money or other benefits. Money means banknotes or domestic or foreign divisional currency serving as legal tender and performing the functions of value measure, means of circulation, payment and accrual. Securities and assets of any kind, even if they have a cash value if they are assimilated to money, can not be included in this concept because they do not have this meaning from an economic or legal point of view. They are included in the generic concept of "other benefits" and the use is understood as material or moral gain, benefit, profit or advantage. The literature defines material benefits as any material gain (goods, commissions, loans, sale or purchase, debt deferment or suspension, free services or services rendered on favorable terms, simultaneous sales, advantageous exchanges for the public official or the deliberate loss at gambling in favor of others etc.), but also non-material, moral benefits, (such as granting of academic, university, scientific, cultural, artistic, sports titles and decorations, awards, military ranks etc.) Money or other benefits covered by the action or inaction of the offender must constitute undue benefits. This means the offender is not entitled to claim or receive them. These are considered undue benefits not only when the offense is willingly committed, but also when the public official claims, receives, accepts or does not reject money or any other benefits, which are beyond what is legal and are owed for the act performed or the service rendered The typical offense must be committed prior to 12 or concurrently with the completion, failure or delay of the act that is the official responsibility of the public servant 13. If the offense is committed 10 See: V. Dobrinoiu, Corruption in Romanian Criminal Law, Atlas Lex Publishing House, Bucharest, 1995, p.173; 11 Guide for fighting corruption, 2009, htpp: 12 The act of claiming and receiving undue benefits by a public official after the partial performance of an official duty, but before its completion, constitutes the offense of bribe receipt, but not the offense of receiving undue benefits. Therefore, the approval of a request by a competent official, but the refusal to inform the applicant about the decision before he receives a sum of money means the official imposes the condition of being offered a material benefit in exchange for the performance of an official duty and not receiving the benefit as an undue reward for the performance of the act. (The Supreme Court of Justice, Criminal Division, decision no. 473 of , 13 The job responsibilities of the defendant consist in the weighting of the fire wood purchased from private sellers ~ 64 ~ JOURNAL OF CRIMINAL INVESTIGATIONS after the performance of the act it is a case of receiving undue benefits, unless the agreement about the receipt of benefits has occurred before the performance of the act; 4. It is compulsory that the act, for which performance or failure to perform the public official claims, receives money or benefits, be part of his official duties, which means that the act should concern his official duties. This requirement is critical to the existence of the offense of bribe receipt, as it is a job-related offense, it can not be used against an official unless a breach of obligations within his competence occurred. When the person responsible for the management and control of activities receives benefits to directly perform them, he/she is an active subject of the offense of bribe receipt 14. The acts regarding the duties of a public official also refer to the acts which usually are the direct responsibility of another official, but which the managing person - such as the mayor - can perform directly 15. c) Immediate consequence. The commission of the offense of bribe receipt can endanger the social interactions occasioned by the activity performed by the public authorities, institutions and other organizations stipulated in article 145 of the Criminal Code or by any other legal entity. d) Causality relation. If the offense of bribe receipt takes place, the causality relation between the criminalized act, which is the substantive element of the offense, and the immediate consequence derived from the materiality of the offense committed by the active subject. and in the filling out of information on the purchase receipt, a document which allowed the cash payment of the sellers. The defendant was received grafts from the private sellers without making a prior agreement with them. Yet, the price had been set by the managerial board of the company, not by the defendant. Therefore, it cannot be considered that the amounts of money and the wood received were in any way connected to the defendant s job so as to consider that he committed the offense of bribe receipt, but only that he received these benefits after he was weighting and filling out the purchase receipts, which is a continued offense of receiving undue benefits stipulated by the article 256 and the enforcement of art. 41 paragraph (2) of the Criminal Code. The offense of the defendant, who received from each of the two employees lei to perform his official duties for their benefit, constitutes a single continued offense of receiving bribes as stipulated by art. 254 par. (1), but not concurrent offenses. (Galaţi Appeals Court, decision no. 43/1993, www. legalis.ro) 14 M Udroiu, Criminal Law. General Part. Special Part, 2nd Edition, C. H. Beck Publishing House, Bucharest, 2011., p.405; 15 (The Supreme Court of Justice, Criminal Division, decision no. 605 of , www. legalis.ro)
65 B. The subjective element. The offense of receiving bribes is committed with direct intention. 4. Forms. Methods. Penalties A. Forms. The acts of preparation and attempt to commit the offense of receiving bribes are not possible. The literature shows that the receipt of bribes is a spontaneous offense, susceptible of anticipated commission as the mere act of claiming, accepting or non-rejection of a promise constitutes the offense 16. It is our firm belief that there cannot be a continued offense of bribe receipt if the receipt of money or other benefits occurs at different time intervals, thus there cannot be a single and durable resolution to a spontaneous offense. Also, there will never be a continued offense even if this has been committed instantaneously and the benefits have been divided and paid in installments. The continuity of the offense is not determined by the benefits claimed or received at different time intervals, but by the claim to receive these benefits at certain moments, as it is well-known that the continued offense is committed at different time intervals. If the offender commits more of the alternate variants of the substantive element of the offense, only one instance of the offense of bribe receipt will be taken into consideration, and not the concurrent offenses or the continued offense. In this case the offense has been committed when the first criminal act occurred. If the perpetrator claims or receives amounts of money from several people, without being any connection between them, in exchange for the performance of the same act within his/her remit, the concurrent offenses will be taken into consideration and not the continued offense 17. B. Methods. Apart from the standard method provided by article 254 of the Criminal Code, the offense of bribe receipt can occur in aggravating circumstances, which are determined by the special quality imposed on the active subject that of a public official having duties and responsibilities of control or detection and sanctioning, or detection, prosecution and trial of offenses See S. Kahane, Job offenses and job-related offenses, in V. Dongoroz et al., Theoretical Explanations of the Romanian Criminal Code. Special Part, vol. IV, The Academy Publishing House, Bucharest, M Udroiu, op.cit, p Art. 7 - Law 78/2000 on the prevention, detection, and sanctioning of corruption acts: (1) The offense of bribe receipt stipulated by the art. 254 of the Criminal Code, if committed by a person who under the law has responsibilities of detection and sanctioning of minor offenses or of detection, prosecution and trial of offenses, is punishable as stipulated by art. 254 paragraph ~ 65 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY The public official having responsibilities of control, as stipulated by article 254 paragraph (2) of the Criminal Code, refers to the employee whose duty is to perform a complex task of investigating and analyzing some situations in order to pursue their development and propose or take remedial action. According to these criteria, the public guardian, who performs his guard in an institution, whose duties are determined by his pursuit of security, surveillance and guarding activity and limited to the identification, detection and prevention of breaches of rules imposed by the job, cannot be considered a public official having control responsibilities 19. The receipt of bribes is stipulated in article 254 paragraph (2) of the Criminal Code concerning the perpetration of an act by an official with control responsibilities, if this category of the public official s duties results from the job description or laws, and the claim or receipt of money or other undue benefits, the acceptance of the promise to be offered such benefits occur while this person is exercising his/her control duties in order to accomplish or not or postpone the performance of an act within his control responsibilities. in the exercise of control, in order to perform, not to perform or delay in performing any act concerning powers of control 20. C. Penalties. The receipt of bribes is punishable by imprisonment from 3 to 12 years and suspension of certain rights [paragraph (1)]. For the aggravated offense stipulated in paragraph (2) of Article 254 of the Criminal Code and article 7 of Law 78/2000, the punishment is imprisonment from 3 to 15 years and suspension of certain rights. The maximum punishment shall be increased by five years if the receipt of bribes is committed on behalf of a criminal organization, association or group or of one of its members or in order to influence the international trade negotiations or international trade or investments of the Criminal Code concerning the commission of the offense by an official with control responsibilities. (2) The offense of bribe receipt committed at the disadvantage of the persons stipulated in paragraph (1) or an official with control responsibilities is punishable as stipulated by art. 255 of the Criminal Code, and the maximum penalty is increased by 2 years. (3) If the offenses stipulated by art. 256 and 257 of the Criminal Code and those stipulated by art. 61 and 82 of this law have been committed by one of the persons mentioned in paragraphs (1) and (2), the maximum penalty is increased by 2 years. 19 M Udroiu, op.cit, p The Supreme Court of Cassation and Justice, Criminal division, decision no. 4976, October, 24, 2007, 21 Art. 9, Law no. 78/2000.
66 The money, goods or any other assets that have been the object of bribe receipt will be confiscated and, in the event these have not been found, the JOURNAL OF CRIMINAL INVESTIGATIONS defendant must pay the equivalent amount of money [article 254 paragraph (3)]. References: 1. I Udroiu, Criminal Law. General Part. Special Part, 2nd Edition, C. H. Beck Publishing House, Bucharest, I.Pascu, M.Gorunescu, Criminal Law. The Special Part, Hamangiu Publishing House, Bucharest, Law Journal no. 6/ Law no. 78/2000 on preventing, discovering and sanctioning corruption acts, published in Official Gazette no.219, May, 18, O. Loghin, T. Toader, Romanian Criminal Law. The Special Part, fourth edition, Chance Publishing and Media House Lmt., Bucharest, V. Dobrinoiu, Corruption in Romanian Criminal Law, Atlas Lex Publishing House, Bucharest, V. Dongoroz et al., Theoretical Explanations of the Romanian Criminal Code. Special Part, Volume IV, The Academy Publishing House, Bucharest, ~ 66 ~
67
68 JOURNAL OF CRIMINAL INVESTIGATIONS 68
69 ALEXANDRU IOAN CUZA POLICE ACADEMY ASPECTS OF CRIMINALITY: INTELLECTUAL PROPERTY, FORGERY AND COUNTERFEITING Lect. Gabriela ŞERBĂNOIU Ph.D Alexandru Ioan Cuza Police Academy The global economy depends on the creation and distribution of intellectual property (IP) to grow. But more and more, the economy suffers from IP theft, or counterfeiting and piracy. As global trade increases and technology advances, fake products such as clothing and accessories, cosmetics, pharmaceuticals, auto parts, software, music, films, and everything in between are making their way to markets around the world. Keywords: counterfeiting, fake products, protected right, pirated goods A distinctive chapter in a course addressed to law enforcement students should, by all means tackle these aspects of criminality and the teaching sessions, I imagine, should start with a preliminary discussion focused on questions such as: Do you own any counterfeit or pirated goods? Does the trade in counterfeit goods impact specific countries or regions? How? What do you think about the role and meaning of intellectual property in a world where information is instantly and equally accessible across the globe? How does piracy and/or counterfeiting impact you directly? Would you purchase counterfeit and/or pirated products? Why or why not? Would you download pirated movies or music? Why or why not? If people stopped buying fake products, would people stop selling them because there would be no profit? What do you think should be done to stop counterfeiting and piracy? Theory will always be theory. Although some intellectual property rights come into existence on the creation of their subject matter, most intellectual property rights are not recognized by law until a process of registration is completed. Patents for inventions, trademarks, and some types of design are generally subject to registration systems. Patents protect inventions that are new, nonobvious, and industrially applicable. Trademarks protect words, names, logos, product packaging, and shapes, among other things, that enable the consumer to distinguish the goods or services of one business from those of another. Designs protect the aesthetic and not totally functional elements of the shapes of manufactured products. Registration of each of these rights enables others to ascertain: the nature of the right protected; legal entitlements of owners and users of the right; and information from which the expiry date of that right can be calculated. Registration is not synonymous with examination: It may follow a rigorous, often interactive application procedure over a period of months or years this is usually the case for patents and trademarks or it may only require a deposit, as in the case of some designs. Intellectual property is knowledge or expression that is owned by someone. There are three major types of intellectual property: creative works, including music, written material, movies, and software which are protected by copyright law; inventions, which are protected by patent law; brand-name products, which are protected by trademarks. Intellectual property crime (IPC) involves the counterfeiting and piracy of goods. These include: Digital media, such as software and games Fashion wear Luxury clothing and footwear Pharmaceuticals Automotive parts, electrical items and other manufactured goods Counterfeiting and distributing these goods requires different levels of expertise or techniques and attracts criminals of all types. For organized criminals, IPC is attractive because it offers a high financial return from, typically, a low investment. Globally, IPC occurs on a vast scale. More open borders and increased international trade make it ~ 69 ~
70 easier for fake goods to flow across continents. Advances in technology have also made it easier to mass produce fake items. The best of them are of such high quality that they re hard to tell from the real thing. How can anyone tell if something is fake? Price, packaging and where it s on sale are three indicators to whether goods are counterfeit. However, it s not always easy to tell the difference. Packaging is often hard to spot, as it s made to look like the real thing as much as possible. Often, it even carries the trade marks of genuine manufacturers. Many fakes are of inferior quality, and the impression given is that they are end of line or stolen rather than fake. With some luxury goods, such as watches, fakes are offered for sale at or near the normal price to reinforce the idea that they are genuine. Internet auction sites are an attractive outlet for fake digital media DVDs, software and music - and many sites are working hard to limit criminal opportunities. Counterfeiting affects everyone. IPC is widely thought of as a victimless crime. However, consumers are at risk from poor quality or unsafe goods, such as fake pharmaceuticals or sun care products, some of which contain no active ingredients. Businesses also suffer economic harm through loss of sales which can lead to jobs losses, and the reputation of their brands suffers too. And higher prices, extra costs to law enforcement and loss of tax revenue affect all of us 1. The global economy depends on the creation and distribution of intellectual property (IP) to grow. But more and more, the economy suffers from IP theft, or counterfeiting and piracy. As global trade increases and technology advances, fake products such as clothing and accessories, cosmetics, pharmaceuticals, auto parts, software, music, films, and everything in between are making their way to markets around the world. Forgery is the process of making, adapting, or imitating objects, statistics, or documents (see false document), with the intent to deceive. The similar crime of fraud is the crime of deceiving another, including through the use of objects obtained through forgery. Copies, studio replicas, and reproductions are not considered forgeries, though they may later become forgeries through knowing and willful misrepresentations. In the case of forging money or currency it is more often called 1 gov.uk/intellectual property JOURNAL OF CRIMINAL INVESTIGATIONS counterfeiting. But consumer goods are also counterfeits when they are not manufactured or produced by designated manufacture or producer given on the label or flagged by the trademark symbol. When the object forged is a record or document it is often called a false document. In the 16 th century imitators of Albrecht Dürer's style of printmaking improved the market for their own prints by signing them AD, making them forgeries. In the 20 th century the art market made forgeries highly profitable. There are widespread forgeries of especially valued artists, such as drawings originally by Picasso, Klee, and Matisse. A special case of double forgery is the forging of Vermeer's paintings by Han van Meegeren and in its turn the forging of Van Meegeren's work by his son Jacques van Meegeren. This usage of 'forgery' does not derive from metalwork done at a 'forge', but it has a parallel history. A sense of to counterfeit is already in the Anglo-French verb forger falsify. Forgery is one of the techniques of fraud, including identity theft. Forgery is one of the threats addressed by security engineering. A forgery is essentially concerned with a produced or altered object. Where the prime concern of a forgery is less focused on the object itself - what it is worth or what it proves - than on a tacit statement of criticism that is revealed by the reactions the object provokes in others, then the larger process is a hoax. In a hoax, a rumor or a genuine object planted in a concocted situation, may substitute for a forged physical object. A counterfeit is an imitation, usually one that is made with the intent of fraudulently passing it off as genuine. Counterfeit products are often produced with the intent to take advantage of the established worth of the imitated product. The word counterfeit frequently describes both the forgeries of currency and documents, as well as the imitations of clothing, software, pharmaceuticals, jeans, watches, electronics, and company logos and brands. In the case of goods it results in patent infringement or trademark infringement. Counterfeiting of money is usually attacked aggressively by all governments. The ethics of counterfeiting goods on the other hand is looked at differently in different areas of the world. Counterfeit money is currency that is produced without the legal sanction of the state or government; counterfeit government bonds are public debt instruments produced without legal ~ 70 ~
71 sanction with the intention of cashing them in for authentic currency, or using them as collateral to secure legitimate loans or lines of credit. Counterfeiting is universally regarded as a criminal act and has been known to be attempted in very large amounts (e.g. a recent attempt to smuggle approximately $135 Billion in U.S. Treasury bonds across an international border was discovered in Italy in June 2009). The spread of counterfeit goods (commonly called knockoffs ) has become global in recent years and the range of goods subject to infringement has increased significantly. Apparel and accessories accounted for over 50 percent of the counterfeit goods seized by U.S Customs and Border Control. According to the study of Counterfeiting Intelligence Bureau (CIB) of the International Chamber of Commerce (ICC) counterfeit goods make up 5 to 7% of World Trade, however, these figures cannot be substantiated. According to the International Anti-Counterfeiting Coalition if the knockoff economy were a business, it would be the world s biggest. A report by the Organization for Economic Co-operation and Development indicates that up to US$200 Billion of international trade could have been in counterfeit and illegally-copied goods in 2005 November 2009 the OECD has updated these estimates, concluding that the share of counterfeit and pirated goods in world trade is estimated to have increased from 1.85% in 2000 to 1.95% in That represents an increase to US$250 billion worldwide. Some see the rise in counterfeiting of goods as an inevitable product of globalization. As more and more companies, in an effort to increase profits, move manufacturing to the cheaper labor markets of the third world, areas with weaker labor laws or environmental regulations, they give the means of production to foreign workers. These new managers of production have little or no loyalty to the original corporation. They see that profits are being made by the global brand for doing little (other than advertising) and see the possibilities of removing the middle men (i.e. the parent corporation) and marketing directly to the consumer. Certain consumer goods, especially very expensive or desirable brands or those which are easy to reproduce cheaply have become frequent and common targets of counterfeiting. The counterfeiters either attempt to deceive the consumer into thinking they are purchasing a legitimate item, or convince the consumer that they could deceive others with the imitation. An item ALEXANDRU IOAN CUZA POLICE ACADEMY which doesn't attempt to deceive, such as a copy of a DVD with missing or different cover art, is often called a bootleg or a pirated copy instead. Most counterfeit goods are produced in China, making it the counterfeit capital of the world. Joining China is Korea and Taiwan. Some counterfeits are produced in the same factory that produces the original, authentic product, using the same materials. The factory owner, unbeknownst to the trademark owner, orders an intentional 'overrun'. Without the employment of anticounterfeiting measures, identical manufacturing methods and materials make this type of counterfeit (and it is still a form of counterfeit, as its production and sale is unauthorized by the trademark owner) impossible to distinguish from the authentic article. A federal crackdown on counterfeit imports is driving an increase in domestic output of fake merchandise, according to investigators and industry executives. Raids carried out in New York City resulted in the seizure of an estimated $200 million in counterfeit apparel bearing the logos of brands such as the North Face, Polo, Lacoste, Rocawear, Seven for all Mankind, and Fubu. One fo the largest seizures was a joint operation in Arizona, Texas, and California that seized seventyseven containers of fake Nike Air Jordan shoes and a container of Abercrombie & Fitch clothing valued at $69.5 million. Another current method of attacking counterfeits is at the retail level. Fendi sued the Sam's Club division of Wal-Mart Stores, Inc., for selling fake Fendi bags and leather goods in five states. Sam's Club agreed to pay Fendi a confidential amount to settle the dispute and dismiss the action. Tiffany & Co. sued ebay, the world's largest online auction site, for allowing the sale of counterfeits, and Gucci filed suit against of thirty websites in the United States. To try to avoid this, companies may have the various parts of an item manufactured in independent factories and then limit the supply of certain distinguishing parts to the factory that performs the final assembly to the exact number required for the number of items to be assembled (or as near to that number as is practicable) and/or may require the factory to account for every part used and to return any unused, faulty, or damaged parts. To help distinguish the originals from the counterfeits, the copyright holder may also employ the use of serial numbers and/or holograms etc., which may be attached to the product in another factory still. ~ 71 ~
72 Industry world-wide loses large amounts to counterfeiters. These losses not only affect the producers of genuine items, but they also involve social costs. The ultimate victims of unfair competition are the consumers. They receive poorquality goods at an excessive price and are sometimes exposed to health and safety dangers. Governments lose out on unpaid tax and incur large costs in enforcing intellectual property rights. There is also an increasing concern that counterfeiting is related to other criminal activities, such as trade in narcotics, money laundering and terrorism. It is estimated that trade in counterfeit goods is now worth more than 5 per cent of world trade. This high level can be attributed to a number of factors: i) advances in technology; ii) increased international trade, emerging markets; and iii) increased share of products that are attractive to copy, such as branded clothing and software. As far as protection against counterfeiting is concerned, companies, as well as enforcement agencies, are becoming increasingly aware of the problems of counterfeiting. All companies need to make sure that their trademarks are adequately protected and to implement anti-counterfeiting policies to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and authenticate genuine products. These devices vary considerably in the degree of JOURNAL OF CRIMINAL INVESTIGATIONS sophistication and cost. However, in order to be implemented the technology must be costeffective, compatible with the product and distribution chain, resistant and durable. The lack of information sharing is often perceived to be one of the main obstacles in the fight against counterfeiters. The World Customs Organization (WCO) and Interpol now react proactively. They employ databases on counterfeits and conduct training for officials in partnership with private industry. A number of policy initiatives exist at both the private and the official level. Countries with a strong representation of trademark owners have established anti-counterfeiting associations. These are membership organizations, whose main activities include promoting adequate IPR protection, information gathering and liaison with enforcement agencies. Some trade associations are very active in assisting their members to combat counterfeiting. These include the Business Software Alliance (BSA) and the International Federation of the Phonographic Industry (IFPI). The latest international initiative is the Global Anticounterfeiting Group (GACG) which is a forum for discussion aimed at raising awareness of the health and safety Hazards. References: 1. BBC Monitoring Reports, (United Kingdom), Al-Qaidah Trading in Fake Branded Goods, 11/09/2002; Australian Financial Review, (Australia), Big Business Targets Terrorist Pirates, 29/01/ Explosion de la contrefaçon, Affiches Parisiennes et Départementales, 4th-5th July Gabriela Serbanoiu English Course for Law Enforcement Students and Professionals, Editura MAI, Bucuresti The Economic Impact of Counterfeiting, Organization for Economic Cooperation and Development, The Federal Bureau of Investigation and the U.S. Customs Service today announced the National Intellectual Property Rights Coordination Center s first conference for members of Congress and industry in Washington. FBI National Press Office, Washington D.C., July 17, 2002 available at gov.uk/intellectual property ~ 72 ~
73 ALEXANDRU IOAN CUZA POLICE ACADEMY QUELQUES ASPECTS CONCERNANT L IDENTIFICATION DES CADAVRES D ORIGINE INCONNUE SOME CONSIDERATIONS ON THE IDENTIFICATION OF BIDIES WITH UNKNOWN IDENTITY Lecteur universitaire docteur Marin-Claudiu ŢUPULAN [email protected] Académie de Police «Al. I. Cuza» The issue of identifying corpses should be linked to complaints regarding disappearances in suspicious circumstances, as objectively, bodies with unknown identity are found in the position of missing persons. By establishing the identity of the body it comes to solving cases of disappearances or clarifying many possible versions when there is evidence or suspicion that the person was the victim of a crime, but, for all these there are necessary a number of measures and specific activities carried out by specialized police officers. This study analyzes in detail the judicial activities circumscribed to the identification of unknown corpses. Keywords: corpse, homicide, investigation, identity, judicial photos. Le terme «corps non identifié» 1 est utilisé dans les cas où la mort d'une personne est survenue par des raisons biologiques, accidentellement ou suite à un crime, dans des conditions qui ne permettent pas de l'identifier, à cause de l'absence de documents d identité, ou de l'absence de personnes qui puissent fournir des données à cet égard. Le cadavre d origine inconnue peut être trouvé tout entier, sous la forme de parties dépecées accidentellement ou intentionnellement par l auteur dans le cas d un meurtre, afin d entraver le travail de reconnaître la victime et implicitement la punition pénale du coupable. Il est considéré comme un cadavre d origine inconnue aussi le squelette humain et les fragments de celui-ci. En même temps, on prend pour cadavre d origine inconnue aussi la personne décédée dans une unité sanitaire ou d assistance sociale et qui est déjà sous enquête pour son identification. Par rapport au milieu ou il se trouve et en fonction du temps écoulé depuis la mort, le cadavre peur être découvert dans plusieurs état, tels que 2 : frais et entier; frais et dépecé; pourri à cause de la décomposition enzymatique des substances organiques d origine protéique par l action de la flore microbienne aérobie ou anaérobie qui a comme fin la transformation des substances 1 Emilian Stancu Criminalistică, vol.i, (Criminalistique, vol. I), Édition Actami, Bucarest, page 78 2 C. Dumitrescu, E. Gacea Elemente de antropologie judiciară, (Eléments d anthropologie judiciaire), Édition du Ministère de l Intérieure, Bucarest, 1993, page 128 ~ 73 ~ protéiques complexes dans les éléments à base anorganique. L état de décomposition est plus accéléré aux cadavres qui se trouvent en air libre à une humidité normale et s installe plus ou moins vite en fonction de la température ambiante et la circulation de l'air, la température optimale pour l évolution de la putréfaction de degrés C. Sur les cadavres enterrées le phénomène s installe plus lentement, étant conditionné par la profondeur à laquelle le cadavre est enterré et par le point auquel le sol est remué ou foulé. La putréfaction s'installe rapidement sur les cadavres qui ont été dans l'eau et ont été ôtés à l'air libre. La putréfaction influe directement l'activité d identifier les cadavres trouvés sans documentation sur eux, en l entravant. macéré, est principalement le cas des cadavres découverts dans l eau, lorsqu ils subissent des modifications en fonction desquelles on peut établir le temps écoulé depuis le jet du cadavre dans l eau; ainsi, dans les premières heures apparaissent des érosions de la peau, après 3-6 heures on peut observer un blanchissement de la peau, après heures survient la chute des cheveux et la peau peut être facilement enlevée dans des lambeaux, après heures la peau s enlève en même temps que les ongles le gant de la mort. saponifié (adipocire), déterminé par la décomposition des graisses sous-cutanées au contact avec l eau et cela a comme effet
74 la formation des savons insolubles dans l eau. Cet état n est pas déterminé seulement par le contact avec l eau, mais aussi avec un milieu humide et marécageux. La saponification 3 commence après 3-8 semaines de temps chaud ou tiède, pendant l hiver le processus se prolongeant à plus de 3 mois et finissant après 1 à 2 ans. pétrifié, il est généré principalement par le contact avec un milieu riche en sels de calcium. lignifié, déterminé par l action acide de sols (milieu riche en tourbe) sur le corps humain. momifié, dans sa forme naturelle due à la réaction du corps dans un milieu sec, très bien aéré sous l action d une température élevée, et on inclue ici principalement les cadavres enterrés dans des sols sableux ou dans un milieu salin. Un rôle important dans la clarification des problèmes concernant l identification de la victime joue le travail d établir les circonstances dans lesquelles le décès est survenu, à l aide de la disposition et de la réalisation de l expertise médico-légale. Par exemple, lorsqu on découvre des fragments de cadavres, on demande d établir s ils appartiennent à la même personne, l âge, le sexe, la cause possible du décès et la date à laquelle la mort est survenue. Si on trouve un crâne, on peut procéder soit à l identification par l intermédiaire du toilettage afin de le photographier, hypothèse rarement rencontrée dans la pratique, soit à la reconstitution après le crâne ou à l identification par la superprojection du crâne sur la photo de la personne disparue. Dans la pratique judicaire, on a identifié fréquemment dans les cas des cadavres d origine inconnue les suivantes catégories de personnes : les personnes à identité inconnue après son décès Habituellement, dans cette situation apparaissent d une côté les personne qui ne peuvent pas préciser son identité à cause de l âge (des enfants perdus ou abandonnés ou bien des personnes âgées) et de l autre côté des personnes aux affections psychomoteurs (personnes souffrant de troubles mentaux, des personne qui ont subi des traumatismes crânio-cérébrales suite à des accidents, etc.) 3 Constantin Drăghici, Mircea Lupu Tehnica criminalistică, (Technique criminalistique), Édition Fundaţia Culturală LIBRA, Bucarest, page 313 ~ 74 ~ JOURNAL OF CRIMINAL INVESTIGATIONS Pour ces catégories de personnes, on prend des mesures d assistance médicale (sociale) et on les soigne; ces mesures seront prises en fonction de l âge et du diagnostique établi. les sans-abri Il est bien connu qu'il existe un grand nombre de personnes vivant sous le seuil de la pauvreté, en vivant d un jour à l autre grâce à la pitié des autres. Il s agit des situations où le décor des rues est vicié par des personnes pauvres, sans vêtements, sans abri, sans une famille ou un but dans le monde et spécialement sans identité. D autres personnes, connues dans le langage courant aussi par les appellatifs «voyous» ou «vagabonds», sont souvent les victimes d infractions de violence qui conduisent, dans la plupart des cas, à leur mort. On ne doit négliger non plus le fait qu il leur manque un lieu pour passer leur temps ; c est pourquoi ils vont improviser des abris dans certaines régions, en particulier dans les réseaux de chauffage urbain alors que pour se chauffer ils utilisent souvent le feu ouvert, fait qui a conduit beaucoup de fois à la production d'explosions ou d'incendies, causant de nombreuses victimes. les citoyens étrangers et les apatrides Le développement du tourisme, l ouverture des frontières du pays et l élargissement de la zone des relations économiques de la Roumanie créent parfois des situations où les citoyens étrangers meurent ou bien leurs cadavres sont souvent retrouvés dans notre pays. On peut citer aussi des situations où des cadavres non identifiés appartenant à des citoyens étrangers sont emportés dans notre pays par les courses des rivières. Le plus souvent, de telles situations se produisent aux frontières naturelles formées par les rivières (le Prut, le Danube, la Tisza et ainsi de suite). On ne doit pas oublier les cadavres non identifiés de certains touristes, citoyens étrangers, découverts soit dans les eaux de la Mer Noire, soit sur les sommets des montagnes de notre pays. Une autre situation dans laquelle les citoyens étrangers seront enregistrés dans la catégorie de cadavres non identifiés est donnée par les règlements de comptes de certaines bandes (notamment asiatiques) qui conduisent souvent aux crimes. Toujours dans cette section on doit mentionner le fait que, parfois, montrant une cruauté hors du commun, dans la tentative de se débarrasser des cadavres, les tueurs les coupent et dispersent les restes dans des endroits différents.
75 les victimes des accidentes ferroviaires, maritimes et aériens Il est bien connu le fait que de tels évènements dramatiques surviennent soit accidentellement, soit intentionnellement et qu ils ont comme résultat beaucoup de pertes humaines. Dans tous les cas, mais surtout dans le cas des accidents aériens, des restes de cadavres seront dispersés par des distances de quelques kilomètres, ce qui empêchera encore plus l identification des victimes. Dans le cas des accidents maritimes le temps dans lequel les cadavres sont enlevés de l eau joue un rôle très important, car il est bien connu le fait que s ils restent dans l eau une certaine période les corps des personnes mortes entrent dans un processus rapide de putréfaction, ce qui complique leur identification. les victimes d incendies ou d explosions L incendie constitue, sous un rapport physicochimique, un phénomène de brûlure d une substance combustible (dans la présence de l oxygène ou de l air) qui se répand normalement, sous l effet des flammes, sans que celles-ci représentent toujours la cause principale de l incendie. Parmi les principaux facteurs spécifiques d un incendie se trouve l émission de chaleur, de gaz et de fumé, la température de la combustion et la vitesse de propagation qui dépendent, cependant, du grade d inflammabilité des substances et des matériaux combustibles, de la quantité d oxygène, de l intensité et de la direction des courants d air, de la température et l humidité de l air. En fonction des causes qui les déclenchent, les incendies sont divisé en: incendies provoqués par des causes naturelles (le foudre, les rayons du soleil, l électricité statique, l auto-allumage etc.); incendies provoqués accidentellement; incendies prémédités (pour cacher ou favoriser autre infraction ou bien à cause de la haine, de la vengeance etc). L explosion comporte une réaction très rapide, de nature physique ou chimique, accompagnée par la formation et l émanation violente d une grande quantité de gaz, aux effets mécaniques, thermiques et lumineux sur les objets ou les personnes qui se trouvent dans sa portée d action. Étant données ces caractéristiques, il est facile de comprendre qu une personne morte dans une telle situation sera plutôt difficile à identifier et les équipes de recherche doivent agir avec un maximum de professionnalisme. ~ 75 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY les victimes des catastrophes et des calamités Les catastrophes (inondations, tremblements de terre, avalanches, glissements de terrain), par son caractère imprévu, entraînent de grandes pertes matérielles et humaines. Il est facile à comprendre que, suite à tels évènements, beaucoup de cadavres à origine inconnue vont apparaître et pour leur identification on effectuera des activités informatif -opératives de recherche et criminalistiques complexes. les suicidés Les suicidés représentent une catégorie différente en ce qui concerne les cadavres à origine inconnue. Ainsi, relatif aux mobiles du crime, aux modalités etc., ceux-ci sont très différents (jalousie, maladie, dépressions nerveuses, convictions religieuses etc.) Relatif aux moyens utilisés pour concrétiser le suicide, ils varient de l intoxication médicamenteuse jusqu aux coups de fusil ou la défenestration des étages supérieurs des bâtiments etc. Un problème particulier dans ce cas est l expertise médico-légale, c est-à-dire que par son intermédiaire on devra vérifier si l auteur du meurtre a essayé de couvrir son crime en mettant en scène un suicide. Dans ce cas aussi, les enquêtes sur place ont un rôle essentiel et doivent être faites avec un maximum d opérativité et d attention. les touristes des régions de montagne, victimes d accidents dans des zones reculées. La recherche du lieu où le cadavre a été découvert se fait après les principes généraux établis par la tactique criminalistique, concernant la réalisation de la recherche sur place. La recherche du lieu où le cadavre a été découvert devra éclairer premièrement si le lieu où le cadavre a été découvert est aussi le lieu du crime, car il y a des cas où le lieu du crime ne correspond pas avec le lieu où le cadavre a été découvert 4. Après avoir fini la recherche du lieu où le cadavre a été découvert, on doit être capable d expliquer ce qui s est passé: homicide, suicide, décès pathologique, etc. Lors de trouver un cadavre à origine inconnue, quelle que soit la cause du décès, la recherche criminalistique suivra, obligatoirement, la obtention des donnés ou des éléments visant à établir son identité. Si dans la phase initiale il y a quelques indices que le décès de l individu est survenu dans des 4 Constantin Drăghici, Mircea Lupu Tehnica criminalistică, (Technique criminalistique), Édition Fundaţia Culturală LIBRA, Bucarest, 2004, page 311
76 conditions suspectes, la recherche sur place sera effectuée par une équipe complexe, avec la participation du procureur criminaliste et du médecin légiste. À part du fait qu on assure la sécurité du lieu où le cadavre a été trouvée (à l exception des hôpitaux), on procède aussi à l audition de la personne qui a saisi l évènement, afin d établir toutes les données relatives aux circonstances dans lesquelles le décès est survenu, si l individu est entré en contact avec quelqu un, ce qu il a dit, qui peut offrir d autres informations, etc. Il faut retenir le fait qu on n agira sur le cadavre que dans le moment où on établira avec précision et on enregistrera exactement son état, sa position et les détails vestimentaires 5. L équipe de recherche déplacée sur place effectuera les activités suivantes 6 : La première mesure qu on doit prendre est confirmer les signes de la mort. L état du cadavre dans le moment de la constatation de la mort doit être mentionné dans le procès-verbal de recherche sur place. prendre des photos pour établir l orientation du lieu où le cadavre a été découvert Toutes les photos initiales doivent être prises avant changer la position du cadavre. Dans toute circonstance dans laquelle le cadavre est trouvé sur place, quelle que soit la cause et la nature de la mort- homicide, suicide, accident il est obligatoire de prendre des photos pour rendre la position du corps, l état des vêtements, les lésions visibles dans ce moment-là, la distance et le rapport de position avec les objets avoisinants. On prendra des photos avec le lieu recherché et avec le cadavre dans la position où il a été découvert, en respectant les règles établies pour ce type de photos judiciaires. La position du camera photo lors de prendre des phots doit être en plan parfaitement perpendiculaire sur la surface photographiée, car contrairement- des déformations du visage surviennent, et celles-ci entravent la reconnaissance du cadavre. décrire et rechercher le cadavre Il est recommandé d effectuer cette étape simultanément avec la prise des photos pour n oublier aucun aspect et pour qu il soit une concordance entre ces deux étapes. On décrit en détail les objets vestimentaires (le type, la couleur, le modèle imprimé sur ceux-ci, le matériel, les 5 Ibidem, page Bujor Florescu Curs de investigaţii criminale, (Cours d investigations criminelles), Édition Bren, Bucarest, 2007, pages 422 à 423 ~ 76 ~ JOURNAL OF CRIMINAL INVESTIGATIONS labels, les inscriptions, des détériorations), on écrit la position exacte des vêtements, s ils sont spécifiques au sexe de la victime et s ils sont appropriés au saison, la position et l ordre dans laquelle ils sont disposés sur le cadavre, des traces de reptation, des taches récentes ou d autres traces présentes sur les vêtements : la présence, l état et la position des boutons et d autres accessoires de fixation; On examine les poches des vêtements parce que, quelques fois, il est nécessaire d établir rapidement s il y a des actes d identité, un portefeuille, une montre ou d autres objets de valeur. Cette recherche doit être faite avec le plus grand soin afin de pouvoir rendre facilement la position initiale des vêtements. Il faut noter si les poches sont mises à l envers (ce qui montre qu elles ont été déjà examinées). Tous les objets seront levés, photographiés, décrits et emballés séparément. On vérifie avec le médecin légiste la correspondance entre les lésions du corps de la victime et les traces identifiés sur les objets vestimentaires. Il est préférable de décrire la tête, puis le torse, les bras et finalement les jambes. Les parties couvertes par des vêtements ne doivent être analysées sur place que si cela se fait dans la présence et au demande du médecin légiste. Normalement, le corps ne sera déshabillé que dans le moment de l autopsie. On analyse le cadavre en même temps que le médecin légiste, pour établir les éléments suivants: la présence des lésions et d éventuelles traces de l autodéfense : les armes, les outils, les moyens utilisés par l auteur pour commettre le crime; la possibilité que la victime s aurait automutilé; la correspondance entre le lieu où la victime a été trouvée et le lieu réel du crime; les aspects négatifs qui ne correspondent pas avec la nature de la mort (par exemple, des lésions de défense dans le cas du suicide). Suite à l interprétation des traces découvertes, l organe de poursuite pénale peut savoir des données relatives au chemin parcouru par l auteur, certaines activités déroulées sur place, le rapport de position entre la victime et l auteur ou face à d autres objets principaux : le type de vêtements, le sexe et la taille de la personne qui portait les vêtements. Faire le toilettage et prendre des photos digitales métriques, obligatoirement colores, avec le cadavre, tant dans l état initiale qu aussi après le court toilettage, mais aussi avec les objets rencontrés sur lui ou aux alentours.
77 prendre des empreintes digito-palmaires par le procédé approprié à l état dans lequel le cadavre se trouve et lever des poils des régions capillaire, sous-axiale et pubienne, mais aussi le dépôt sous-unguéale. Les échantillons biologiques sont levés, emballés et scellés afin de leur faire une expertise ultérieure ou de les garder au dossier. Un aspect important de ce procédé est la prise des empreintes digitales des doigts déshydratés où on peut injecter sous la peau de la glycérine, de l huile de paraffine ou bien on peut appliquer une nouvelle méthode, consistant en saupoudrant chaque doigt, afin de matérialiser le résultat sur un papier mince la méthode Schiffer. Également, en fonction de l état de la peau des phalanges, on peut aller jusqu à découper la peau afin de la photographier. Parmi toutes ces méthodes, le plus nouveau procédé expérimenté a été l utilisation d un moule en silicone et d une pellicule de peinture pour identifier un cadavre avec l épiderme ridée. Après que le corps a été photographié et décrit en détail et après avoir été transporté de ce lieu, la zone au-dessous du cadavre doit être examinée (des preuves essentielles peuvent être cachées sous le cadavre). Transporter le cadavre au laboratoire départemental de médicine légale (L institut national de médicine légale Mina Minovici - Bucarest), où on procède au toilettage approprié et après cela à la prise des photos du visage dans la mesure du possible avec les yeux ouverts, le profil gauche-droite et des détails avec d éventuels signes particuliers (tatouages, cicatrices, amputations, malformations, etc.) Le toilettage comporte le lavage du visage, pour enlever les traces de sang et de saleté. Les plaies seront recousues et on appliquera un traitement particulier aux yeux. Ainsi, s ils sont déshydratés ou sortis des orbites on injectera une solution d eau et ALEXANDRU IOAN CUZA POLICE ACADEMY glycérine derrière l œil, si les yeux sont détruits ou manquants seront remplacés par des yeux en verre positionnés dans les orbites sur une boule de coton. Les lèvres, les paupières et les sourcils sont cousus également ou fixés avec des épingles. Après avoir refait le visage, il sera frotté avec de la graisse et saupoudré avec du talc pour couvrir les lésions et enlever des reflets ennuyants. Décrire avec exactitude les signalements, les signes particuliers, la dentition, les objets vestimentaires, les chaussures, les objets et les inscriptions trouvés sur le cadavre, afin de compléter toutes les rubriques de la fiche d identification; à l occasion de l autopsie, on prendra des échantillons de sang/ salive afin d établir le groupe sanguin/ le profil génétique et on sollicitera, toutefois, au médecin légiste de se prononcer sur la cause du décès et sur la date à laquelle il est survenu, afin d effectuer des mentions correspondants dans la fiche-type d identification. Le cadavre doit être déshabillé par le personnel médical, en respectant strictement les règles de prévention de la contamination; il est recommandé de placer un drap ou une feuille en plastiques sous le cadavre pour ne pas perdre les preuves qui se détachent et tombent. Toutes les traces et les preuves matérielles sont recueillies, emballées et scellées selon des règles spécifiques. Les objets vestimentaires sont photographiés et emballés individuellement dans des sacs en papier après avoir été séchés. Les observations faites lors de la recherche sur place sont notées dans un procès-verbal, auquel on attache: la planche photographique, les échantillons des vêtements, le rapport de nécropsie, les déclarations d éventuels témoignes et les documents découverts, s ils ne doivent pas être soumis à l expertise. Bibliographie: 1. Bujor Florescu, Curs de investigaţii criminale (Cours d investigations criminelles), Édition Bren, Bucarest, C. Dumitrescu, E. Gacea, Elemente de antropologie judiciară (Eléments d anthropologie judiciaire), Édition du Ministère de l Intérieure, Bucarest, Constantin Aioniţoaie, Ion-Eugen Sandu (coordonateurs) et le collectif Tratat de tactică criminalistică (ediţia a II-a revăzută şi completată) (Traité de tactique criminalistique IIème édition revue et augmentée), Édition Carpaţi, Craiova, Constantin Drăghici, Mircea Lupu, Tehnica criminalistică (Technique criminalistique), Édition Fundaţia Culturală LIBRA, Bucarest, Emilian Stancu, Criminalistică, vol.i (Criminalistique, vol. I), Édition Actami, Bucarest, ~ 77 ~
78 JOURNAL OF CRIMINAL INVESTIGATIONS LE RÔLE DES INFORMATIONS DANS LE PROCÈS D`ADMINISTRATION DES ESAIS THE ROLE OF INTELLIGENCE IN THE PROCESS OF ADMINISTERING THE EVIDENCE Lecteur universitaire docteur Gheorghe POPESCU Académie de Police «Al. I. Cuza» Information gathered by the secret services or those developed based on the analysis and processing of data obtained from open sources remain without practical value unless it reaches the beneficiaries and those responsible for promoting policies and attitudes in one area or another. The transmission of information must be made promptly, clearly, in the most understandable way, because the data provided can be used to the maximum and in time by beneficiaries. Practical accomplishment of these requirements is not easy, given the very large volume of information, in this respect the management of the protection unit established based on internal regulation, the categories of information to be submitted and the priority that should be analyzed, by periodically analyzing how they were used. Keywords: intelligence, evidence, police, criminality, criminal investigation. L`interprétation et la mise en valeur du informations reçues s`intègrent, généralement, dans trois categories. La première catégorie contien l`information courante, quotidiene, du bénéficiares légaux. La deuxiéme catégorie se rapporte l` étude et l`analyse de toutes informations existante, en ce qui concerne à une série de sujets d`interes mayeur dans l`elaboration de politique Ministère de l`intérieur om pourrait appeller renseignement de base et la toisième catégorie façonnage se rapporte composition de la synthèse. Biensûr, il n`existe pas tourjous disponible le temps nécessaire pour soumettre chaque élément dans l`information courante unei analyse approfondie avant d`informer les organs et les personnes, qui sont les bénéficiares légaux. Les informations brutes peuvent constituer un chose particulièrement dangereux s'il est prévu que ce sont en fait, rapports bruts,expèdis parfois sans d'avoir du temps disponible pour verifier ses precision et véracité. C`est pourquoi, les bénéficiares légaux qui les envoyent pareilles informations en forme d`unes bulletins règuliers (ou d`informations isolés, quand leur caractèr et leur degré d'urgence exige la déclaration immédiate) sont prévenus pour ne entreprendre pas seulent des actes en base de cettes informations brutes. Outre des rapports informatifs courants et le renseignement de base il y a des documentes synthèse élaborés par les organs d`interprétation de tous les services départementales d`iformations, étroitement unis, utilises dans ce but, la totalité d`informations existantes en ce qui concerne un certain sujet, avec une interprétation correpondante. De même, ces syntheses contens apprécitation des possibilités et des perspective dans ce domaine analysé. En fait, dans cet étape on arrive l'une des fonctions les plus vitals de tout traivail informative: comment il doit utiliser toutes les informations en ce qui concerne aux événiments prochains posibles dans une manière qu`elles peut être utiles pour les bénéficiares dan l`exanimation de problèmes, en regardant aujourd`hui et demain. Parfois, ces syntheses il doit èlaborer rapidement seulemnt en base d`une informations désespérés, ou parfois particulèrement quand il s`agit d`une disposition de plus long terme, l`elaboration de ces synthesesappréciation exige étude long de la semaine. Besoins de la société on a appris qu`il doit organiser la collecte d`informations. Ce recueil doit organiser que l`information peut être mettre au disposion où et quand est nécessaire dans une forme Claire et intelligible. L`information qui n`est pas claire et qui n`est pas conçu et tiré dans une forme intelligible, la plupart du temps, ne peut pas être utilisée. Beaucoup de l`analyse-foudre se peut effectuer en base d`unes dispsitons ou exigences, bien que d`habitude existe une ordre d`urgence, d`ailleurs dans toute l`activité informative. Mais, indifférent si une analyse informative a au base long semaine de travail ou s`elle a été produit par la nuit, le produit finale contient toujours, aussi, les résultats d`une formation et éxperience longe dans le travail informantif. ~ 78 ~
79 Enfin, on fait, souvent à évalutions sur demande de la direction du Ministère de l`intérieur quand on considére que certainne situation demande une vigiliance acrrue. Parfois, le services d`information est accuse de ne pas avertiser au temps sur de situations de crise, mais non-initiés ignore intimations du services d`informations, parce que, comme on le sait, son travail il doit reste dans l`ombre. En matière de gestion de l'information, on désigne ces cates qu`apporte bénéficiare un plus de connaissance en ce concerne cet unité directement ou indirectement, qui lui fournit des nouveaux éléments, utilises dans l'exercice de ses fonctions. En vertu de ces qualités, l`information est le sujet principal de la déclechement des decisions et des actions practiques. La gestion du Direction Générale de Renseignement et de la Protection Interne suppose l`utilization de l`information qui concerne la sécurité publique ou nationalle ce qui signifie le nouvel élément en rapport avec les précédentes connaissaince, résultat d`un procès de contrôle, analyse, synthese des dates tous lies directes avec les menances actuelles ou en perspective, sur les valeurs defendues, mentionnés. L`utilisation du mot d`information qui concerne la sécurité publique ou nationelle est impose des régles légales qu`établissent compétence de l`unité respectivement en domaine de la criminalité et d`autres actes qu`affecte la sécurité publique 1, défini par loi 40/1990-l`organisation et le fonctionnement du Ministère de l`intérieur et les menances à sûreté de l`ètat, sur l`espace du Ministère, établi par loi 51/1991 la sécurité nationale de la Roumanie. Essentiellement, le contenu de mot information qui concerne la sécurité publique ou nationelle, peut être esquisser dans deux acceptions, par le fait que, l`unite est spécialisée dans les informations, ou l`information qu`est utilisé dans cette peut être considerer qu`elle concerne la sécurité publique ou nationelle, parce que, directement ou indirectement, contribue à la réalisation obiectives préconisés 2.Dans l`acceptation strictement profesionnelle de spécialité,les informations qui concerne la sécurité publique ou nationelle sont celles véhiculés 1 Barbu Ionuţ Andrei, Certains cosidérations juridiques qui concerne les infractions contre sûreté de l`ètat, Revue Investigtions de la Criminalité, anné V, nombre 1/2012, éd. L`Univers juridique. 2 Barbu Ionuţ Andrei, Certains cosidérations juridiques qui concerne les infractions contre sûreté de l`ètat, Revue Investigtions de la Criminalité, anné V, nombre 1/2012, éd. L`Univers juridique. ~ 79 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY directement dans le process du travail de l`unité, respectivement dans les informations qui concerne la criminalité économique et financière, le crime organisé, violations de la sécurité publique, menances à sécurité. Nationelle etc, qui se rapporte aux actions ou inactions, prévues par la loi et, après nous, elles peut être appelle général judiciaire. En s'attaquant à l'unité,dans ce cas, il est indiqué, l`adaptation le première mode de concevoir la catégorie d`information. Cette modalité a l`avantage soulignant l'existence et la finalité de l'information. indifferent de sa nature technique faciliter l'approche adaptée aux besoins. Le spécifique de l`activité impose de la gestion de l`information droit pilier central, la base de tout edifice de l`institution, aux environs qui gravite la gestion des ressource umanes, logistiques, financiares, en leurs determinant l`éficance, qualité et la finalité positive.les informations dans l`unite de spécialité sont tré complexes. En vue de ses facilité de caractérisation, on les clasifie en fonctions de beaucoup de critères, qui permets la révélateur d`unes façades semnificatives pour leur gestion et implicite d`unite. Après du mode d`exprimation les informations peuvent être orales, qui n`implique pas des investigations dans les mozens de traînes, elles ont une grande vitesse de circulation, ne ont pas contrôlés et elles laissent place à interpretation; ècrivées, qui peut être conserve inchangé long temps, implique coûts modérés, leur consignment exige consummation de temps,ou audio-visuel, qui implique d`équipment special (ordinateurs, terminals etc.), une grand vitesse de circulation, capacité de suggestion et teinture haute; elles peuvent être consigner integral et rapidement, mais sont coûteuses, aussi. Après le degree d`interpretations les informations sont: primaire (de base), qui anterieur elles n`ont pas souffert un procès de façonnage informative, on une caractère analitique, prononcé informative, sont divers, elles peuvent être consigner et les plus répandues au niveau des officiers opérationnels d`execution; intermédiaire, qui exite en différents phases de prelucration informative et sunt les plus répandues à gestionnaires de niveau inférieur (chef services, chef secteur etc.); finale, care ont passé dans le tout file d`interpretations informative prévues, elles on tune caractér synthétique, complexe, decision et addresses, habituellement, gestionnaires de niveau supèrieur et moyenne (director general, director).
80 Après la direction de véhiculation des informtions peut être: descendants,qui se transmis de niveaux supèrieurs aux niveaux inférieurs des gestions et sont compose predominant d`ordre, intructions, methodologies, etc; ascendants qui se transmis de niveaux inférieurs aux supèrieur et elles réfléchis avec priorité le mode de realization d`obiectives et de decisions de la gestion; horizontal, qui se transmis entre les titulaires de postes situés dans le meme niveau et elles ont un caractér fonctionnelle et la cooperation, servant l`integration sur horizontal des activités de l`unité. Après le mode d`organization d`inscription et d`interpretation les informations sont: techniques et opérationnelles on localise en temps et espace les procèses dans l`unite et sont utilisées predominant de la gestion de niveau inférieur poru contrôler le travail d`officiers operatives; d`évidence- il s`agit en special aux aspects specifics, qualitatives de l`activité d`unite, utilisées particulièrement pour la foundation et l`évalution des decisions sur court temps; statistique, on réfléche synthétique, en forme predominant numérique, les principaux activité d`unité correspondant des normes predetermines, des indicateurs de performance et elles ont un caractér postopératoire et synthétique, en sens qu`elles sont utilisées avec priorité pour l`evaluation des résultats d`unité et pour prevision des nouvelle obiectives. Après la source les informations sont: exogène, qui arrivant dans le system de qui fiat part l`unité (Ministère de l`intérieur, Gouvernement, le Parlement) et sont composées predominant dans les lois, ordonnance, jugements,instructions, décisions, qui sont requis et dans et socio-économique, la réalité de la société humaine et est la matière première de base de l'unité; endogène, qui sont généré dans l'unité, ont un caractér tout-étendu parce que elles se référe aux tous les activités de l'unité et hétérogèn, parce que elles réfléchissent la diversité de l`attributes et les competences de l'unité, des procèses dans celle. Selon de destination les informations peut être: interne,les bénéficiares des informations sunt gestionnaires et officiers operatives, ont un caractér tout-étendu, niveaux d`aggregation different et un degré de formalization réduit; ètranger les bénéficiares des informations sont les directions Ministère de l`intérieur, Gouvernement, le Parlement, l e Président, autres institutions centrals ou l`autre unites dans le Ministère de l`intérieur, selon ses competences légaux et elles ont un caractér JOURNAL OF CRIMINAL INVESTIGATIONS sélectif, se concerne aux aspects essentiels résultées dans les activités de l'unité, elles ont un degré agrègation haut et, biensûr, un degré haut de formalision. Selon les besoins du bénéficiare, les informations sont: impératif-émis de gestionnaires, étant déstinés por les niveaux inférieur, elles ont un caractér de decision prononçe et considérant le message d'information est nécessaire; nonimpératif émis par les exécutants et les gestionnaires, étant destines predominant pour collègues ou les supèrieurs, elles ont un caractér pronounce informative considérant le message d'information n`est pas nécessaire. Selon la nature du procèses réfléchés les informations sont: judiciaire elles réfléchent ou ont en vue le produit des activités spècifique de l'unité, de documentation informative de la criminalité et d`autre illégalités ou évéminents, qui fait l`objet d`unes prévues légaux; relationnel réfléchent ou ont en vue les relations de collaboration;de personnel réfléchent ou ont en vue des activités de personnel. L`operation adequate de l'unité, la realization d`obiectives continues dans ses previsions assume l`existence d`un system informatif dans celui qui les dates et les informations sont les composants primaire que sont organique interdépendants. Le system informative peut être compare avec le dispositif appareil circulatoire du corps humain, que offert matières premières informatives nécessaires pour établir et réaliser des objects de gestion, les tâches et les responsabilités à la fois de gestion et d'exécution de l'unité. Le system informatif est le ensemble de dates, les informations, des flux et des circuits d'information, des procédures et des moyens d'information de traîte conçu pour aider ensemble et réaliser l'unité. La definitions du system informative, de son rôle dans l'unité de l'ensemble des activités, est une condition sine qua non pour la comprehension correcte seulement des questions informatives, et en généré, des questions gestions. On insiste sur cet aspect parce que,il n`est pas rare, se mettre le signer de l`égalité entre le system informative qui se résume essentiellement à cueillir, transmettre et à l`interpretation avec des moyennes automatisés d`informations et le system informatif, qui est plus complet. Les rappots entre system informatif et cet informatique sont tout la partie. Si, les composants du system informative sont: les dates et les informations, les circuits et les flux ~ 80 ~
81 informatives, les procédures d'information et des ressources de l'information de traitement.dans première capitol on discute les dates et les informations, en plus, on procéde à l`analyse des autres composants du system informative. L`utilization de l`information dans le procès décisionnel ou d`execution implique sa parvenir au bénéficiare; c`est nécésaire le circuit informationnel. Par le circuit informationnel on désigne le dernier à qu`il parcourt une information ou une catégorie d` informations entre l`émetteur et le récepteur. Le flux informatif est la qualité de informations qui est véhicule entre l`émetteur et le récepteur sur le circuit informationnel, caractérisé par certains traits: longueur, la fiabilité vitesse, coût, etc. La typologie des circuits informationnelles se clasifie: direction des véhicules: verticale (sont établis entre les stations ou compartiments situées sur différents niveaux hiérarchiques, qui ont subordination directe), horizontale (entre les emplois et les services sont mis en place sur le même niveau hiérarchique et impliquent des relations de coopération) et obliques (mis en place entre les stations ou les compartiments situés sur différents niveaux hiérarchiques entre lesquels il n'existe pas de subordination directe); fréquence d'occurrence: périodique (répéter de temps en temps et les processus de travail sont séquentiels) et peu fréquents (la base de leur production représente des situations inédits, endogènes ou exogènes). Indépendamment du type, c'est circuits nécessaires pour être aussi une information directe, afin de réduire les maximales intermédiaires, des points de passage et aussi courte que possible pour éviter s'étendant en aval et en amont d'information des bénéficiaires ciblés 3. Pour obtenir de l'information pour assurer opérationnelle connainssaine de la situation, en fonction des questions données en matière de compétence, développe une gamme de mesures d'information et opérationnelles visant à assurer base des informations de support du travail - information. À cet égard, former et gérer un réseau d'information à adopter une politique active de collecte d'informations sur les faits qui sont de la responsabilité de l'unité. 3 Barbu Ionuţ Andrei, Cristian Oprişan, Les infractions accompli par Internet, Revue Investigtions de la Criminalité, anné V, nombre 1/2012, éd. L`Univers juridique. ~ 81 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY Il tiendra compte, en particulier, les rapports rapide de ces données et informations afin d'informer compétentes et rapide des mesures préventives décideurs à prendre. Elle permettra aussi de rechercher les préoccupations des connaissances, de prévention et de contrer des éléments suspects appartenant à la criminalité organisée de soudoyer, de chantage ou d'intimidation de la police pour leur implication dans la détermination de commettre des crimes ou ne remplissent pas leurs devoirs. En effet, il est nécessaire de créer un environnement de réseau informatique capables de pénétrer la criminalité pénale et organisée afin de recueillir de l'information afin de sensibiliser et de prévenir toute action qui pourrait affecter le personnel, les missions et les actifs et ministère de l'intérieur. Permettra de déterminer les tâches offensives et différenciée de la recherche d'informations sur les objectifs, les lieux et les milieux d'intérêt à être formés et sélectionnés pour réseau d'information fondée sur la connaissance et la lutte contre les activités du crime organisé. Conséquence de la consolidation du degré de professionalisation de millieux criminells et des structures de la criminalité organisée s actionnera prioritairement pour assurer le contrôle informative des activités professionelles dont les policiers avec des attributions pour combattre la criminalité organisée et la corruption et de la criminalité economique financière entrent en contact avec des éléments infractionnels; des millieux infractionnels dont est signalée la présence des policiers et de leur moyen de relations. Dans l activité de recueil des informations seront observées les preoccupations des millieux infractionnels pour attirer des policiers.les activités informatives-operatives auront le but de prevenir l attraction des ouvriers du Ministère d Administration et des Internes pour commettre des infractions et pour les influencer à renoncer aux relations avec les éléments du monde interlope. Généralement, dans l activité de recueil des informations c est un processus continuu, laborieux dont sont utilisées certaines procédures informationnelles. En essence, par procédures informationnelles on comprend la totalité des éléments dont s etablissent les modalités de recueil, d enregistrations, de transmission et de d arrangement systématique d une catégorie d informations avec la précisations des operations à effectuer et leur suite, les supports, les formules, les modèles et les moyens d analyse des informations.
82 Propre au procédures informationnelles c est leur caractère très detalié. A travers les procédures s etablissent premièrement les supports d informations utilisés,on voit dire les matériales utilisés pour les consigner et leur caractèristiques( des régistres,des formularies en papier, des cartes de rationnement,des bandes magnétiques,des disquettes). A travers ceux-ci sont prevues aussi les moyens utilisés pour recueillir, enregistrer, transmettreet arranger systématique les informations. Propre au procédures informationnelles modèrnes c est aussi un degré très soulevé de formalisation. Très important c est aussi la codification àla standardisation des informations de telle forme que facilite leur integration dans le systéme de management et l utilisation des computers. En outré, les procédures informationnelles del unité se caractèrise par un accentué caratère,par une traite rapide de l information. Cette qualité est déterminée spécialement par l apport de bases des dates, les banques d informations,les programes et les computers utilisés,avec des implications positives dans le plan de la décision que de l action. Les policiers qui travail dans le domaine des informations et de la protection interne déroullent l activité en principal dans le domaine informative, en utilisant le principes et les méthodes consacreés de travail des informations. Les resultants de ces activités informatives se matérialissent dans l information et l exploitation des dates par les bénéficiaires légales prevues par la loi.pour pouvoir se prendre les mesures légales par les organismes abilités à valorifier les dates, les unites d informations avec ceux-ci doivent transformer les dates et les informations obtenus en elements de probation, necessaries dans l activité poursuite pénale. Pour repondre à ces problèmes,le Ministère de l`intérieur a réglementé par ordre, des formes communes de travail, avec des résponsabilités même pour les policiers d informations que pour les autres unites (Policie, Policie de Frontière) le résultat etant ce de valorifier supériorement les informations obtenus e de les transformer en preuves. De telle manière se valorifie les dates et les informations obtenus en utilisant les moyens spéciales (des surveillances operatives, des moyens techniques spéciales, le contrôle dans le pays des canales de lien utilisés pour comettre des infractions ou contre les missions que le ministère les déroulle) que sont autorisées par le procureur et qui peuvent être utilisées commes preuves dans le JOURNAL OF CRIMINAL INVESTIGATIONS processus pénal,biensur avec l obligation à respecter les normes de conspirativité et de confidentialité. Le fin du processus penal c est constater en temps et completèment les faits qui constituent des infractions, de telle forme que chaque personne qui a commis une infraction soit punie conforme à sa culpabilité et qu aucune personne innocente soit punie injustement. Le fin de la l enquête criminelle c est savoir la vérité, on veut dire que les faits commis et celles constatés pendant l enquête doivent concorder et les organismes de poursuite pénale doivent avoir un rôle actif dans la déroullation de processus penal. Les organismes d enquête criminelle spéciales, dans la phase de poursuite pénale ont les suivantes attributions: effectuer des actes de poursuite pénale dans tous les causes dont la competence matérielle les revienne et que sont repartisées pour être solutionnées, en respectant la loi; réunir les preuves nécessaries pour savoir la vérité et pour tirer au clair la cause sous tous les aspects même si la personne ou les personnes investigues reconnaissent les faits; recueillir des preuves favorables at aussi des preuves contre le coupable et l administration des preuves favorables doit être faite même si personne l avait démandé; réunir des dates en ce qui concerne les circonstances qu ont determine ou qu ont favorisé la réalisation de l infraction et d autres dates nécessaries pour solutionner la cause; expliquer aux personnes impliquées dans la cause leurs droits procésuelles et d assurer que ces droits soient réspectés; ne pas soumettre aucune personne à quelque forme de restriction de la liberté que ne soit prevue par la loi; traiter les personnes impliquées dans la cause de telle manière que leur dignité humaine soit respectée; ne pas soumettre aucune personne pendant l enquête criminelle aux traitements de cruauté, torture, inhumaines, dégradantes; faire connaître au coupable le fait pour lequelle est-il investigué, l encadrement juridique et d assurer la possibilité de préparer et d exercer son pladoyer; d assurer à chaque personne impliquée dans la cause le droit d être assistée par un pladoyeur pendant la poursuite pénale; ~ 82 ~
83 prendre des mesures pour assurer l assistence juridique dans les causes ou il est obligatoire et si le coupable n a pas un pladoyeur choissi; quand il constate la réalisation d une infraction il va faire connaître cette chose au procureur désigné pour prendre en surveillance et contrôle la cause; prendre toutes les mesures procédurales nécessaries pour assurer la récuperation de préjudice causé par la réalisation de l infraction. Pendant l activité de poursuite pénale, les organismes d enquête criminelle spéciales élaborent des actes démandés par la loi, des actes qui conduissent vers fin du processus pénal, la vérité. Ces actes doivent être élaborés en réspectant les conditions de forme et du fond démandées par la procédure pénale, ou seront afféctés par la nulité. Démarration et le déroullement de la poursuite pénale est conditionné dans tous les cas,par le communication faite devant les juridictions pénales, conformément à la loi, de la réalisation d'une infraction. Le schéma général de référence sont prévus par l'art. 221 par. 1 Code de procédure pénale: la plainte, la dénonciation et la réclamation de bureau. La réclamation de bureau se fait par de plusieurs façons, y compris: dénonciations anonymes, d'activités professionnelles enquête criminelle, les rumeurs publiques, les informations obtenues par le biais de la presse, la radio et la télévision, et à la suite des travaux opérationnels spécifiques de la Direction générale des protection interne. La réclamation du bureau se matérialise dans un rapport, document constitue le premier acte de démarrer la recherche. La plainte et la dénonciation peut être reçu par écrit ou oralement. Si elle est faite par écrit, doit être signée par les personnes qui ont rédigé et lorsque les juridictions pénale établit un rapport contenant les mêmes données que celles écrite et signée par le juridiction pénale et par la personne qui a demandé. Dans le cas de la réclamation de bureau, l'autorité de poursuite doit établir un rapport qui comprendra: date et le lieu est fermé, grade, nom et prénom, dont le corps à cette fin, la déclaration sur la façon dont l'affaire a été renvoyée la description des faits qui font l'objet de la saisine, indiquant la preuve, formule finale et organe de poursuite pénale signature. Après les poursuites ont été informés de la commission juridique en vertu du droit pénal, sont en mesure d'effectuer pour vérifier et compléter les informations obtenues à la suite de la saisine afin de résoudre leurs motifs ALEXANDRU IOAN CUZA POLICE ACADEMY juridiques et opérationnelles. Ce travail prend la forme d'actes antérieurs au titre de l'art. 224 du Code de procédure pénale. Dans la pratique de l'enquête criminelle, le plus souvent, mener à bien les actions suivantes: la vérification préliminaire des documents afin de déterminer si les accusations de crimes commis est confirmée, le mouvement et direct sur le site de collecte des faits, des discussions avec des tournage, bande d'enregistrement vidéo et la bande etc,personnes présumé coupable, la vérification de leurs créances, l'exécution des photos. Le cas échéant, les actes antérieurs peuvent être des actes criminels, tels que les enquêtes criminelles, la saisie des objets et documents, technico-scientifique, les constatations médico-légales, des présentations de recherches et de reconnaissance maison, si c'est absolument nécessaire pour la découverte et la collecte de preuves. Ils doivent être en conformité avec la loi et avec toutes les conditions de fond et de forme comme si elle allait être faite par le ministère public. Dans le domaine des actes antérieurs tels que les enquêtes, suspect d'écoute (fondée sur des actes préliminaires soient entendues auteur), ils peuvent être et ne peut pas prendre de prévention, des mesures de précaution et des mesures de sécurité pour arrêter car ils ne peuvent prendre l'accusé ou du prévenu, ce qui impliquerait une enquête criminelle a commencé. Les actes préliminaires se matérialisent dans un rapport rédigé par l'accusation dans les plus brefs délais, toujours avant les poursuites, et peut être la preuve dans une procédure pénale, dans la mesure où, dans certaines circonstances entraînant contenu à propos de l'existence de l'infraction. Après avoir mené des actes préliminaires, tout le matériel sera probablement analysé et si son contenu découlant de toute infraction, une fois que le dossier sera transmis au parquet militaire ou une juridiction civile, accompagnée d'un rapport qu'il ya eu des propositions en vertu des dispositions du Code de procédure pénale. Selon l'article 218 du Code de procédure pénale, le procureur dirige et contrôle la police judiciaire et les autres organes et supervise les actes criminels à effectuer régulièrement. Les enquêteurs sont tenus d'aviser immédiatement le procureur sur les crimes dont ils ont connaissance. Procureur peut aider à effectuer toute enquête criminelle ou pour effectuer une personnelle. Il peut aussi demander des documents de vérification de toute enquête criminelle corps-1 est nécessaire d'envoyer tous les documents, matériels et informations concernant l'infraction qui fait l'objet de la recherchees. ~ 83 ~
84 JOURNAL OF CRIMINAL INVESTIGATIONS Bibliographie: 1. Adrian Petre - Interception et L'enregistrement de données audio et audio-vidéo dans les procédures pénales CHBeck Publishing House, Bucarest, Ionut Andrei Barbu, Cristian Oprisan, Les crimes commis via l'internet Crime Investigation Magazine, V Année, non. 1/2012, Universe Publishing juridique, Bucarest. 3. Ionut Andrei Barbu, Considérations juridiques pour les crimes contre la sûreté de l'état, Revue de l'enquête sur la criminalité, l'an V, no. 1/2012, Universe Publishing juridique, Bucarest. 4. Bobocea Basile - Moments dans l'histoire du ministère de l'intérieur Modifier Thu, Bucarest, Bobocea Basile, Brestoiu Horia - «Aspects de l'intelligence et de contre-espionnage au service de la lutte séculaire pour préserver la liberté du peuple roumain, la formation de l'état-nation et l'indépendance pleine conquête état Modifier. MI, Centre d'information et de Documentation, Bujor Florescu - Cours d'instruction criminelle, Concordia Publishing House, Arad, Petrescu Stan - «Information - quatrième arme» Modifier. Militaire, Bucarest, Ţupulan Marin-Claudiu, Enquêtes criminelles Editeur Sitech, Craiova, Vasile Bercheşan - des enquêtes criminelles (Forensics-Théorie et pratique). Remplissez enquête criminelle Guide, Deuxième édition revue et augmentée, Édition et impression ICAR, Bucarest, ~ 84 ~
85 ALEXANDRU IOAN CUZA POLICE ACADEMY EUROPEAN UNION POLICY ON COMBATING ABUSE OF DOMINANT POSITION Lect. Laura MAIEREAN Ph.D Police Faculty Alexandru Ioan Cuza Police Academy Abuse of dominant position is the manifestation of a discretionary trader, with a high market power, expression embodied in imposing disadvantageous conditions undertakings with less power or attempt to remove from the market the businesses considered his competitors. Specifically trader who has a dominant market position will abuse it by imposing prices, setting unequal conditions for equivalent services, the use of predatory pricing. Key words: abuse of dominant position, competitors, competition, imposing prices. 1. Community and national legal framework Competitive practices consist of a wide range of business practices, through which a company or group of companies is committed to restrict competition in the market, in order to maintain or strengthen its market position and increase their profits without effort to reduce cost and enhance the quality of the product: agreement or concerted practice abuses, including those caused by dominance, close to the monopoly, among which are: generating potential Merger strong position and biased behavior in market dominance, state aid for the benefit of privileged economic operators, representatives of state monopoly enterprises conduct or other exclusive rights granted by public authorities. Common competition policy is the first supranational Community institutions were the most active and consistent on an upward trend and generated such consonances federal member countries. The provisions of this policy are recorded as obligations farms and had the greatest impact on countries that have recently joined the EU, including Romania. Thus, the Treaty of Amsterdam, competition policy is governed in particular by Articles 2, 3, 12, 31, 36, 73, 80, 81, 82, 85, 86, 87, 88, 92, 93, concern both the general and competitive Single Market mechanisms (of goods, services, capital and labor) with a special focus on the goods, namely: protection against anticompetitive practices. Rigorously promoted and institutionalized by rules and bodies, competition policy in the European Union today has taken on dimensions provided decisive to become a market economy. Beneficiary of such a policy creating normal competitive environment and consumer protection is competition. Regulating competition in Romania by organic law, competition law no.21/1996 became necessary to create specific discipline of the free market that regulates balance and cause favorable effects normal development of the economy and consumer protection. Adoption of competition law, in force since 1 February 1997, was a decisive step in creating an economic environment in Romania competitive nature and imposing rules in this regard. The Competition Law no.21/1996 and secondary legislation issued in implementation thereof, Romania to fulfill obligations under the Association Agreement with the European Union competition policy, ensuring a high degree of compatibility on the way treatment and regulation of agreements, concerted practices, abuse of dominant position and merger control. Competition law followed the line of EU law, Article 5 of the Competition Act no.21/1996 sanctioned anticompetitive agreements between undertakings and associations of undertakings and abuse of dominant position art.6 sanctioned the correspondence art.101 and art.102 of the Treaty establishing the European Communities. Thus, according to article 5, paragraph 1, shall be prohibited any express or tacit agreements between undertakings or associations of undertakings and concerted practices which have as their object or effect the prevention, restriction or distortion of competition on the Romanian market or on a part it. Paragraph 2 of Article 5 of the exceptions to the prohibition contained in the preceding paragraph. For law enforcement, investigations and management for the purpose of penalties deviations, and the promotion and protection policy to encourage competition, to create conditions for the establishment of free market ~ 85 ~
86 rules of the game in Romania have established institutions such as the Competition Authority and consumer protection role to protect consumers' interests first. 2. Abuse of dominant position-features Dominant position is not unlawful in itself, being sanctioned abuse of dominant position only so the resolution under UN abuse of dominant position is the limiting of access to markets or otherwise restricting without legal justification, as an activity specialist anticompetitive unilateral, compared with reprehensible agreements that are bilateral or multilateral. In a doctrinal definition, abuse of dominant position is a manifestation discretionary trader, with a high market power, embodied in imposing manifestations unfavorable conditions undertakings with less power or attempt to remove from the market the agents of considerable economic competitors. Specifically trader who has a dominant market position will abuse it by imposing prices, setting unequal conditions for equivalent services, the use of predatory pricing. In another definition, this time restricted to the dominant position, the Court of Justice ruled in a case submitted to its status as the dominant position of economic power is held by a company that gives possible to prevent the maintenance of effective competition on the relevant market, ensuring the possibility of independent behavior in an appreciable extent, both against its competitors, and to its customers and ultimately to consumers. No.21/1996 law does not define in a systematic and fully notion misuse of a dominant position by limiting it to look for in Article 6 as it is forbidden to use any abuse of a dominant position by one or more companies on the Romanian market or a substantial part there of, through the use of anticompetitive acts that can result in impaired trade or consumer harm. 3. Elements of dominant position and the abuse of dominant position Dominance is when the economic power held by a firm, allow it to impede competition in the market. In other words, market dominance allows an undertaking or association of undertakings is overwhelmingly influence the conditions under which competition occurs. Abuse of dominance occurs when the conduct of an undertaking or association of undertakings affect the structure or the degree of competition in that market, even when loading such behavior is the result of certain legislative provisions. Among the possible abuse of a dominant position may include direct or indirect JOURNAL OF CRIMINAL INVESTIGATIONS taxation, prices or other unfair transaction conditions, limiting production or markets to the detriment of consumers; application in relation to certain trading partners to unequal terms, for equivalent services, the conclusion of a contract, the acceptance of supplementary obligations unrelated to the contract. Domination is in itself lawful, even if it allows only weak competition or residual EC penalizes and prohibits abuse of a dominant position, the prohibition is conditional upon the fulfillment of three conditions, namely: The existence of a dominant position, the Court of Justice and the European Commission, it is assumed that there is a monopoly, with the power to manifest in an independent manner, without taking into account existing market competitors. Obviously, a key factor is the market share but the market definition and estimation which manifests dominance became difficult: in a well-known example (United Brands, Case C-276, judgment of 16 February 1978) a company that dominates banana market sustained a fruit that dominate the market. Abuse of a dominant position on the EC Treaty lists only illustrative list of abuses: imposition of unfair prices, restrictions on production, price reductions, technical development partners applying dissimilar conditions, making the main contracts other forms of supplementary which have no relation to the principal contract, etc. In our opinion, the dominant position is defined as the situation where a company or association of undertakings is able, to a considerable extent, to behave independently of its competitors and customers in this market. The dominant position is that economic power level allowed to influence the conditions under which manifests overwhelming competition in the relevant market, it behaves largely independently of competitors, customers and ultimately of its consumers being influenced by numerous contradictory economic circumstances, technical, scientific and defining trends of modern world economy. However, repeatedly giving exemption of anticompetitive agreements and observing that they have some common features, it was the crystallization of a series of agreements (agreements) restrictive whose existence may be admitted under art.101 par. 3 of the Treaty on the Functioning of the European Union. Thus, the experience of the European Commission paved the way to develop a group exemption system (class, block exemptions ), based on a set of criteria, ~ 86 ~
87 having its source in the same norms that justify and individual rehabilitation. When an agreement is covered by a block exemption, the parties that are exempt from restrictive agreement required by Article 2 of Regulation (EC) no.1/2003 to demonstrate that it meets all the conditions of art.101 paragraph 3 Functioning of the European Union, but will only have to prove that the agreement benefit from a block exemption. Application of art. 101 paragraph 3 for categories of agreements, through a block exemption regulation is based on the presumption that restrictive agreements falling within its scope fulfill all four conditions. Although the EC Treaty and most European laws contain an express provision that prohibits the abuse of a dominant position, however they rarely include a definition of abuse of a dominant position, most listing examples of behaviors that may be considered illegal. Community law and our law prohibit abuse of dominant position de only by one or more undertakings and not simply to market dominant PEO. The difference between domestic and Community legislation is tied for the competition authorities, stating that whenever the Competition provisions of paragraph 1 of Article 6 of the Competition Act, to the extent that the abuse of a dominant position may affect trade between Member States, it also applies, the provisions of Article 102 of the Treaty on European Union. When there is dominant market position held by an enterprise (...) gives power to hinder the maintenance of effective competition on the relevant market by giving it the power to behave to an appreciable extent independently of its competitors, its customers and, ultimately, to its consumers. To establish that an undertaking is in a dominant position, proceed, first, the delimitation of the relevant market and then to assess its position in the market. In assessing dominance will take into account the competitive structure of the market and, in particular, the following factors: pressure existing offers current competitors and their market position (market position of the dominant undertaking and competitors), pressure credible threat of future expansion by actual competitors or entry by potential competitors (expansion and entry) and the pressure of bargaining power of enterprise customers (countervailing power of buyers). Domination can be achieved by a single company or two or more companies. If individual dominance firm is usually the monopoly, but not ruled out the possibility of holding a market situation mainly by a company that does not meet the economic theory of ~ 87 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY monopoly. The clue is revealed the existence of a collective domination that two or more independent enterprises acting, economically, with a relevant market or are able to adopt a common policy on the market competitive. Economic ties between enterprises can be manifested by the control they exercise over another firm, the designation of most members of management etc. However, the collective character of dominance should not lead to confusion with the abuse of a dominant position cartel. The existence of a dominant position is not reprehensible in itself, but only when it is abused. However, dominance, appears as a prerequisite for a company to improperly exercise between the dominant position and unfair practices manifested in his behavior there is a causal link. Implementation of the competition rules under art.101 and 102 of the Treaty on the Functioning of the European Union has made good time through Council Regulation nr.17/1962 the present repealed. With EU enlargement, it was necessary modernization of procedural rules, this being achieved by means of Regulation (EC) no. 1/2003. The new regulation (Regulation and communications) was the result of five years of negotiations and public debate, seeking more effective protection of competition in European Union. By adopting Regulation (EC) no. 1/2003 was followed: competition law decentralization by adopting a system of legal exception system prior notice applicable law harmonization, strengthening cooperation between the European Commission, national authorities and national courts, in particular by creating the European Competition Network and strengthening the powers of the European Commission. Competition infringements attract a range of sanctions under civil, administrative or criminal, such agreements prohibited under art.101 of the Treaty on European Union shall be null and void. In addition, Regulation (EC) no.1/2003 establishes two types of fines (fines for infringements of competition rules and procedural fines) and penalty payments. To remove any doubt about their legal nature, the Regulation provides that fines are non- Romanian penal. Legislature provides two types of sanctions under art.49 of the Competition Act (civil penalties) and to art. 50, 50 (1), 51 and 54 of the Competition Act (administrative penalties), proceeding in a similar community. Furthermore, it establishes criminal liability to sanction certain behaviors related to designing, organizing or carrying out prohibited practices (Article 60din
88 Competition Law). In order to detect and punish cartels often have difficulty Competition Council precisely because secrecy. Under the influence of American antitrust law attempts to attract the cooperation of the undertakings concerned, a method that has proven to be successful. Thus, a decisive contribution to the initiation of the investigation into a possible cartel justify immunity from fines for the undertaking, subject to certain additional conditions. Also, any reduction of a fine must reflect the actual contribution of the company, both in terms of its quality and contribution when cooperation. These reductions of fines is granted only to undertakings providing evidence (documents, statements etc.). Representing a significant additional contribution in relation to those already in possession of the powers of the Competition Council. Parallels between the European Commission and national competition authorities, submitted a request for clemency authority is not considered a request for leniency and before any other authority. Such Community rules Competition council granted immunity so fine (exemption from the application of fines for violation of Article 5 paragraph 1 of the Competition Act and art.101 paragraph 1 of the Treaty on European Union) and reduce the fine when firms disclosing their participation in a cartel affecting Romania does not fulfill the conditions for obtaining immunity. However, to benefit from some reduction (up to 50%), a company must provide evidence competition elements. Council on alleged violation of law, bringing significant added value compared to those already in its possession and shall meet the general conditions for granting clemency. 4. The conditions for abuse of dominant position First condition to be met in order to find out if this is related anticompetitive practices of a dominant position. It is not unlawful in itself, being sanctioned only abuse of dominant position: the market is not distorted by the mere fact that a large enterprise. Sometimes, in order to operate effectively, a company must achieve very high levels of activity or be present in several markets. In European practice it is considered that an undertaking has a dominant position if it has a significant share of a given market, at least 40% of it, what percentage should be much higher than the next rival. The second condition is that an enterprise or association of enterprises should not abuse the JOURNAL OF CRIMINAL INVESTIGATIONS power they have on the relevant market or in a substantial part thereof, by resorting to anticompetitive actions that may affect trade or harm consumers. The doctrine community is estimated based on the European Commission practice, we can identify a collective dominant position following criteria: ability grouping of businesses that hold dominant position to behave independently of competitors, customers and, last but not least compared to consumers gravity of the abuse of dominant position is reflected in the lack of any exceptions from the provisions of article 6, unlike exceptions to the application of Article 5, paragraph 1, provided by competition law. Arrangements for abuse of dominant position are: Impose, directly or indirectly, the sale or purchase prices, tariffs or other unfair contract terms and refusing to deal with certain suppliers or customers; Limiting production, distribution or technical development to the disadvantage of users or consumers; Application to trading partners of unequal conditions for equivalent services, thus causing some of them a competitive disadvantage; Making the conclusion of contracts subject to acceptance by the other partners of clauses stipulating supplementary obligations which, by their nature or according to commercial usage, have no connection with the subject of such contracts; Making imports without competition offers the usual commercial and technical negotiations, where products and services that determine the general level of prices and tariffs in the economy; Practice of excessive or predatory prices, below cost in order to eliminate competitors or export sales below the cost of production, with coverage differences by imposing increased prices to domestic consumers. Regulate this practice anticompetitive abuse of dominant position focuses on article 6 of Law no.21/1996, the legal provisions of the Regulation on the application of Articles 5 and 6 of the Competition Law no.21/1996 anticompetitive practices, the instructions on the calculation of turnover in cases of anticompetitive as provided in article 5 and 6 of the Competition Law no.21/1996 and in merger cases, those instructions on the ~ 88 ~
89 definition of relevant market for determining the significant Market It is important to note that competition law does not prohibit the existence of a dominant position on the market, but the abuse of dominant position under Article 6. Article 6 of the Competition Law does not apply to undertakings or groups of undertakings to which turnover for the fiscal year prior to the behavior expected in anticompetitive practices does not exceed a ceiling set annually by the Competition Council and market share held by participants in the group does not exceed 5%. These limits shall not apply to anticompetitive practices on prices, tariffs, market sharing agreements or auctions. Abuse of dominant position is a form of unfair competition, unlawful objective concept relating to the behavior of an undertaking in a dominant position, which are likely to influence market structure where, because of this undertaking, the competition is already low Such behaviors can to prevent, by means other than those of a normal competitive, maintaining the level of competition that can still be highlighted and development of this competitive market. As can be seen, in its definition Court of Justice, the emphasis is on changing market situations, natural conditions due to anomalous behavior of the enterprise competition becomes a dominant position. Unlike the definition Court of Justice in the art. 102, taking account of priority, action enterprise which is located in a dominant position, the aims pursued and the results that she has achieved. Definition Court of Justice has the advantage of the concept emphasize the objective to abuse of dominant position. It is based essentially on art. 3 letter. g of the EC Treaty, according to which, Community acts to create a regime that certainly in the internal market is not distorted. Subjective aspects, such as the intent to punish, in terms of commercial enterprises which operates by the rules of the competition or the desire to eliminate competitors who, according to assessments that enterprise, selling dangerous products, do not justify abuse of dominant position. Also, the intervention of the Court of Justice, on why changing market situations caused by use of improper means by now taken into account, it is possible not only when harm to, directly, competition, but in the event that competition is affected indirectly. It happens, for example, in circumstances where dominant position on a given market and produce negative effects on a market distinct connection first. ALEXANDRU IOAN CUZA POLICE ACADEMY Abuse of dominant position can be achieved by using different methods, which will be analyzed in specifying abusive practices. Article 102 includes, as mentioned before, four categories of such practices, but not exhaustive list. Finally, to assess existence an abuse of dominant position has to say can damage trade between Member States as a result of anticompetitive behavior prohibited by the Treaty. This item does not differ from that provided in art.101 par. 1. The only difference, no effect, however, the application is the use of the phrase to the extent that can affect. Prohibition of abuse of dominant position must be interpreted and applied in light of art. 3 letter. g) regarding arrangements to ensure that competition is not distorted in the domestic market and art. 2 on promoting a harmonious and balanced development throughout the Community. In assessing the possibility of damage to trade through this abuse must take into account not only directly harms beneficiaries practices, but also those which indirectly prejudice them by impairing the effective competitive structure as mentioned in art. 3 letter g). When the owner of a dominant position established in the common market tends, by its unlawful exploitation, to eliminate a competitor in the same market set is regardless of whether this behavior is known concerning its export activities or activities in proper common market itself, since it is observed that the removal will have repercussions on the structure constant competition in the common market. Therefore, it is to distinguish the consequences of abusive practices depending on whether a company affected export mainly to third countries, it is shown that the abuse in question affect the structure of competition within the common market. 5. Actions taken by the European Commission on combating abuse of dominant position Major objectives which takes into account in EU competition policy are: integrating markets by streamlining trade across borders and the allocation of resources according to the best conditions; protecting SMEs, which contribute to maintaining a competitive environment.; Consumer protection: maximum benefits for consumers; promote objective economic and social cohesion; development of optimal size companies to compete in global; ~ 89 ~
90 All competition rules have their origin the general provisions of art. 3 of the Treaty establishing the means and ways of achieving Community objectives set out in Art. 2 of the Treaty. In, particular, they refer to a common commercial policy implementation [lit. b], achieving an internal market characterized by the abolition between Member States of obstacles to the free movement of goods, persons, services and capital [lit c], a system ensuring that competition is not distorted [letter g], approximation of national legislation to the extent needed for the functioning of the common market [letter h] These provisions must be reported to the provisions of art. 4, which requires states and the Community in Community objectives, their action to establish economic policy to comply with the principle of a market economy open to free competition. Therefore, any documents to prevent, restrict or distort competition, thus affecting free competition, can lead to malfunction of the common market, the creation of imbalances and discontinuities in intra- Community relations which are designed and tailored enough to satisfy the needs of an open market economy. In this context we mention that under article 96 of the EC Treaty, where the Commission finds that a difference between the provisions laid down by law, regulation or administrative action in Member State distort the common market competitiveness; conditions and that this distortion must be eliminated, it shall consult the Member States concerned (alin1), and if such consultation does not result in an agreement to eliminate distortion, the Council, on a proposal from the Commission, acting by qualified majority, decides directives needed and, moreover, the Commission and the Council may take any other appropriate measures provided for by the EC Treaty (paragraph 2). Article 102 of the EC Treaty as being incompatible with the common market any abuse by one or more undertakings of dominant position in the common market or in a substantial part of it, in so far as it affects trade between Member States, such Report consisting mainly of: Imposing directly or indirectly purchase or selling prices or other unfair trading conditions incorrect; -Limiting production, market outlets or technical development to the prejudice of their beneficiaries; Application of different conditions to equivalent transactions with other trading partners concluded, ranking him thereby a competitive disadvantage; JOURNAL OF CRIMINAL INVESTIGATIONS Determining the conclusion of contracts subject to acceptance by the other parties of supplementary obligations which, by their nature or according to commercial usage, have no connection with the subject of such contracts. These processes used in abuse of dominant position will be considered in specifying abusive practices. Abuse of dominant position on the market for the distribution of ice As a result of a complaint made by Mars, the European Commission found that Unilever had abused its dominant position. Unilever freezers dealers in Ireland providing totally free, provided that they store in them only Unilever products. Consequently, Irish consumers had a very limited possibility to choose between different types of ice. Consequently Commission considered this request for exclusive use as an abuse of the company Unilever, which took advantage of its dominant position on the market. Misuse of dominant position on the market of air transport services provided by travel agencies Acting on a complaint made by Virgin Airways in July 1999, the European Commission found that British Airways had abused its dominant position on the relevant market, breach consisting in establishing a system to reward brand loyalty. This means that the market for air transport services provided by some British travel agency was closed for business competitors Airways British. British Airways British allowed certain travel agents an additional fee if they had the same amount of sales as last year, or if it exceeded in ticket sales for British Airways. This system wanted to increase the fidelity, that ends by closing other markets air transportation offered by travel agencies for competitors and to discourage British Airways plans to offer services to other airlines. British Airways held a dominant position, so this system was a real barrier to competing airlines, preventing them access. Because agencies favored the airline paid the highest commission, consumers are always offering tickets for British Airways, even if the services offered by competing airlines were more favorable. Accordingly, the Commission considered that this practice, which affect market service air lines through travel agencies, was a case of abuse exerted a dominant position. Abuse of dominant position in the organization of the World Cup ~ 90 ~
91 On 20 July 1999 the European Commission adopted a formal decision against the French Committee organized World Cup, held in France in World Cup organizing committee (CFO) held a monopoly of the event, including ticket sales. European Commission found that the arrangements regarding the sale of tickets for finals matches were discriminatory and constituted an abuse of dominance exercised due. Ticketing arrangements for the consumers favor could give an address in France, to the detriment of consumers who were residents of other countries. Individuals resident in France, who wanted to pursue final games were so strong disadvantage compared to French residents. Consequently, the European Commission issued a decision condemning the CFO. Prohibition of cartels in district heating In October 1998, the European Commission abolished a cartel of producers of pipes for heating systems, urban transport, which jointly set prices and conditions for bidding by public authorities. Cartel was established in Denmark in late 1990 and then spread to Germany and other EU countries. Since 1994, he covered the whole European market. In Denmark and Germany, firms had set up a fraud system of tendering procedures: they established the 'favorite' who would win each contract. Each member of the cartel taking part in auctions offers more expensive than the 'favorite.' In addition, the cartel members had set their national markets and, by mutual agreement, the prices of pipes used to transport heat. Buyers pipes, especially local authorities were thus obliged to buy from the same supplier, without having the opportunity to make a real choice between offers and competitive prices. European Commission imposed fines amounted to about 92 million all ALEXANDRU IOAN CUZA POLICE ACADEMY cartel members. In this case, anti-competitive practices have harmed firms outside the cartel, which were systematically excluded from the market and local authorities as a result, taxpayers. Cartel banned sugar industry Two producers and two sugar traders in the UK have adopted a concerted strategy to increase prices in the sugar market. End consumer, this understanding has increased more than the purchase price would have happened if there had been competition. In 1998, the Commission prohibited companies understand and apply fines of 50 million euro. In Tetra Pak II, Tetra Pak group which owns over 90% of aseptic packaging market mainly for milk and fruit products, is was in a dominant position on both market and 95% of aseptic cartons filled equipment market. Consequently Tetra Pak was a quasi-monopoly. Meanwhile, in neighboring markets, the non-aseptic packaging, Tetra Pak held 55% of the market had characteristics of an oligopoly. The next competitor, the Norwegian group Elopak, held 27% of the market, while the rest was held by three companies. To cover market Elopak owned by Pure Pack cartons, Tetra Pack has sold its cartons, Tetra Rex, prices located near production. La costs on July 24, 1991, the group was fined 75 million euros, confirmed by the Court in 1994 because it was engaged in a number of abuses: forced discriminatory prices or joined with other types of abuse: Sales interconnected denials of having forced etc. Prices are located at or below cost. Dominant undertaking due to economic power available will be able to sustain losses for a period of time, and the competitor with less economic power, having access to fewer resources will be taken off the market. References: 1. Association Agreement with the European Union 2. Competition law No.21/ Gabriel Ungureanu, European competition law, Cermaprint Publishing House, Bucharest, Law on unfair competition No.11/ M. Barsan, European economic integration, vol.ii, the European Union - economic relations with other areas, publishing CDIMM Foundation, Maramures, Octavian Căpăţână, Commercial competition law, Edition II, Lumina Lex Publishing House, Bucharest, Octavian Căpăţână, Unfair competition law. Unfair competition in domestic and international market, Lumina Lex Publishing House, Bucharest, Octavian Manolache, Community Law, All Beck Publishing House, Bucharest, 2001, p Regulation No.1/2003 on the application of art.101 and 102 of the EC Treaty 10. Treaty establishing the European Communities 11. Treaty of Amsterdam 12. Treaty on the Functioning of the European Union ~ 91 ~
92 JOURNAL OF CRIMINAL INVESTIGATIONS THE FIELD OF ADMINISTRATIVE CONTRACTS IN THE ROMANIAN POSITIVE LAW RELATED TO THE PROVISIONS OF ART. 2 ITEM (1) LET. C) FROM LAW NR.554/2004 REGARDING THE ADMINISTRATIVE LEGAL DISPUTE Lect. Cristian Giuseppe ZAHARIE Ph.D student [email protected] Romanian-American University, Bucharest Niculae GAMENŢ-ANTONIU Ph.D student [email protected] Romanian-American University, Bucharest This paper is an overview the administrative contracts as it shown in the contemporary practice of public administration authorities. Some observations and the point of view of authors regarding some practical aspects are presented. The paper submits for the specialist s different agreements realized by public administration authorities who show some specific features of administrative contracts. Post revolutionary regulations in the field of administrative law have refounded a judicial category which disappeared from the Romanian law at the end of the 40 s: the administrative contracts. Key words: public administration, administrative contracts, regulations. The provisions of art.2 item (1) let. d) from Law nr. 554/2004 regarding the administrative legal dispute consecrated in general terms in the Romanian law the field of administrative contracts, submitted under the aspect of the conclusion and the enforcement of jurisdiction to the tax and administrative legal dispute courts. Broadly speaking, the administrative contract is a convention concluded between a public authority and a private person, a will consent submitted to a special judicial policy of administrative law, a convention which has a specific character due to the parties, object, applicable principles, conclusion, enforcement, ceasing, clauses and their solving. These administrative contracts are judicial documents which the public administration bodies concluded with the administrative ones, documents which include a will consent triggering rights and obligations for the contracting parties 1. They were also analyzed by distinguished authors from the interwar period. In prof. Erast Diti Tarangul s opinion the contracts concluded by the administration with the private persons with the purpose of co-operating with a view to performing a public service or meeting a general interest are public law contracts or administrative contracts 2. Administrative contracts are defined as the contracts concluded on the grounds of the will consent which interferes between an authority of public administration or a person authorized by it and a private person, submitted to the administrative law policy 3. In Geoge Costi s opinion by the administrative contract we understand the will consent, manifested under a certain form and concluded between the qualified representatives of an administrative person and private persons or the agents of other public administrations, upon certain determined objects, with the purpose of triggering judicial effects necessary to the meeting of the general interest 4. The text let. c) item (1) of art.2 of Law 554/2004 limits the categories of contracts concluded by public authorities which are submitted to the jurisdiction of administrative legal dispute courts. In the determining and limiting of contracts which come under the jurisdiction of administrative legal dispute courts the legislator takes into account the criterion of their object, namely: 1 Negoiţă A., Adinistrative Law, Sylvi Publishing house, Bucharest 1996, pag Tarangul E.D., A Treaty of Romanian Administrative Law, Bucovina s Voice Publishing house, Cernauti, 1944, pag. 413 and the fol. ~ 92 ~ 3 Petrescu R.N., Administrative Law, Cordial Lex Publishing house, 2001, Cluj-Napoca, pag Costi G., The Administrative contract notion, Bucharest, The Official Journal and State s printing offices, 1945, pag.23.
93 the showing to advantage of goods which represent public property; the carrying out of the works of public interest; the carrying out of public services; public acquisitions 5. The legal provisions do not confine only to the performing of these operations by the administrative procedures regarding the public acquisitions (including the assimilated contracts), granting and renting. Obviously, the conventions concluded by the public administration authorities cannot all be administrative contracts. Despite some contrary opinions from the Romanian 6 and foreign judicial doctrine we must 5 At present, the judicial policy of public acquisition contracts is regulated by the provisions of G.E.O nr.34 from regarding the assigning of the public acquisision contracts, the contracts of the concession of public works and the contracts of service concession. G.E.O nr.34 from regarding the assigning of the public acquisition contracts, the contracts of the concession of public works and the contracts of service concession was approved of and modified by Law nr. 337/2006. With a view to enforce the ordinance, the Government issued the Framework methodological norms, approved of by G.D. nr.925 from The public acquisition contract is that contract by onerous title, concluded in writing between one or more contracting authorities, on the one hand and one or more economic operators, on the other hand, having as purpose the carrying out of works, the supplying of products and the carrying out of services. 6 In a thought current from the interwar public law all the judicial documents (which did not have a unilateral character) concluded by public authorities with different contracting partners were considered administrative contracts. These contracts were submitted to both general principles applicable to the contracts from the private law and the norms of the administrative law. The main supporters of this thesis were P. Strihan, G.Costi, E.Botis. It was considered that all the contracts concluded by the public administration were submitted, in the first place, to the general principles of the private law contracts, and that is why they remain contracts and in the second place, to some principles and norms of administrative law, and that is why they become of an administrative judicial sort. In connection to this theory, we must also take into consideration that in their activity the tribunals were inclined, in the absence of some precise rules and in the absence of some proper contractual clauses (stipulated in the administrative contracts) to search in the private law analogies for their judging and interpretation Rarincescu C.G., the Romanian administrative legal dispute, Universal Alcalay and Co. Publishing house, Bucharest, 1937, pag. 26. In the project of the Code of administrative procedure it is stipulated, regarding the administrative contracts that a contract can be classified as being an administrative contract if it meets the following conditions: a) at least a contracting party is a public authority; ~ 93 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY exclude from the field of administrative contracts the civil, commercial and labour conventions, as well as the contracts regarding the goods from the state s private property and from its territorialadministrative centres. It must also be pointed out that in the present drafting, the text of Law nr.554 from 2004 does not take into account the totality of the contracts concluded by the public authorities which the doctrine considers as being of an administrative judicial kind. For the categories of the administrative contracts mentioned by art.2 item (1) let.c) from Law nr.554/2004 regarding the administrative legal dispute in the Project of the administrative procedure code there was suggested the assigning to the administrative legal dispute courts competence of public loan contracts and of the conventions regarding the selling of goods from the state s private property and from the territorialadministrative centres as well. It is true that in the case of the selling of goods from the state s private property, the procedure of the approval of the contract is submitted to the administrative procedure, but, we must not omit the fact that the sold out good belongs to the state s private property and the enforcement of the contract is governed by the provisions of common law, which causes the judicial type of these contracts to be mainly of private law 7. But, this contract has some characteristics which bring it near to the administrative contacts. In the case of the contracts of public loan, this sort is obviously administrative, of public law 8. In the judicial doctrine, some contracts from the field of public transport 9 and of irredeemable b) the purpose of the contract regards the forming of public property, the showing to advantage of the goods/activities/services which represent the public property of state or territorial-administrative centres, the carrying out of the works of public interest, the exercising of public services, the alienation of goods from the state s public property and territorialadministrative centres, the granting of some sums of money from the public budget by irredeemable title. c) it has a regulating part made up of clauses settled by the law or administrative documents, derogatories from the common law. 7 See L.Giurgiu, C.G. Zaharie Theoretical and practical aspects regarding the provisions of art.155 from the project of the Code of Administrative Procedure and Decision nr.765 from 24 February 2004 of the tax and administrative legal dispute Section of the High Court of Cassation and Justice, Judicial Universe, See E.Balan Financial Law, C.H. Beck This type of convention is considered in the doctrine as representing an administrative contract of transport
94 financing (irredeemable financing contracts, grant contracts 10 and collaboration contracts with a view to getting a financial aid 11 ) concluded by the authorities of the public administration in the terms of administrative law are as well considered as being of an administrative judicial sort. The relations between N.S.R.R. and the public institutions are regulated on the basis of the activity contract of the National Society of Romanian Railways, concluded between the Ministry of Transport, as a representative of the Government and N.S.R.R. The activity contract of N.S.R.R. is drawn up by N.S.R.R. together with the Ministry of Transport 12. The contract of irredeemable financing is a contract by which within an administrative procedure a public authority offers an irredeemable sum of money to a beneficiary who has the obligation of carrying out the project for which he received the financing. One party of the contract is necessarily a public authority, her field of competence setting the specific character of the contract. Many times the sums of money totally or partially come from community funds, and the provisions of the (Administrative Law digital course I.Corbeanu Chapter 5 The Administrative Contracts, Section 3 The Main administrative contracts) 10 I.Corbeanu Administrative Law: special part On-line course. 11 Regarding the appropriation of public funds, these contracts are submitted to an administrative judicial policy. The authority follows an administrative procedure, and the other co-operating party must necessarily perform, using the funds appropriated by the authority of local public administration, a certain activity of public utility. 12 This contract will mainly include the following: a) the main quantitative and qualitative indicators of the activity of haulage and people transportation, which are to be met by N.S.R.R. ; b) the N.S.R.R. activities in the exercising of the attributions of guaranteeing the working, maintenance and development of the Romanian railway infrastructure; c) the complete list of the social services which are to be performed by N.S.R.R., according to the provisions of the governmental law in force; d) the N.S.R.R. activity in providing services regarding the medico-sanitary, educational and sportingcultural specific assistance; e) the Government responsibilities regarding the proper working of public railway transport, including the transfers from the government budget for the railway infrastructure, the activity of the education and medico-sanitary assistance, as well as the necessary sums of money for the N.S.R.R. compensation for the social services, to the extent to which governmental laws stipulate the necessity of assigning facilities for the railway transport. ~ 94 ~ JOURNAL OF CRIMINAL INVESTIGATIONS contract have absolute power for the parties and they are set between them as norms of a technical, financial or administrative kind. Related to a variant of these contracts there has been shown in the doctrine that the grant contract is that contract included between the Romanian Social Developing Fund and the representatives of rural communities and disadvantaged groups on whose grounds the Fund assigns the beneficiaries or, depending on the situation, the intermediary organizations, free of charge, sums of money called grants, with the exclusive purpose of the carrying out of the approved projects 13. As it has already been pointed out, the provisions of Law nr.554/2004 also take into consideration the contracts which show the public property goods to advantage. By enforcing Laws nr. 69/1991, 15/1990, 213/1998, 219/1998, 528/2004, 337/2006, 470/2002, 215/2001 and so on, the public administration authorities concluded various contracts having as purpose the ceding of the use (exploitation) of some real estate or personal estate from the public property of the state or of the territorial-administrative centres. In the case of concession (including the contracts of the commissioning of the administration of public services by concession 14 ) and of renting, the judicial nature of these contracts is obviously administrative. At present, the judicial policy of the contracts of granting public works and of the contracts of granting services is regulated by the provisions of G.E.O. nr.34 from regarding the assigning of the contracts of public acquisition, the contracts of granting public works and the contracts of granting services. The G.E.O. nr.34 from regarding the assigning of the contracts of public acquisition, the contracts of granting public works and the contracts of granting public services was passed and modified by Law nr.337/2006. With a view to enforcing the ordinance, the Government issued the Framework methodological norms, passed by G.D.nr.925 from I.Corbeanu Administrative law: special part On-line course. 14 For example the contracts of commissioning the public services administration by concession concluded on the grounds of Law nr.219/1998 regarding the policy of concessions, of Ordinance nr.87/2001 regarding the sanitation public services of localities, of Law nr.326/2001 regarding the community administration services, with the subsequent changes. 131/ namely L.C.D. nr.196/
95 The G.E.O. nr.54 from 28 June 2006 regarding the policy of the contracts of granting public property goods brought a new regulation to the granting of the goods which were part of the public property of the state or territorial-administrative centres 15. The assigning, concluding and carrying out of the renting contracts which regard state s public property goods and in which a state body takes part, are the aims of the regulating of several governmental laws out of which the most important with a general aspect in this regard are: Law nr.213/1998, regarding public property and its judicial policy; Law nr.215/2001 regarding the local public administration. By these contracts, a state body - central or local public authority - must provide a private law person with the temporary, total or partial use of a good belonging to the public property of the state, in exchange for a sum of money called rent. Art.125 from Law nr.215/2001 stipulates the possibility which the local and district councils have to decide for the public property goods, ( ) to be rented Taking into consideration the necessity and urgency of the full copatibilization of national legislation in the concession field with the community regulation and practice, the recommendation of the European Commission for total and express abrogation of Law nr.219/1998 regarding the concession policy, with the subsequent changes and completions, at the same time with the coming into force of the Government Emergency Ordinance nr.34/2006 concerning the assigning of the contracts of public acquisition, of public works concession and service concession, as well as the provisions of art.136 item (4) from the Romanian Constitution, republished, the passing of this emergency ordinance which regulates the policy of the concession of public property goods was necessary. It came into force starting with 30 June The provisions of this governmental law do not apply to the contracts regulated by the Government Emergency Ordinance nr.34/2006 regarding the assigning of the public acquisition contracts, the contracts of concession of public works and the contracts of concession of services. In the case of a contract whose assigning is within the provisions of the Government Emergency Ordinance nr.34/2006 for whose carrying out the exploitation of a public property good is necessary, the right to exploit that particular good is passed on within and according to the procedure enforced for the assigning of the contract in question. In this case, the contracting authority concludes a single contract governed by the Government Emergency Ordinance nr.34/ This type of administrative contracts differ from the renting contracts which are common in the civil law by the following features: - they are submitted to a special administrative judicial policy, by such conventions public property goods being shown to advantage; A.Negoiţa, A.Iorgovan, L.Giurgiu and ~ 95 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY By norms included in the special law 17, the public-private partnership contracts (PPP) and the other authors consider these renting conventions as administrative contracts; The renting contract completely sums up the characteristics of the administrative contract by the judicial policy which can be applied to it because: - the party who rents the good is a public law person; - as a general rule, for concluding the contract the beforehand organization of a public auction for the adjudging of the contract by a public law judicial person is necessary; - the value of the rent is settled by the state body also taking into account the offers made by the offering private persons; - the cashed rent is used for purposes which regard the meeting of the public interest; - by these contracts a private law person co-operates with a state body with a view to performing an activity of public utility; - the rented good must be exploited according to its specific character and to the convention concluded with the public authority; - in determining the value of the rent, the state body that is part of the contract must take into account the special importance of the activity for whose carrying out the rented good is to be used; - the private person a contracting party, has the obligation to carry out an activity of public utility by the exploitation of the good. - for the renting of public property goods there must exist the issuing by an authority stipulated by the law of an administrative document of approval of this operation; - it is also necessary for the good to belong to the public property of the state or to a territorial-administrative centre; if the good belongs to their public property, the contract will not have an administrative judicial character, even if it displays some similarities concerning the procedure of closing, approving and carrying out related to the public law contracts. 17 The public-private partnership contracts were regulated by the E.O. nr.16/2002 regarding the public-private partnership contracts, a governmental law modified by Law nr.470/2002 (law of approval of the ordinance) and by Law nr.528/2004 for the modifying and completion of the E.O. nr.16/2002 regarding public-private partnership contract, as well as Law nr.219/1998 regarding the policy of concessions. The legal provisions regarding the promotion of direct investments with a significant impact in economy were applicable to the public-private partnership projects for concession of works. The contracts of public-private partnership for the concession of works were not submittable, by analogy, to the legal provisions regarding other conventions governed by administrative or private governmental laws (concluded by the authorities of public administration), even if the objective of these contracts shared some similarities. The notion of public-private partnership for the concession of works was introduced by the provisions of Law nr.528/2004 regarding the modifying and completion of the E.O. nr.16/2002 regarding the public-private partnership contracts as well as of Law nr.219/1998 regarding the policy of concessions. At the same time, this governmental law abrogated a range of provisions from the G.E.O. nr.60/2001 regarding the public acquisitions passed with modifications and completions by Law nr.212/2002.
96 public-private partnership contracts for the concession of works were implicitly classified as administrative contracts and the litigations turned up in connection with them were passed on to the administrative legal dispute courts for solving. The public-private partnership contract for the concession of works was a contract whose aim was the carrying out or, depending on the situation, both the designing and the carrying out of one or more building works, the way they were included in the official statistical classifications, or the carrying out, by all means of any combination of these building works, which met the requirements of the contracting authority and which led to a result meant to carry out a technical-economic function by itself. In return of the carried out works, the contractor, as a concessionaire, received the right to totally or partially exploit the result of the works, a right to which, depending on the situation, the payment of a sum of money could be added. After 1989, public administration authorities concluded a large number of contracts which regarded the showing to advantage of public property goods. Some of them allowed the avoidance of the public auction procedure and their classification proved difficult. Such contracts are: - Contracts of the location of the administration, considered as having an administrative judicial nature 18 if they had as target the ceding of the use of some public property goods. These contracts, rarely encountered at present, were frequently concluded in the 90 s. In general, they were carried out either by the ending of term, or by their replacing by other contracts of sale (privatization), renting or concession. Among these contracts, only those whose aim is the exploiting of public goods are of administrative judicial nature. These contracts are stipulated by Law nr.15/1990 regarding the reorganization of state economic units as autonomous state-owned companies or trading companies and regulated by the Government Decision nr.1228/1990 concerning the methodology of concession, renting and location of administration, being mentioned as well in other various governmental laws See in this regard A. Negoita, Administrative law, Silvy Publishing house, Bucharest, pag Art.22 from G.D. nr.1228/1990 stipulates that by the contract of the location of the administration, the autonomous state-owned company or the trading company offers to one or more Romanian or foreign private or judicial persons, the administration of some departments, plants, factories or other sub-units. ~ 96 ~ JOURNAL OF CRIMINAL INVESTIGATIONS The association in participation contracts regarding the public property goods or the contracts whose purpose is the achieving of some objectives 20 of public interest. On the grounds of the dispositions of art.20 let. v and art.28 (2) and art.63 let. t from Law nr.69/1991 (completed by Government Ordinance nr.22/1997), the local and district councils concluded various partnership contracts. Some of these contracts display the characteristics of some private law contracts, submitted to civil judicial policy 21, others contain the defining elements of the administrative contracts. The association in participation contracts from the second category have the following characteristics: one of the parties is a public authority (local council or district council); their objective is the meeting of a public general interest ; the judicial inequality of the parties; The contract of the location of the administration is a contract: - constitutive of rights and obligations, the tenant acquiring the right to exploit one or several state property goods used in the field of economic activities, and the lessor has the right to cash the rent; - by onerous title, the tenant aiming to cash the rent, and the lessor aiming to exploit the good with a view to getting profit; - commutative, the parties knowing the extent of the assumed obligations; - named, in art.22 and art.24 of the G.D. nr.1228/1990, the legislator using the term of contract of the location of the administration ; - typical, being regulated by governmental laws and having a framework content stipulated in annex nr.7 to the G.D. nr.1228/1990; - synalagmatic, both parties having obligations concerning its carrying out; - administrative: the contract fully meeting the characteristics of the administrative contract by the judicial policy which is applicable to it. By its distinctive characteristics (the contracting parties, the clauses and the applicable judicial policy) this contract has an administrative judicial nature if it is carried out by the exploiting of public property goods by performing some services or activities of public interest. 20 Sometimes such contracts are concluded between two authorities of the local public administration and can precede the initiation and enforcing of the public acquisition procedure (regulated by art.110 item 1), let.(c) from the G.E.O. nr.34/2006 regarding the assigning of the public acquisition contracts, the contracts of concession of public works and the contracts of concession of services), with a view to contracting a loan by the contracting authorities. 21 See in this regard T. Mrejeru, D.A.P. Florescu, R. Lazar, B. Mrejeru The international and internal contract of association in participation, commented legislation and jurisprudence, Continent Publishing house, XXI, Bucharest 2000.
97 the establishing of the clauses by law or by a unilateral manner by the public administration authority on the grounds of and by enforcing the law; when the public interest requires it or when the private law person has not carried out her contracting obligations, the public administration authority can modify or unilaterally cancel the contracts; they are meant to ensure the working of some public services, the carrying out of some works, activities or they concern the exploitation, the showing to advantage of a public property good; The association contracts concluded between the public administration authorities have an administrative judicial nature if their objective is the financing or the carrying out of some actions, works, services or projects of local or district public interest, or if the local public authority takes part in the association with a good which belongs to the public property of the territorial-administrative centre. In this case, the showing to advantage of public property goods is being achieved. The possibility of concluding these contracts by the local public administration authorities is stipulated by Law nr.215/2001 within three distinct articles. In art.104 item (1) let.(s) from the law it is stipulated that the district council as a deliberative authority of the local public authority formed at a district level, ( ) decides, on the terms of the law, the cooperation or the association with Romanian or foreign judicial persons, with nongovernmental organizations and with other social partners, with a view to financing and carrying out, together, actions, works, services or projects of district public interest. Art.95 item (2) let.(r) from the law also stipulates the attribution of local councils of the districts of the Municipal town of Bucharest of deciding under the terms of the law, with the beforehand consent of the General Council of the Municipal town of Bucharest, the cooperation or the association with Romanian or foreign judicial persons, with nongovernmental organizations and with other social partners, with a view to financing or carrying out, together, actions, works, services or projects of local public interest ; The commodate contracts 22 regarding some public property goods concluded by the public administration authorities. 22 Such a commodate contract was stipulated by the G.O. nr.124/1998 regarding the organizing and functioning of medical consulting rooms and regulated by the Order of the ~ 97 ~ ALEXANDRU IOAN CUZA POLICE ACADEMY The issue of establishing the administrative judicial nature of the commodate contracts concluded by the administrative authorities is to be taken into consideration in the case in which their objective is represented by one or more public property goods. The concluding of some commodate contracts regarding goods from public property is regulated by art.136 item(4) from the Constitution, art.17 from Law 213/1998 and art.126 from Law nr.215/2001. In art.126 from Law 215/2001 it was stipulated that local and district councils can turn over for free of charge use, for a limited time period, local or district public or private property movables or real estate, depending on the situation, to judicial persons, non-profit making, who carry out charitable activities of public utility, or to public services. Minister of public health and family nr.35/2002 regarding the reorganizing of the medical assistance in specialized and hospital outpatient treatment. The contract has as an objective the assigning by the Ministry of Public Health and Family and local public administration authorities of the free of charge use of some places necessary for the founding of medical consulting rooms and personal property, including medical equipment, to some doctors who carry out their activity inside of and by using these medical consulting rooms. Doctors carry out a public interest activity on the medical consulting rooms, showing to advantage private and public property goods of the state and territorial-administrative centres, and the clauses of the contract are stipulated by the law. By the concluding of the commodate contract, the local or central administration authority obliges itself to place at the disposal of the borrower in commodate (the private law person who carries out a charitable activity or an activity of public utility or a public service) a good which the borrower in commodate will use in a temporary or free of charge way. This convention concluded by a public administration authority is an essentially free of charge contract, being submitted to various regulations depending on the specific character of the good which represents its objective. The contract is concluded for a determined time period, established by a governmental law issued by a local or central public administration authority. The lender in commodate is an authority of public administration and the borrower in comodate is a private or judicial person of private law. The estate can be personal or real, belonging to the public or private property of the territorialadministrative centres or of the state. This estate can be represented by: a building, a medical consulting room, their outbuildings, a public museum object borrowed for the organizing of an exhibition or books from public libraries. By concluding the contract, the public administration authority as a lender in commodate party maintains its right to administer the estate, and the state or the territorialadministrative centre, depending on the situation, the property right. The good whose free of charge use is assigned by the public administration authority must be public property and must be individually determined.
98 By these contracts, in the case of the carrying out by the private law person of an activity of public interest a showing to advantage of the public property goods is performed; The partnership contracts regarding public property concluded by the public administrative authorities. Law nr. 215/2001 regarding the local public administration, republished, within art.36, item7 letter a) stipulates that the local council can decide the association with judicial persons in order to carry out some works of local public interest. Local councils concluded such contracts on the grounds of the provisions of art.36, item 2, letter c and item 7 letter a and art.45 from Law 215/2001 republished regarding the local public administration. This category of contracts concluded by the local public administration authorities can refer to operations which involve the taking hold of public property; The contracts concluded by the public administration authorities regarding the ceding of the right to administer a public property good. Regarding a real right concerning public property, the concluding of such a contract involves the enforcement of the administrative judicial policy. The objective of this contract is represented by the free of charge ceding of the right to administer one or more public property goods; The collaboration contracts concluded by the public administration authorities JOURNAL OF CRIMINAL INVESTIGATIONS regarding the showing to advantage of the public property. The objective of the contracts is represented by the collaborating of the contracting parties, in order to exploit a public property good, contracting parties who meet the contracting obligation of mutually providing each other with certain services, complying with the terms and conditions stipulated by the contract. The main objective of the collaboration contract is represented by the exploiting of the public good in the location stipulated by the contract. Obviously, the contract shows to advantage property goods, a characteristic which renders to it an administrative judicial nature. We can thus conclude that, as in the present positive law, the applications of the notion of administrative contract do not confine only to the contracts of concession of services and public works or to the totality of the public acquisition contracts, but they are to be found in a variety of contracts which the administration concludes with third parties. For the future, we can anticipate, taking into account the regulations from the West-European community states that the field of administrative contracts will enjoy a broader regulation which will trigger the enhancing of the variety and role of these contracts in full accord with the new exigencies and the general public interest. References: 1. Balan, E, 2007, Financial Law, Bucharest, C.H. Beck. 2. Costi, G., 1945, The Administrative contract notion, Bucharest, The Official Journal and State s printing offices. 3. Giurgiu, L., Zaharie, C.G., 2008, Theoretical and practical aspects regarding the provisions of art.155 from the project of the Code of Administrative Procedure and Decision nr.765 from 24 February 2004 of the tax and administrative legal, dispute Section of the High Court of Cassation and Justice, Bucharest, Judicial Universe, 4. Mrejeru, T., Florescu, D.A.P., Lazar, R., Mrejeru, B., 2000, The international and internal contract of association in participation, commented legislation and jurisprudence, Bucharest, Continent Publishing house. 5. Negoiţă, A., 1996, Adinistrative Law, Bucharest, Sylvi Publishing house 6. Petrescu, R.N., 2001, Administrative Law, Cluj-Napoca, Cordial Lex Publishing house. 7. Rarincescu, C.G., The Romanian administrative legal dispute, Universal Alcalay and Co. Publishing house 8. Tarangul, E.D., 1944, A Treaty of Romanian Administrative Law, Cernauti, Bucovina s Voice Publishing house. ~ 98 ~
99 ALEXANDRU IOAN CUZA POLICE ACADEMY BRIEF ANALYSIS ON PROBLEMS THAT NEED TO BE CLARIFIED DURING THE INVESTIGATION OF THEFTS Lect. Marin RUIU Ph.D Alexandru Ioan Cuza Police Academy In the present article, the author presents the main aspects that need to be clarified during the investigation of thefts, both in theory, and in judicial practice in this domain. Key words: time and place of the illegal action, victim, police, suspects, crime scene forensics, verification, truth, witnesses, working together, lacks, legal notices, alibis, prone to, frequent, use of, precaution, mode of operation. 1. Time and place of the illegal action. Through solving this problem, a series of important unknown facts are revealed. Thus, the place offers possibilities for identification, emphasis, fixation, and taking traces and material evidence, interpretation and their valuable use with the purpose of shedding light on certain aspects related to the illegal action. Also, knowing the time and place can lead to the correct group of suspects. This group will contain the people that reside in the area, the people from the victim s entourage, and the people that frequent certain places in the area. The circle of suspects will also contain people with dubious pasts, ex-convicts, or those who are prone to committing crime. We must state that an activity that implies a combined effort of several police specializations must be realized through the organization of the gathering of information, actions which must be undertaken with priority immediately after finishing the crime scene forensics. Knowing the place where the illicit activity has taken place, and even more, of the time period in which it has been committed, represents the starting point in the identification of witnesses. 1 The validity of witnesses and people that give statements can be verified though knowledge of the time and place where the illegal act took place. Thus, it can be appreciated if, in the given circumstances distance, lighting, etc. witnesses or other people have given correct information regarding the cause. Also, the validity of the statements of the victim regarding the possibility to retain details of the perpetrator, and thus, to recognize him if he were to be presented, can be tested. By knowing the time and place of the crime, we have a possibility to establish the activities undergone by the perpetrator in the critical period, and through investigation, to rule out any alibis he has invoked. The police also have the possibility to verify the victim s statements regarding the goods that he/she says have been stolen. It has been proven in judicial practice, that, for example, administrators declare a bigger theft, in order to cover up certain lacks, or even other people that make similar statements in order to receive certain bonuses. 2. Mode of operation used by the perpetrators. The mode of operation can be defined 2 as a complex of actions, skills and procedures used by criminals that characterize their activity and personality, before, during, and after committing the illegal action. The problem of the mode of operation is not a new one, being used by police since earlier days, representing a real possibility for identification of perpetrators and used for proving criminal activity. The following can be used as clues for proving the mode of operation 3 : victim, period (time) in which it has been committed, place and environment, mode of organization and perpetrator skills, procedures used (before, during, and after 1 V. Bercheşan, C. Aioaniţoaie, I.N. Dumitraşcu, C. Pletea Tratat de metodică criminalistică, Ed. Carpaţi, Craiova, 1994, pag ~ 99 ~ 2 Ion Poenaru, În prezent şi perspective în ştiinţa criminalistică, Ed. M.I., Bucureşti, 1979, pag Neculai Zamfirescu, Logica cercetării criminale, Ed. Printeuro, Ploieşti, 2000, pag
100 the crime), precautions, traces at the crime scene, number of similar crimes and frequency. Investigation units must determine if the theft has been committed in any of the surroundings that can lead to giving the crime a certain qualification. In order to retain these surroundings, investigators must establish if the theft was done through the use of these procedures or means, because the possession of means of forced entry, climbing tools, or real/fake keys is not enough to give the crime a qualification. 4 Theft can be done in several ways, either incriminated by law, or by certain individual particularities related to that action only. This crime can be undergone in the most numerous and varied ways, with particularities that lead to a framework of theft modes, almost impossible to count and individualize. Establishing the mode of operation is important in several ways. Thus, investigators will proceed to forming a list of suspects. First of all, people who have committed such crimes with similar modes of operation in the past will be considered suspects. Comparing the mode of operation to the suspects list will narrow it down, with direct effect to solving the case. Knowing the mode of operation is also important for knowing which kind of crime it really is. 5 This knowledge on the mode of operation determines measures such as the identification and seizure of objects that have been used to committing the crime. Often, certain situations come up in practice, in which perpetrators use vehicles or carriages to transport the goods they have stolen. In order to apply confiscation laws upon objects that have served the purpose of the crime, it is necessary that that certain object be used for such a purpose. At the same time, the object must belong to the perpetrator. 6 This is in accordance with judicial practice, which believes that in the situation in which the perpetrator is investigated for being an accomplice at qualified theft, meaning that he helped others steal goods by transporting them with his automobile, the investigators are obliged to confiscate that certain vehicle 7. 4 V. Dongoroz, S. Kahane, I. Oancea, I. Fodor, N.Iliescu, C-tin Bulai, R. Stănoiu, V. Roşca "Explicaţii teoretice ale Codului penal român. Partea specială", vol. III, Ed. Academiei Române, Bucureşti, 1971, pag. 444 ;şi p Em. Stancu, Tratat de Criminalistica, Ediţia a-v-a, Editura Universul Juridic, Bucureşti, 2010, p.252 şi următoarele. 6 Trib. Supr., Secţ. Pen., dec. nr. 2814/ Idem, dec. nr. 2528/1987 (extras). ~ 100 ~ JOURNAL OF CRIMINAL INVESTIGATIONS The above situation meets the conditions of the law regarding special confiscations, as a safety measure, and doesn t represent a complementary punishment, referring to an object that has aided in doing the crime, and even if it belongs to some other person than the author of the theft, he has known the purpose of its use. On the other hand, it is considered that a vehicle can thought of aiding the perpetrators only if it transports the goods as an action that takes part of a continuous crime (during the crime itself), and not if the crime has been consumed. 8 Other authors 9 consider that establishing the mode of operation in which the perpetrator has acted is of importance to: if he has known the place of the crime establishing the entry/exit points of the criminals if there was one, or more perpetrators vices or professional skills how long was he present at the crime scene 3. The goods, the stolen values, the identification of the person who has been stolen from, as well as other consequences of the crime. Solving this problem is imposed in order to establish the nature of the stolen goods, their total value, and the consequences of their disappearance. Determining these goods is necessary for: knowing what to search for, and notifying the public; finding them on the perpetrators or on other people that have gained possession; reestablishing their certain status; verifying that the stolen goods were indeed in the patrimony of the person from whom they were stolen from; appreciations on the civil demands requested; determining the crime and emphasizing the causes and surroundings that have made the crime possible; qualifying the crime, keeping in mind that certain aggravated forms of theft are conditioned by especially severe consequences. Regarding the person from whom the goods were stolen, a problem rises due to the fact that 8 V. Paşca, Măsurile de siguranţă. Sancţiuni penale, teză de doctorat, 1997, pag L. Cârjan, Tratat de criminalistică, Ed. Pinguin Book, Bucureşti, 2005, pag. 644.
101 they notify the police in the area in which they reside or have their offices. Thus, according to the person who has been stolen from, the competence of police investigators is established. 4. The destination of stolen goods and values, as well as the possibility of recovering them, or their value. Knowing the destination of the goods leads to accomplishing the first task of the investigators referring to the recovery of the stolen goods. Solving this problem is important in the next ways: reestablishes the pre-crime situation by retrieving the stolen goods; ensures solid evidence against the perpetrator; allows the establishment of the good/badwill buyers of the goods, because buying with ill-will is a legal base for the extension of the investigation upon other crimes or perpetrators. Thus, judicial practice has determined that he who receives, on a regular basis, in order to hide or sell goods provided by multiple thefts done by another person is an accomplice, and not a one who conceals stolen goods; the author continued to commit thefts because he knew he had moral and material support of the one who is helping him hide or sell the stolen goods. 10 gives the possibility of discovering and taking alongside stolen goods from that certain case other values or objects gained through previous crimes that have not yet been solved. Investigators must also assess the value of the stolen objects. It would, at first, be thought that this is not a task for the investigators, and that it would belong to the court of justice. This point of view does not correspond either to legal, nor practical necessities. Investigators have the duty to know in detail the way in which calculations regarding the value of the stolen goods are made, identifying the objects that cannot be reinstated, and obligating the criminal to civil repairs. 11 The evaluation of the damage to the patrimony is done according to the general principle of calculating such damages. Thus, if from the day the crime was done until the day the case is closed, the prices of the goods have been changed, the value ALEXANDRU IOAN CUZA POLICE ACADEMY that needs to be paid is established according to their price at the time the case has been judged. But, regarding the penal side of the case, calculating the value of the stolen goods is done according to the prices that existed on the date of the crime, because for the qualification of the crime, the value is taken into notice Perpetrators and the contribution of each one in the illicit act. This problem exists when referring to thefts done by groups of criminals that have committed several such crimes over a longer period of time. Firstly, the importance of establishing the perpetrators, their quality and their contribution to the crime is determined by the necessity to correctly qualify the crime, prior to administrating evidence and ensuring the punishment of those guilty, according to their quality and contribution. Thus, regarding the number of participants, thefts can be simple or qualified. This aggravation operates when the act has been done by two or more people together and it requires that certain actions are executed in common and simultaneously, actions which need every participant on the crime scene at the time of its accomplishment. If this is taken into notice, investigators can no more apply legal texts referring to thefts done by three or more people together. Also, thefts done by an adult and a minor, together, represents qualified theft (done by two people together) even if the minor doesn t eventually answer in front of the law. Furthermore, by doing the crime with a minor, the perpetrator suffers aggravating circumstances. 13 After clearing the problems related to the perpetrator, the quality and the contribution of each person to the crime, investigators must also establish if legal requirements for adding the crime of associating with purpose of illegal actions are met. It is also needed to establish if the perpetrators have acted in the same period, if there were any prior agreements between them, the purpose of the group and the role of each one. It is enough for the perpetrators to agree on scene for this crime to be put against them. 6. The existence of crime competition. Most times, theft is accompanied by other crimes as well (referring to road circulation laws, 10 Trib. Supr., Secţ. Pen., dec. nr. 569/ V. Bercheşan, C. Aioniţoaie, I.N. Dumitraşcu, C. Pletea, op. cit., pag ~ 101 ~ 12 Trib. Supr., Secţ. Pen., dec. nr. 40/ Trib. Supr., Secţ. Pen., dec. nr. 1628/1971.
102 weapons and munitions laws, toxic substances or produce, etc.), fact which leads to the appearance of a competition between theft and the other crimes. Thus, the action of a person who has taken from an economic unit a vehicle with the purpose of using it with no right and then, after driving it, taking some parts when abandoning it, represents two separate theft crimes done at different moments, and with separate purposes, and they are in real competition. There is also crime competition when, after stealing weapons and munitions from a warehouse, which the perpetrator kept for a longer period of time, broke the law regarding theft, and also the law regarding the weapons and munitions regime. Also, if perpetrators have torn several wires, cables, electronics, or stole from separate points of energy distribution industrial silver contacts, there exists a competition between the crime of theft and the crime of destruction 14, and between theft and the crime regarding the precious metals regime. On the other side, while stealing through forced entry, climbing, or use without any legal right of a real or fake key from an apartment, room, or any other such enclosed area, there is only one complex crime, of qualified theft, because forced entry is absorbed within the contents of the theft. A much more controversial problem, both in specialty literature, as well as in judicial practice, has been the case of thefts done on C.F.R. train wagons through breaking the sigils, and the questions asked were if there was a competition between theft and sigil destruction, or is it just a qualified form of theft through forced entry. Because the sigil is a symbol of the state s authority, which once applied on some object is not meant to close or bar it, but to conserve or identify it, to apply the form of qualified theft through forced entry is out of the question. Also, investigators must take into account when legal conditions apply the possibility of the perpetrators association with the purpose of committing crime Conditions and surroundings that have generated, loosened or favored crime doing and establishing preventive measures. The facilities offered by the process of political, social and economic change in Romania, alongside insufficiency and, sometimes, inefficiency of legitimate controls, have favored especially JOURNAL OF CRIMINAL INVESTIGATIONS organized crime oriented towards profit, which has a tendency to evolve to a global, explosive and organized problem, bullying public patrimony in its ensemble, structuring and multiplying itself tirelessly, materializing itself in penal deeds of great diversity and complexity, under the aspect of the number of participants, methods used, damage caused and the importance of economic agents and institutions targeted 16. After 1990, economic crime in its complexity, has practically engulfed all financial and economic spheres, starting from technical-material supplying in the economy and finishing with the process of privatization and financial-bank operations. Due to an accentuated state of indiscipline and disorder, an attitude in contempt of economic laws regarding the administration and protection of public patrimony, theft, abuse and negligence have taken place, which are benefic for criminals, most of the goods being sold outside Romanian borders through contraband. By forming contacts in the international criminal world and by crossing the border using false documents or through other places than those under customs control, a wide range of produce has been sold, from bare necessities to national cultural patrimony. Thus, alongside classic aspects, starting with the year 1990, crime, in general, in our country has causes and motivations tightly linked to the crisis period we are going through. The evolution of the criminal phenomenon regarding thefts represents, actually, the consequence of recession, of the crisis that Romanian society is going through, of the unstable economic situation, of unemployment and most of all, of inflation that determines an accentuated poverty, economic differences, and feeling of no safety and frustration. This state of things existing in Romanian society has its origins in more than one cause. A first cause in social abnormality determined by social crises of amplitude, crises that determine a downfall of laws and values that seem to be disgraced and unaccounted for by criminals. Thus, the respect towards law and the institutions that represent and enforce it has dropped considerably. Another cause that has led to the continuous growth of crime, and of thefts in special, is the state of shyness of law representatives, and of those in power to punish these outlaws. 17 Their lack of 14 Trib. Supr., Secţ. Pen., dec. nr. 56/ V. Bercheşan, C. Aioaniţoaie, I.N. Dumitraşcu, C. Pletea, op. cit., pag ~ 102 ~ 16 Gh. Nistoreanu, C. Păun, Criminologie, Ed. EUROPA NOVA, Bucureşti, 1996, pag Gh. Nistoreanu, C. Păun, op. cit., pag. 283.
103 reaction has allowed the creation of a false image on rights and obligations belonging to individuals, which in trouble with moral and legal laws have imagined that democracy allows anything and that they can get away with their antisocial acts. Still on the post-revolutionary ensemble, an economic cause is noticed, on the one hand, linked to those with an unjustified desire to get rich fast and through the least amount of work possible, and on the other hand, because of the sheer lack of living conditions and means needed. It is possible for this situation to continually further aggravate itself due to continuous deterioration of living conditions. A fashionable way of getting rich fast is involving in private activities belonging to managers from different levels that have started, direct or through intermediates, companies that have similar profit with similar units belonging to the state, that have state funding. After starting such firms, the managers literally steal heavy machinery, raw materials or finished goods which they profit on through their personal companies, usually leading to the bankruptcy of state companies. Knowing these favorable conditions and circumstances is required, above all, by choosing the most effective method of preventing crimes of this kind. 18 In this way, investigators can use, besides known preventive means (debates using mass-media, propositions for organizing certain trials with wider publics) and other methods: ALEXANDRU IOAN CUZA POLICE ACADEMY bolstering security; population anti-crime preparations; preventive training done to commercial society employees; operative actions of tracking and catching criminals; ensuring that the time at which the criminal is punished is as close as possible to the time at which the crime was committed. At the same time, a growth in the authority of institutions and units that have competence on applying and enforcing laws is imposed, but also on those tasked with dealing justice, of whose credibility has suffered greatly over the years. Also for reducing crimes of theft and qualified theft, it is fundamental that living conditions are to be improved, which would at least make a fraction of criminals not continue their criminal life, and not become recidivists, fact revealed by criminology. A very important factor is social reconversion after prison. In Romania, such a person is marginalized, its acceptance coming at very slow rate, if not impossible. In order to clarify all the problems research discovers, it is gravely imposed to know in detail all the laws, as well as aspects that result from specialty literature and positive practice of competent institutions. Only in such a way will complete evidence be administrated, with strong legal bases, when dealing with each and every distinct penal case. References: 1. Em. Stancu, Tratat de Criminalistica, Ediţia a-v-a Editura Universul Juridic Bucureşti, Gh. Nistoreanu, C. Păun, Criminologie, Ed. EUROPA NOVA, Bucureşti, Idem, dec. nr. 2528/1987 (extras). 4. Ion Poenaru, În prezent şi perspective în ştiinţa criminalistică, Ed. M.I., Bucureşti, L. Cârjan, Tratat de criminalistică, Ed. Pinguin Book, Bucureşti, Neculai Zamfirescu, Logica cercetării criminale, Ed. Printeuro, Ploieşti, Trib. Supr., Secţ. Pen., dec. nr. 1628/ Trib. Supr., Secţ. Pen., dec. nr. 2814/ Trib. Supr., Secţ. Pen., dec. nr. 40/ Trib. Supr., Secţ. Pen., dec. nr. 56/ Trib. Supr., Secţ. Pen., dec. nr. 569/ V. Bercheşan, C. Aioaniţoaie, I.N. Dumitraşcu, C. Pletea Tratat de metodică criminalistică, Ed. Carpaţi, Craiova, V. Dongoroz, S. Kahane, I. Oancea, I. Fodor, N.Iliescu, C-tin Bulai, R. Stănoiu, V. Roşca Explicaţii teoretice ale Codului penal român. Partea specială, vol. III, Ed. Academiei Române, Bucureşti, V. Paşca, Măsurile de siguranţă. Sancţiuni penale, teză de doctorat, V. Bercheşan, C. Aioniţoaie, I.N. Dumitraşcu, C. Pletea, op. cit., pag ~ 103 ~
104 JOURNAL OF CRIMINAL INVESTIGATIONS 104
105
106 JOURNAL OF CRIMINAL INVESTIGATIONS 106
107 ALEXANDRU IOAN CUZA POLICE ACADEMY ANALYSIS OF RISKS AND VULNERABILITIES IN DOCUMENT MANAGEMENT SYSTEMS Costel CIUCHI Ph.D Student University Politehnica of Bucharest Prof. Angelica BACIVAROV Ph.D University Politehnica of Bucharest Laura IANCU Ph.D Student University Politehnica of Bucharest Implementing a cooperative environment at organizational level with respect to the use of information and data from various sources (internal or external) needs to merge resources so as to improve the quality and efficiency of the activity, especially by reducing the time allocated to decision-making process impacting the improvement of the decisional act. In this context, a common requirement in the development of information systems is the security, but most often security mechanisms are implemented without taking into account important elements indispensable for system security. Through a wideranging study of vulnerabilities and the implementation of risk analysis powerful tools are developed with the aim to build up those mechanisms required for providing security in document management systems. Keywords: risk, vulnerability, management, security, threats. 1. Introduction The increasing number of electronic documents within an organization, coupled with the need for collaboration between different structures and the easy access, in real-time, at data and information due to the urgent need for mobility, involves the use of various technologies and security measures both at applications and services level, as well as at the level of the communication system of the organization. Integrating resources in different locations involves increased risks of intrusion and compromise of the system. These risks can be mitigated by developing capacities for survival and security of the information systems at organizational level 1. Security is based on related fields of study (e.g. fault tolerance, reliability, recovery, performance and testing), and focuses on maintaining the safety of critical services, even when systems are penetrated and compromised. The development of secure, high quality software architectures and tools for the unification of distributed data and information are basic requirements in the design and implementation of document management systems (DMS) at organizational level. DMS implementation allows 1 I.C. MIHAI, "Contribuţii la studiul survivabilităţii sistemelor informaţionale", Teză de doctorat, Ed. Sitech, 2012, ISBN: ~ 107 ~ for the development of a coherent and active environment in the process of collaboration with other entities; it also improves the internal workflows, as well as the analysis and planning processes. Security becomes a critical component of document management systems that must ensure organizations and users that their documents are unaltered and secure. Because of sensitive data and information specific to document management systems, security and safety are the defining characteristics that should be considered in the development and implementation of these systems. The need of new facilities such as organizing the release of documents, detailed statistics at both system and user level, integration of infrastructure management applications, support for encrypted login sessions, diversity of roles assigned to users in the application and control over documents constitute elements of security and contribute to the development and use of DMS on an ever larger scale. 2. Security strategy approach at organizational level Diversifying hardware and software infrastructure in organizations was a practical necessity, due to the strategic importance of new
108 applications and services used in various activities. Access to the Internet for all users, remote access, distributed databases, implementation of ERP (Enterprise Resource Planning) systems and CRM (Customer Relationship Management) imposed a rapidly evolving organizational information system. The implementation of new technologies and systems, mostly open source solutions, had a positive impact on the cost - benefit report; the major effect is not only financial, but also diminishes the execution timeframe assigned to a process. Most implementations have been carried out without taking into consideration the security management, especially information security management, leading to a superficial training of the organizations to cope with a possible cyber-attack from both inside and outside. Depending on the size and specificity of each organization, the development of a minimum framework to ensure security can be achieved by defining minimum security policies. Setting up security policies on security layers within the structure of an organization helps to shape a risk management specific for each level [1]. Assessing organization security on layers allows to structure problems, to associate and define responsibilities for all members of the organization and to appoint the persons in charge for each level they are going to be directly concerned in ensuring security. The implementation of a general security policy based on the 4 major structural layers of an organization (presented in Table 1) and the clear description of the security approaches is a comprehensive framework for setting up, managing, implementing and adopting security policies / strategies. Table 1. Addressing security strategies at organizational level Structural Assessment covered security level areas Decision making under uncertainty, Organization information system security strategy, risk management Security processes, introducing Processes processes security methods, (Workflow) development of actions to secure processes. Information Access control, user roles Network security, equipment Infrastructure security, standard TEMPEST certification of equipment or areas, intrusion detection systems. JOURNAL OF CRIMINAL INVESTIGATIONS Tiered approach requires separate risk management decision for every layer and transfers those risks with major impact to the top management. Thus, decision makers of the organization can track and remove a number of specific risks which are not addressed by proper policies, frequently conceived without considering the organization s structure on separate layers. Adopting organizational layers as a standard approach to security policy provides: to the organizational layer - a security strategy of the organization that can be an important strategic guide for common actions performed by specialist departments; otherwise, there is a need to take ad hoc decisions and without a coherent strategy. Most organizations rarely develop strategic policies; the written procedures / policies or even system documentation are most of the time lacking. to the workflow layer - security and reliability of workflows; a range of actions are taken to secure workflows. Increasingly more organizations are using various management tools to optimize core business. Despite the ad hoc method of addressing problems, most organizations define explicitly or implicitly their main business processes. to the information layer - a role-based access control, which is a division of tasks and provides improved prospects for the implementation of policies adopted at the organizational level, compared with existing standards for access control. As a fundamental concept of security, standing separation of tasks is based on the role reserved to the user, constraints being thereby imposed on the allocation of these roles to different users. This means that if a user is authorized as a member of a certain role, he cannot be a member of another role, and roles must not be simultaneously activated. to the infrastructure layer - infrastructure and users protection. At this level, security is usually properly addressed in most organizations. The explosion in recent years of software with destructive effects (viruses, worms and Trojan horses, etc.) has imposed to organizations the adoption of specific measures by installing software antivirus / anti-malware, firewalls and employing staffing specialists with basic understanding of security systems [2]. ~ 108 ~
109 Such an approach is useful especially in the adoption of solutions for improving decisionmaking capacity and standardization processes. Informatics solutions similar to this model are document management systems in electronic environment. Such cooperation systems directly participate in the activity of the organizations, shaping business processes and workflows in all areas, from administration to decision-making. 3. Organizational support for dms DMS is a software system (or a set of software applications) used to organize, track and store files in various formats and provides advanced features for storing, versioning, metadata, security, indexing and quick search of documents [3]. Stored files can be editable documents (created with specialized software suites), images obtained from paper scanning or any other text or binary files - source code, binaries files specific to different applications, executable files etc.). At the level of an organization, a document management system ensures: Traceability and versioning of documents; Centralized storage of all important electronic documents; Unitary backup for all documents; Modeling, control and monitoring of document flows; Electronic document archiving. The documents handling stored on physical format (paper, transparencies or similar support) in a DMS system is transferred to the electronic environment. Not only the physical aspects of the document throughout its life cycle (mechanical strength of the substrate, deterioration of the printed information) are taken into consideration, but the user s data is also processed along with the associated information, whenever necessary and in any desired format. Another reason for moving to digital storage and sharing electronic documents is the safe and effective protection of sensitive information from unauthorized users by using policies and security levels. More and more organizations implement DMS systems especially for increasing productivity and reducing costs. In many activity fields rules and regulations on the status of electronic documents were not introduced. However, countries like the U.S. and the United Kingdom have initiated a series of legislative proposals that organizations will be required to store digital documents, to the detriment of the traditional format on paper. For ALEXANDRU IOAN CUZA POLICE ACADEMY example, in the medical field, in some EU Member States, in addition to handling and archiving in traditional way (on paper), it is required to store digital copies of documents to subsequently manage a natural transition to a paperless environment. A DMS can be assimilated, at a conceptual level, to the management and record of the documents of an organization, by converting, storing and managing electronic documents from the moment of their conception / archiving or destruction. Implementing such a process requires applications and software tools that provide automatic management of document files and of those creating links between documents and the possibility of shared operation/ in conjunction with these documents, based on defined workflow and a default messaging system that allows the exchange of information/documents. Workflows are specific to document management systems and represent a great tool to track the operational processes associated with the activity of the organization, the main advantage being the possibility to verify at any time the status of a workflow, its current stage, the people who accessed the flow and its associated data. There are 3 types of workflows: manually operated flows - where the user decides which is the next stage in the development of flow; flows based on rules - rules are created as part of the ongoing flow that will automatically route the document; dynamic flows - defining a dynamic route, which allows you to change the document flow based on data filled in or on information from metadata. The entry-level of a document management system is represented by the documents circulating in an organization, shaped at the level of its own operation processes (plans, reports, papers, invoices, claims, opinions, contracts, rules, procedures, regulations, laws, records, project or work documentation etc.) or outside. They can be managed electronically in any format / file (.doc,.jpg,.rtf,.pdf,.xls,.txt, camera, web pages, ). The diversity of documents and formats within a DMS is extremely wide-ranging; particular attention should therefore be paid to ensuring security to these types of systems. The many possibilities and technologies for interfacing IT&C industry requires an adaptation of document management system to ensure all ~ 109 ~
110 elements involved in workflow to run a decision making process by means of all data and associated information. 4. Security in dms A document management system, like any system, requires traditional security measures such JOURNAL OF CRIMINAL INVESTIGATIONS as firewall protection, backup, virus protection, intrusion detection systems, uninterruptible power sources etc. These measures are taken into account at the design stage, but carry some features, given the threats and risks specific to the sensitive nature of the content. Three main security areas [4], [5] (Figure 1) are generally considering: Hardware Security - physical security; - accidental data loss. SECURITY Information security - computer systems security; - communications security. Administrative (Organizational) Security - staff security; - data security operation. Figure 1. Main security areas within an organization To provide basic criteria in the study of information security, a model of extended security concept is considered, that meets the following requirements [6]: confidentiality - protection from unauthorized interception (no one should be able to access information during the transmission of the document, the document being accessible only to the sender and recipient); integrity - protection from unauthorized changes during its transmission. Both technical reasons (e.g. connection interruption) and interference with an intruder are taken into account. authenticity - ensuring that the sender actually sent the document (making impossible for an intruder to send a message assuming a false identity, pretending to be a certain sender); non-repudiation - the ability to track the document, both at its issuance, as well as at its reception: non-repudiation of data origin (sender can prove that he sent the document) and receiving data (receiver can prove that he received the document). By applying these principles, the system respects an information security model generally accepted Types of attacks and threats In a DMS, data protection covers hardware and software in the network, buildings, equipment, operating procedures and users. In this context it is important to define the exact limits of risk analysis and to make a clear distinction between the two types of attacks: technical and non-technical. Technical attacks are using special software or technical knowledge to break into a computer system or a computer network. A malware program of Trojan type is an example of technical attack: when the victim downloads and executes such a program, this can act in various ways, such as: data deletion or inactivation of services, theft of information or taking control of the computer system by an attacker. Non-technical attacks are those in which an attacker uses various methods of tricking the victim in order to obtain sensitive information or perform operations that compromise the security of a network. These attacks are also called social engineering (e.g. phishing is a form of attack of this kind) Vulnerabilities If working in cooperation platforms based on Web technologies that allow simultaneous access to a system data in real time, additional security measures are needed. The major disadvantage of ~ 110 ~
111 Web-based architectures exposed on the Internet is the fact that they are the most accessible to attackers who are trying to find vulnerabilities in the database and the application. However, applications based on Web technologies are usually pretty well protected at server level by system administrators, compared to possible security threats to the client application, which is the weakest component in a system based on Web technology. For example, malware applications of Trojan type may collect information stored locally and transmit information or data identification of documents using local words processors. Introducing all information in the Web browser only can be an advantage, but software that scans and records the sequence of keys (keystroke loggers) can record IDs and passwords, and an attacker can then connect in a user s account, using the information captured. Information in log type files is useful for discovering authentications using unused accounts with administrative rights. Connection restrictions for sensitive accounts only to certain well-defined IP address or a specific time slot are additional security measures. Applying an optimal level of security must be correlated with the risk of interactions between electronic documents. Applying a security level too high for a low risk is a too difficult process, and most users will avoid this approach. A too complex security policy appears usually when other security areas located at lower layers are ignored. There are few cases where a single technology can efficiently and integrally provide an effective security of the system. The many features of a document management system provide some specific security requirements, such as: Authentication and authorization of users Authentication is the identification of the authorized user in the system and is usually done by using an ID and an associated password or through biometric systems, smartcard, etc. An important aspect in document management systems is the authentication mode: 1. the system has defined its own database of users; 2. a different authentication provider is used. The first mechanism is easy to implement and use, by registering the users in DMS own database, but it has its disadvantages from the user s perspective, which has to use more combinations of identification and passwords for the system he is ALEXANDRU IOAN CUZA POLICE ACADEMY using. An alternative would be the use of a software authentication provider, which may use a single sign-on mechanism (single sign-on interface for multiple systems) or integration with other identity management mechanisms already implemented in the organization, LDAP compatible (such as Microsoft Active Directory or IBM Directory Server). Authorization - once a user logs into the system, he receives rights to access information according to the level of authorization he has. Authorization is given using three methods based on the following criteria: roles: role-based authorization to implement a mechanism by which a user has one or more roles in the system (such as Editor), having associated different rights access to information. rules: using rule-based authorization, the user's access level is determined by the execution of a set of rules set by the administrator - for example, check of some conditions. content: content-based authorization is using access lists for each information or collection of information, as settled when introduced in the system. We often find a combination of access modes, such as combining roles and content: for a set of information discrete rights are granted to groups (roles) and users will be part of one or more groups. It is obvious that a document management system brings benefits to an organization, but often in the design of such a system the focus is on functionality and efficient archiving, ignoring that a new risk is also inserted: unauthorized access to information. Security of documents and interactions Organizations that have implemented document management systems attach great importance to the criteria according to which users decide to which extent the information in the system is considered safe. An important aspect is the provision of those mechanisms (authentication and authorization) through which users can access the unaltered content and have the possibility to check the integrity of the documents. Equally important, the insurance of the integrity of electronic documents guarantees that electronic transactions are reliable, accurate and can be audited. Privacy (Confidentiality of information) Many electronic processes involve transmission of documents containing personal or confidential information. If the protection of electronic ~ 111 ~
112 information is required by law, through the digital signature technology for most online activities, over the life of the document (from its creation to its archiving or destruction) confidentiality is implicitly ensured. There are two aspects of electronic documents affected by confidentiality [7]: 1. Access - when systems are used to hold, to present or to sign electronic documents, access must be restricted to authorized users. 2. Sending documents - during documents transmission, they should be encrypted to prevent leakage of personal or confidential information Vulnerability management Vulnerability is a weakness in IT system that can affect the system or the performed operations, especially when this weakness is exploited by a hostile person or as a result of the occurrence of a disaster event type. The risk can be quantified, in the context of computer systems, as the sum of threats (potential causes of an incident that can cause damage to a system or organization) [8], vulnerabilities and value of displayed information: Risk = Threats + Vulnerabilities + the value of the information The management of vulnerabilities involves conducting a regular process of identification, classification, remediation and mitigation of vulnerabilities [9]. The implementation of a vulnerability management process ensures a more secure framework in IT field, in accordance with existing regulations. Vulnerability management process includes the following steps [10]: policy definition is the first step and includes defining the desired states for device configurations, user identity and access to resources; establishing basic environment to identify vulnerabilities and policy compliance; organization on priority levels of activities to reduce external threats, ensure internal security and classify assets; organizational perimeter protection before removing the vulnerability by using network and workstations security tools; reducing vulnerabilities and eliminate the causes from their source; continuous maintenance and monitoring of the perimeter to sense deviations from established policies and identify new vulnerabilities. JOURNAL OF CRIMINAL INVESTIGATIONS Technology offered by providers of vulnerability management can be used to automate various aspects of vulnerability management in four main categories: 1. Vulnerability Assessment It helps to determine the conditions of vulnerability by means of a database of known vulnerabilities. In this category, many other aspects of the system are also identified, including open ports, services, protocols, applications and operating systems. This information provides the necessary data to measure security status. When a network or infrastructure vulnerability is discovered, decisions can be taken on how to eliminate the root cause, how to reduce the potential attack vectors and limit the impact of a security incident. 2. Security configuration management and policy compliance Configuration management and the management of the security policy compliance tools provide a hierarchical control type of the IT environment, in conjunction with defined security policies. An organization can define a state of standard environment type - the desired state for system configurations and rights access - or use a predefined set of best practices, templates set up of a security system (Microsoft Security Guide, SANS Institute Internet Security Center, National Institute of Standards and Technology - NIST), or defined by specialized organizations on compliance. 3. IT Security Risk Management The main objective of security risk management technologies is the IT security risk quantification and the organization of the support activities for remediation. These products combine data classification activities, integrated functions of security policies, current threats and third-party scan results to support aggregate risk analysis and vulnerability reduction. Risk management tools provide varying degrees of built-in security support for classifying assets and managing security configuration of security policies. Analysis produced by these tools quantify IT security risk for various areas critical for the activity of the organization. 4. Security information and event management The monitoring stage of vulnerability management process can be automated by ~ 112 ~
113 periodically performing management tools and security configuration technologies using SIEM technology. This technology provides real-time management of events and a historical analysis of security information from a variety of heterogeneous sources. SIEM technology is used to filter the information about the incident, to provide an analysis of the incident and determine how it can be handled (incident response). A few DMS specific vulnerabilities: Alterations of data, of attributes associated to database documents are activities that lead to identity theft or violation of data and customer information. Modification, replacement or removal of a document during a process is critical, and jeopardizes the process itself. If a user does not enter in the flow a document in classic format (paper), then the decision makers do not have access to complete information, their decision being taken in artificial conditions and uncertainty. Simultaneous use of classical format (paper) along with the electronic one involves implementing restrictive policies on handling paper documents that require an awareness of users in transferring and processing electronic documents. For strategic processes, it is recommended to define flows and processes that do not include the use of a hybrid combination of the 2 formats (traditional and electronic) Risk analysis in DMS Risk analysis involves the definition of the two terms risk and threat. A threat is an unwanted incident that may occur, and the risk is the product of the probability that a particular threat occurs and ALEXANDRU IOAN CUZA POLICE ACADEMY the expected losses [8]. Common threats to computer systems are viruses and malware programs, illegal penetration of networks, theft or unauthorized modification of information, illegal monitoring data traffic, blocking servers or workstations. To conduct a risk analysis involves a systematic and thorough planning, which is essential to liability issues, providing the type of control to be adopted and implemented, and involving all organizational levels directly concerned, meaning managers, users and administrators. There are several relevant aspects of a DMS in addition to security threats for digital communications in general. One of the most important issue is the effective protection of digital content. The value of digital content resides not only in its effective content, but also in its presentation. In addition to protecting the content, the security issues related to the design and evaluation of workflow must also be addressed [11]. Any project must include a risk assessment to cover the security risks, as well as other possible risk categories (e.g. budget or staff planning). There is an inter-correlation between security mechanisms, which are operating not individually, but as a whole. For example, a system cannot guarantee the confidentiality and integrity of data while not being aware of who is entitled to the right to read or edit. Authorization and non-repudiation depend on user identification. Confidentiality and integrity for a data Web transmission are implemented through cryptographic methods, for example by applying SSL protocols (Secure Socket Layer) or TLS (Transport Layer Security). Table 2. Potential threats specific to DMS Risk Unintended Intended Confidentiality Another user has accidental A user can access the access to protected documents documents of another user Integrity Software application marks the wrong versions of documents A manager or another user changes a document without having the right Availability System crashes while loading a file or during workflow A user destroy workflow by falsifying a document Non-repudiation User claims to have imported various documents in the system One or more parties deny to have classified certain documents or workflows ~ 113 ~
114 Encrypting data flow ensures that an unauthorized user cannot decrypt (cannot understand) the information transmitted. For data integrity, cryptography helps to recognize unauthorized modification of a sent message Risk analysis for DMS - features As regards the security of document management systems, the main issues are the prevention of unauthorized modifications of documents, as well as their confidentiality and nonrepudiation. User expectations regarding integrity and availability are higher when using a DMS comparing with other content management systems (CMS). Security has become a crucial asset for online systems. There are many processes and interactions between entities operating within a DMS (users generating content, usage for content approval or administrators managing). Workflow and classification process are specifically oriented towards reliability requirements [12] and security (for instance, the most important requirement to validate a document is to establish the identity of users, meaning their authentication). Applying digital signature provides authenticity, integrity and non-repudiation features in a DMS. Digital signature solution combines several technologies to automate tasks involving electronic documents and actions such as: creating documents, electronic signature, storage and transmission. Security measures are also applied at different levels for: Ensuring the integrity and protecting access to DMS content, to personal or confidential information that users may hold; User authentication asked for signing, receiving, accessing the contents of a DMS. 5. Security policy particularities Security is a critical component of software for document management, which should give users the assurance that their documents are always safe. Unlike standards (a set of requirements on specific topics or techniques) and procedures (describing a process of implementing a standard or part of a standard), a security policy consists of a set rules and practices that regulate how an organization uses, manages, protects and distributes its own sensitive information. The role of security policy is to inform all those who work in an organization on how to behave in relation to a particular topic (e.g. sensitive information), which is the attitude of the JOURNAL OF CRIMINAL INVESTIGATIONS management on the issue and which are the specific actions the organization must take according to the situations encountered. Some specific elements to be included in a specific security policy for DMS at different levels are: General security terms Versioning control - provides a current version and a historical background for each document; Usage logs - registering each user who accesses the system; Access logs - logged access for authorized users; Workflow and approval - implementation of an electronic signature to move through the process; Establishing short timeframes for the end of the terminal session and of the application. Infrastructure security Implementation of security subsystems using SSL 128 bit support for work session encryption when communicating with the server; Implementing security mechanisms to protect file storage repository. Controlling access to documents Restricting user access to a workflow, as well as to related documents (based primarily on membership / nonmembership quality in a group, with explicit permission to be part of a group); Limitation of search operations only to those documents users are authorized to have access at. User roles DMS allows recording and support for different user roles, granting customers flexibility in controlling access and changing documents. Limiting users and flows administrators roles at a standard method (reading, writing, publishing, executing) should be implemented without using other combinations and possibilities to customize roles, which must be reserved to administrators only. 6. Conclusions Applying a DMS system brings a noticeable improvement of the process of organizational flow efficiency. Document management systems enable ~ 114 ~
115 organizations to improve efficiency and productivity, optimizes the communication and collaboration between staff structures or employees, allow to automate processes across departments and brings important financial gains too. Ensuring an optimal level of security for document management systems can be achieved by studying specific DMS vulnerabilities and risks. In addition to identifying risks, the best way to address vulnerabilities must also be defined, with a focus on aspects of content protection, documents and user profiles. There is great ingenuity in the operation of security breaches and one cannot prevent that, for instance, a user discloses to a third party its ID user or password to connect to the system. In order to cover these security issues, the risk analysis must be all-inclusive, implementing additional measures, such as the use of digital signatures that can solve a ALEXANDRU IOAN CUZA POLICE ACADEMY number of technical and safety requirements in DMS. The advantages conferred by a security policy consist of flexibility, support and efficiency in assisting efforts to secure data and information. Risk analysis (which tells us where the organization stands in terms of IT security) and the study of vulnerabilities are processes to be continuously updated due to the dynamic internal and external environment of the organization. Combining these processes help decision makers understand the necessary security measures and changes to be implemented to ensure the security of an organization. Implementing security policies by studying vulnerabilities and risks are imperative requirements for document management system and safe use of electronic information. References: 1. NIS, National Information Systems Security (INFOSEC) Glossary, Federal Standard 1037C, NSTISSI No. 4009, June 5, SAGA - Standards and Architectures for egoverment - Applications - version 2.1, KBSt Unit at the Federal Government Co-ordination and Advisory Agency, Avizienis, Laprie, and Randell, Fundamental Concepts of Computer System Dependability, Workshop on Robot Dependability: Technological Challenge of Dependable Robots in Human Environments, Seoul, Korea, Foreman P.: Vulnerability Management, Taylor & Francis Group, 2010, ISBN wiki/index.php 6. ISO-17799:2005, ISO :2004, ISO Mihai I. C., Iancu L.: Survivability - the New Concept of Security, Journal of Criminal Investigations, vol. V, issue 1, 2012, pp , ISSN: Park J-Y., Rosslin John Robles, Chang-Hwa Hong, Sang-Soo Yeo, and Tai-hoon Kim: IT Security Strategies for SME s, International Journal of Software Engineering and Its Applications, vol. 2, no. 3, July, Schneier B.: Applied Cryptography, John Wiley & Sons, Weippl E., Ismail Khalil Ibrahim, Werner Winiwarter: Content-based Management of Document Access Control, The Proceedings of the 14th International Conference on Applications of Prolog, pp , INAP, Weippl E.: Security in E-Learning, Springer Science + Business Media Inc., Williams A. and Nicollet M.: Improve IT Security with Vulnerability Management, Gartner ID Number: G , May ~ 115 ~
116 JOURNAL OF CRIMINAL INVESTIGATIONS E-LEARNING SECURITY MANAGEMENT Assist. Ioan-Cosmin MIHAI Ph.D Police Faculty Alexandru Ioan Cuza Police Academy Many users access e-learning systems for teaching and learning purpose. E-Learning shares similar characteristics of many other services, like e-commerce, e-banking and e-government. Because Internet becomes a dangerous network due to the growing number of attacks, e-learning systems have to be protected. This paper presents e-learning standards and information security management in e-learning systems. Keywords: e-learning, security, Internet attacks. 1. Benefit of e-learning Systems E-Learning is the term used to describe the use of the web and other Internet technologies in terms of enhancing the teaching and learning experience. E-learning shares similar characteristics of many other services, like e-commerce, e-banking and e- government. E-learning users focus on how to benefit from e-learning concerning teaching and learning purposes. The term e-learning comprises a lot more than online learning, virtual learning, distributed learning, networked or web-based learning. As the letter e in e-learning stands for the word electronic, e-learning would incorporate all educational activities that are carried out by individuals or groups working online or offline, and synchronously or asynchronously via networked or standalone computers and other electronic devices One definitions for e-learning was provided by the American Society for Training and Development, which proposes that e-learning covers a wide set of applications and processes, such as web-based learning, virtual classrooms, and digitals collaboration. E-learning is the implementation of technology in order to support the learning process, whereby knowledge or information can be accessed using the Internet technology. The learning process can be continuous, provided that the content is available on the net. E-learning systems offer everyone the opportunity to become a learner. The concept of anytime, anywhere learning promotes life-long learning and accordingly eliminates the problems associated with distance. The flexibilities which e-learning offer to the students is the main motivating factor in choosing online courses. Moreover, the usage of technology in learning will provide various other advantages, such as improving the quality of learning, improving access to education and training, reducing the costs associated with education, and improving the cost-effectiveness of education. The growing interest in e-learning seems to be coming from several directions. These include organizations that have traditionally offered distance education programs either in a single, dual or mixed mode setting. They see the incorporation of online learning in their repertoire as a logical extension of their distance education activities. The corporate sector, on the other hand, is interested in e-learning as a way of rationalizing the costs of their in-house staff training activities. E-learning provides a platform of a welldesigned, learner-centered, engaging, interactive, affordable, efficient, accessible, flexible, and meaningfully distributed and facilitated e-learning environment. Moreover, people can save money and time spent on travelling and getting the right materials for their study. They can reduce printing costs by reading the available learning materials online. Furthermore, e-learning increases access to learning materials. It also enables students to have wider access to limited resources, such as e- journals and e-books. This can support the students in enhancing their learning. By eliminating barriers of time and distance, individuals can now take charge of their own life-long learning. 2. Types of e-learning Standards The components of this environment are typically supported by multiple products from a number of vendors and need not be constrained by enterprise boundaries. Even medium-size ~ 116 ~
117 ALEXANDRU IOAN CUZA POLICE ACADEMY enterprises may use different e-learning suppliers in different departments and extend their e- Learning environment to their supply chain. If all the points of interoperability among e-learning components are supported by interfaces that vary from vendor to vendor, then it is very difficult and costly to implement an integrated learning environment Metadata Content sits at the heart of e-learning. Learning content and catalog offerings must be labeled in a consistent way to support the indexing, storage, search, and retrieval of learning objects by multiple tools across multiple repositories. Data used for this purpose is referred to as Learning Object Metadata (LOM) Content Packaging Content packaging specifications and standards allow courses to be transported from one learning system to another. This is crucial since learning content can potentially be created by one tool, modified by another tool, stored in a repository maintained by one vendor, and used in a delivery environment produced by a different vendor. Content packages include both learning objects and information about how they are to be put together to form larger learning units. They can also specify the rules for delivering content to a learner Learner Profile In the educational market, a learner is typically referred to as a student, but this paper uses the more general term learner. Learner profile standards allow different system components to share information about learners across multiple system components. Learner profile information can include personal data, learning plans, learning history, accessibility requirements, certifications and degrees, assessments of knowledge (skills/ competencies), and the status of participation in current learning Learner Registration Learner registration information allows learning delivery and administration components to know what offerings should be made available to a learner, and provides information about learning participants to the delivery environment Content Communication When content is launched, there is the need to communicate learner data and previous activity information to the content. As a learner interacts with content, he generates some type of activity result, score or course grade. Course grades are often called completion status in the competencydriven corporate world. Sharing the launch, status of learning activities and results across multiple components of a learning environment requires standardization. The standards being developed in this area allow components to share results at as low a level as an individual assessment question, or all the way up to a course grade or completion status. This is accomplished by creating standardized communication protocols and data models that allow learning content to communicate with the system that delivered it. 3. Information Threats in Internet People nowadays are getting the benefits of accessing vast information quickly. Information may exist in many forms: it can be printed or written on paper, stored electronically and transmitted by post or by electronic means. Whatever form information takes or the means by which it is shared, it should always be appropriately protected. Information deriving from useful data is amongst an organization s main assets. Nevertheless, when it is always easy for everybody to access, it will therefore also be easy and useful for anybody to gain access, irrespective of whether they have good or bad intention. As a result of this increasing interconnectivity, information is now exposed to a growing number and a wider variety of threats and vulnerabilities. As such, information must be protected in order to avoid the loss of its confidentiality, integrity and availability. Some of the most serious threats are listed as below: Deliberate software attacks (viruses, worms, Denial of Service); Technical software failures and errors (bugs, coding problems); Acts of human error or failure (accidents, employee mistakes); Deliberate acts of espionage or trespass (unauthorized access and/or data collection); Deliberate acts of sabotage or vandalism (destruction of information or system); Technical hardware failures or errors (equipment failure); Deliberate acts of theft (illegal confiscation of equipment or information); Compromises to intellectual property (piracy, copyright, infringement); Quality of Service deviations from service providers (power and WAN service issues); Technological obsolescence (antiquated or outdated technologies); ~ 117 ~
118 Deliberate acts of information extortion (blackmail for information disclosure). The most important threats are the deliberate software attacks, like worms and Trojans horses. These attacks can be define using attack patterns. The practicality of attack trees in characterizing real-world systems attacks, depends on being able to reuse previously developed patterns of attack. An attack pattern is defined as a generic representation of a deliberate, malicious attack that commonly occurs in specific contexts. Each attack pattern contains: the overall goal of the attack specified by the pattern; a list of preconditions for its use; the steps for carrying out the attack; a list of post conditions that are true if the attack is successful. The preconditions include the assumptions that were made about the attacker or about the state of the enterprise, that are necessary for an attack to succeed. Examples of preconditions include the skills, resources, access and knowledge an attacker must possess, and also the level of risk that he/she must be willing to tolerate. The post conditions include knowledge gained by the attacker and the changes in enterprise s state, that result from successfully carrying out the attack steps, when the preconditions hold Trojan Attack Pattern A Trojan horse, or Trojan for short, is a term used to describe malware that appears to the user, to perform a desirable function but, in fact, facilitates unauthorized access to user's computer system. They require interaction with a hacker to fulfill their purpose. The hacker doesn t need to be the individual responsible for distributing the Trojan horse. It is possible for hackers to scan computers on a network, using a port scanner in the hope of finding one with a Trojan horse installed. The attack model for a Trojan Goal: Exploiting the vulnerabilities in front of some Trojans to execute destructive operations on virtual system Pre-conditions: The attackers control the firewall. The attack: AND 1. Compiling the Server application (a Trojan component) 2. Server installation on a virtual system 3. Server connection 4. Getting access to important data of FTP server JOURNAL OF CRIMINAL INVESTIGATIONS Post-conditions: The target system executes destructive operations Trojan Attack Pattern A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses always corrupt or devour files on a targeted computer. Many worms are only designed to spread and don't attempt to alter the systems they pass through. However, the network traffic and other unintended effects can often cause major disruption. The attack model for a Worm Goal: Exploiting the vulnerabilities in front of some Worms to execute destructive operations on virtual system Pre-conditions: The attacker can execute some programs on the target system The attack: AND 1. Identification of the infected executing program 2. Application execution in the virtual operating system 3. Open some ports for connection with the attacker 4. The connection between the attacker and the system 5. The control of the FTP server shared data. Post-conditions: The target system executes destructive operations. 4. E-Learning Systems Vulnerabilities E-learning systems weaknesses (failure to provide strong authentication) are problematic for the end user to whom they claimed. Prior to accessing an e-learning application may require the end user to authenticate themselves to identify the user or to determine the user's access privileges. Without such authentication employed, attackers could access to another user's account, view sensitive information or perform unauthorized functions. E-learning is mainly dependent on information as well as communication technologies. Security is needed within e-learning environments owing to the fact that, nowadays, knowledge has become an important means of production, as product and as a key for personal success. ~ 118 ~
119 In e-learning, information deriving from useful data is amongst the main assets of the organization. Among security issues in e-learning are protection against manipulation (students, insider), user authentication, and confidentiality. However, as the functionality of e-learning is expanding, information must be actively protected in this bigger context to avoid the loss of its confidentiality, integrity and availability. Some people might state that knowledge should be shared, but there are situations where the flow of sensitive information should be restricted to only a few well-defined groups, such as, for example, learning materials for certain groups and copyright protection of intellectual properties. Furthermore, it is difficult to verify whether or not an assignment has been completed and sent by a valid student. The identity and the secure content are difficult to maintain. E-learning shares similar characteristics of other e-services. There are three main characteristics: the service is accessible via the Internet, the service is consumed by a person via the Internet, and there might be a fee which the consumer pays the provider for using the e-services. The functionality and security threats to e-learning have common features with other e-services, and the management approaches could also have common characteristics. If organizations are to protect and maximize the return on their investment in learning technology, content and services, the systems they use must be interoperable, usable, manageable, and durable. Previous studies have shown that there are barriers to a more wide-spread adoption of online education. Ultimately, it is difficult to verify whether or not the assignment is completed and sent by a genuine student. The identity and the secure content are difficult to maintain. Furthermore, security issues in e-learning have been addressed mostly by security technology; for example a technical framework on ALEXANDRU IOAN CUZA POLICE ACADEMY authentication and accountability, access control, protect of communications, non-repudiation issues and learning resource provider server protection. 5. E-Learning Security Management E-Learning security represents the protection of information from a wide range of threats in order to ensure business continuity, to minimize business risk and to accordingly maximize return on investments and business opportunities. The goal is mainly concerned with detecting and preventing unauthorized acts of computer users. Information security from e-learning systems is achieved by a suitable set of controls known as Information Security Management (ISM). ISM includes policies, process, procedures, organizational structures and software and hardware functions, and needs to be implemented in order to ensure that it is sensibly managing the risks. Furthermore, such controls need to be established and implemented, monitored, reviewed and improved where necessary so as to ensure that the specific security and business objectives of the organization are met (BS ISO/IEC 17799:2005). Many information systems have not been designed to be secure. The security which can be achieved through technical means is limited and should be supported by appropriate management and procedures. Identifying which controls should be in place requires careful planning and attention to detail. There are 10 domains listed in the handbook of ISM, which are: access controls; communication system; risk management and business continuity planning; policy, standards and organization; computer architecture and system security; law, investigation and ethics; application program security; cryptography, operation security and physical security. All of these domains are very important, and each should be considered when ensuring the security of information. There are four basic security requirements to which e-learning requirements can be traced: Confidentiality: Users may obtain access only to those objects for which they have received authorization. They are not granted access to information they must not see. Integrity: The purpose of integrity is to ensure that information is still in its original form and that no tampering or alteration has taken place. In other words, only authorized parties may change the content of information and unauthorized modification must be prevented. ~ 119 ~
120 Availability: Availability is a requirement that is often neglected when thinking about security. However, productivity of users decreases dramatically if network-based applications are not available or too slow because of denial-of-service attacks. If, for example, a web-based e-learning system is slow, users do not only require more time to do their work, but they also become frustrated, increasing the negative effect on productivity. Non-Repudiation: Users are unable to deny having carried out operations. For instance, whenever grades of students are changed, it must be possible to reliably trace who has performed the modification. Security management is a discipline in making trade-offs continual activity: controls in the system versus controls in the environment, security control versus customer convenience and productivity, strong controls versus implementation and administrative cost, and so on. Once a computer system has been deployed, it then needs to be managed so as to ensure that it works correctly. ISM has some standards and guidelines to be followed when setting up and managing an effective ISM: for example, the British standard BS ISO/IEC 17799:2005 Information Security Management System (ISMS). The design and implementation of an organization s ISMs are influenced by business needs and objectives, resulting security requirements, the process employed and the size and structure of the organization. Information security is important to both public and private sector businesses, and when striving to protect critical infrastructures. In both sectors, security will function as an enabler to achieving e- Learning, for example, and also to avoid or reduce the relevant risks. Therefore, the management of information security is needed in order to maintain a competitive edge, adequate cash flow, profitability, legal compliance, and commercial image. At present, information security technology, hardware and software have been used in order to secure the e-learning environment. Having a control without proper planning concerning how to manage the control does not help in reducing the threats in e-learning. An analogy to this is: to keep a house or a room of valuable data, the door is locked, using the key and lock as the control mechanism. Only the authorized people are given the key to access to the house. Unfortunately, however, the process (the management) of delivering the key to the validated people is handled insufficiently, which can consequently lead JOURNAL OF CRIMINAL INVESTIGATIONS to the key ending up with malicious people. In a different situation, the key might also become lost or could be duplicated and then used by unauthorized people. Therefore, it is not only the solution or controls which matter but the management of security, which will determine the success of the security controls and solution implemented. In spite of considering the hardware and software solution, information security can be achieved by a suitable set of controls, known as Information Security Management (ISM). ISM includes policies, process, procedures, organizational structures, and software and hardware functions. ISM in e-learning can be stated as similar to other e-services; however, there are some different emphases based on the services being offered. E- Learning offers flexibility to the user as a learner, whilst simultaneously ensuring availability, integrity and confidentiality of information. The behaviors of users in e-learning are also different from the users in other e-services; therefore, ISM is specifically needed for e-learning. 6. Conclusions Internet is not secure source of transmitting information, especially for the online methods. As e-learning increases in popularity and reach, the need to understand security will also increase. The benefits it offers increase the number of e-learning users. The functionality of e-learning continues to expand and relies more and more heavily on the Internet. However, the Internet has become a place of illegal activities, which therefore expose e-learning to threats. Ensuring the availability and integrity of information and material within e-learning environments requires that countermeasures, such as security technology hardware and software, need to be implemented. Nevertheless, it is considered insufficient. Moreover, ISM is needed in order to ensure the security of the e-learning environment. ISM for e-learning is no different to other e-services; however, because of the flexibility factor offered by e-learning and different user behaviors, e-learning requires a security management framework which can act as a guide in helping the e-learning provider (institutions) in managing the information security within the e-learning environment. Furthermore, the combination of ISM and the current information security technology used will provide better results in the success of security implementation. ~ 120 ~
121 ALEXANDRU IOAN CUZA POLICE ACADEMY References: 1. A. Aziz, S. H., M.Yunus, A. S., A. Bakar, K. and B.Meseran, H. (2006.), Design and development of learning management system at universiti Putra Malaysia: a case study of e-sprint. I, WWW 06: Proceedings of the 15th international Conference on World Wide Web, May 23-26, 2006, Edinburgh, Scotland, ACM, New York, pp Allen, E. and Seaman, J. (2007), Online Nation Five Years of Growth in Online Learning, 1, Sloan Consortium, United States. 3. Conole, G., Smith, J. and White, S. (2007), A critique of the impact of policy and funding, in Conole, G. and Oliver, M. (eds.) Contemporary perspectives in E-learning Reserach themes, methods and impact on practice, Routledge, London; New York, pp Furnell, S. M. and Karweni, T. (2001), Securityissues in Online Distance Learning, VINE: The Journal of Information and Knowledge Management Systems, vol. 31, no Graf, F. (2002), Providing security for e-learning, Computers & Graphics, vol. 26, no. 2, pp Mason, R. and Rennie, F. (2006), E-learning: the key concepts, Routledge, Abingdon Great Britain. 7. Morrison, D. (2003), E-learning strategies, Wiley Chichester. 8. Norman, S. and Da Costa, M. (2003), Overview of e-learning Specifications and Standards, Open Learning Agency, and Eduspecs Technical Liaison Office. 9. Raitman, R., Ngo, L. and Augar, N. (2005), Security in the Online E-Learning Environment, Advanced Learning Technologies, 2005.ICALT 2005.Fifth IEEE International Conference on Advanced Learning Technologies, pp Saxena, R. (2004), Security and online content management: balancing access and security, Breaking boundaries: integration and interoperability, 12th Biennial VALA Conference and Exhibition Victorian Association for Library Automation. 11. Yong, J. (2007), Digital Identity Design and Privacy Preservation for e-learning, Proceeding of the th International Conference on Computer Supported 12. Zuev, V. (2012), E-Learning Security Models, Management Information Systems, Vol. 7 (2012), No. 2, pp ~ 121 ~
122 JOURNAL OF CRIMINAL INVESTIGATIONS CRISIS AND RISKS MANAGEMENT WITHIN THE MINISTRY OF INTERIOR Lect. Gheorghe POPESCU Ph.D Alexandru Ioan Cuza Police Academy Eugen NEAŢA Ph.D Vice-president National Police Corps This article presents the main problems concerning the strategic analisys of an organization taking into acccount the risk evaluation. Keywords: risk, analisys, threats, opportunities, strategy 1. Circumstantial risks State of emergency: in the multitude of attributions that the Ministry of Interior has, it represents a negative situation involving imminent danger that appears spontaneous and creates within the community that has been put under this state, fear, concern, together with a sense of jeopardy, in which case, almost every time people request help from the specialized forces of the Ministry of Interior (police, gendarmes, firefighters, etc.). Managers that have the task of ensuring the deployment of manpower necessary to prevent and diminish the consequences that fallow a state of emergency must show maximum professionalism when evaluating the operational situation, the hardware needed and the rigorous measuring of the intervention capabilities and last but not least, the training needed to ensure an efficient and detached intervention. Furthermore, in these kinds of situations it is imperative that they be handled by specialized personnel with adequate tools, this being the only way to limit the consequences that can appear. MAJOR FORCE represents a risk factor for the personnel and missions of the Ministry of Interior and is a result of the rapid growth in time and space of a situation that initially did not pose any treat. Also, in these kinds of situations the specialized personnel of the ministry have the task of participating in removing the consequences The risk factors that can emerge from a Major Force situation derive from the rapid evolution of the initial operational situation and the unpredictability of those who caused the rapid changes of the situation. In these kinds of situations, the ministry personel s intervention has to be carefully planned, executed with care and atentivness, in ordet to evoid artificialy amplyfing the situation. 2. The methodology of identifying these situations. One of the main attributions that the General Direction Of Intelligence and Internal Protection has is to take measures in order to prevent, combat and document fact that are a threat to the national security or other deeds that regard the missions, heritage and personnel of the Ministry of Interior, obtaining information that ensure the safety of state secrets and work secrets, establishing circumstances and causes that can affect the intervention capacity of units or can generate other risk factors As a method of avoiding and combating the consequences that risk factors can produce, the protection unit has the main mission of identifying from the intelligence point of view the causes that generate risk factors, and alongside the officers to act from the early stages to stop situations from escalating, thus achieving the main mission of this structure, prevention. 3. The role of inteligence. Intelligence consist of data, information that is new witch indicates the preparing or actual committing of crimes or other such deeds, the individuals that commit them or other facts or circumstances that are of interest for police. The protection unit has taken on a huge responsibility within the intelligence flow necessary between the heads of the Ministry of Interior and lower level managers, meaning that, based on the intelligence gathered, decisions are made in favor not of the personnel that are the ~ 122 ~
123 object of the presented intelligence, in order to prevent imminent perils that emerge from all sorts of risk factors or negative situations, and in order to avoid the negative development of damaging factors within a successful mission of the ministry or in order to avoid situations, facts that have bad consequences on the missions and interests of the MAI. On lower levels, valuable intelligence are of high importance because it gives mangers the opportunity to get a heads up of situations, phenomena, facts that, because of the multitude of problems that they involve, cant be controlled. Also, with the help of intelligence provided by the protection unit managers can take notice of underground activities, undergone by subordinates which ca affect the intervention capabilities or can damage the institutions image. The intelligence regarding the personnel s morale proved very useful to the heads of the Ministry of Interior, especially that regarding police and gendarmes, together with some lately social problems, which in some situations have degenerated in real-time street conflicts which needed swift intervention, and intelligence regarding a growth in complaints, because it gave the opportunity to take some adequate measures in order to reestablish peace and optimism within the personnel. In conclusion, we can point out, in general, that intelligence has a significant role in halting negative situations of all kinds, or quoting one of the FBI representatives, Robert Stiles, who at a symposium in Washington regarding intelligence, stated that any intelligence is useful (even if it rains the next day is important), the one that has intelligence is a powerful man and is out of danger. 4. Anticipatory capacity The entire process of identifying, monitoring and managing vulnerabilities and risk factors that appear in the field of activities undergone by the Ministry o Interior is in a relation that focuses on dependence and quality regarding the anticipatory capacity of the high command (commanders, managers, the beneficiaries of intelligence) on one side and the protection structures on the other. The capability and willingness to anticipate are key parts of constructive management which, in the case of keeping control of the operational situation, of controlling risk variables and foreseeing the evolution, gains a special significance. ALEXANDRU IOAN CUZA POLICE ACADEMY The essential role of anticipation derives from the goal of the intelligence process: using an adequate amount of anticipation generates effects with real significance regarding prevention and the lack of anticipation, together with maximum effort and the optimal using of resources can lead, at best, to ascertaining results, in managing a event or a situation, which lasts in time and space. The anticipation capacity affects in a large amount the response capacity of the institution an its structures, characteristic that is a real indicator of professionalism, especially keeping in mind present conditions, when changes in a situation and the dynamics of the operational situation are constant attributes of reality. The anticipatory spirit influences the capability to adapt to complex changes that occur, affecting the organizational and functional flexibility. The anticipatory capacity allows remodeling, structural and organizational optimizing as they go, having in mind continuity, without the need for interruptions or canceling measures, or disbanding key components, thus avoiding a defective evolution, or cyclic one. Keeping in mind the complexity of demands that the anticipatory capability involves it is easy to see that the presence of it depends on having some character and behavioral values, of which it is necessary to point out honesty, devotion towards the institution, education and professional value of managers and specialists within the intelligence protection structures. 5. The anticipatory capacity of managers. The anticipatory capacity or managers defines and points out the ability to shape the key elements of the institution s evolution towards the natural fulfilling,in the best way, of it s social and public duties, the capacity and clear vision to avoid obstacles that appear as a result of individual or group interests, egos, conjectural purposes and mentalities the majority of which are subjective, or event those that occur out of criminal interests. When managing, the anticipatory capacity is not instinctual, rather it depends o a series of factors, as fallows: a) the level of motivation and the subordination of private interests to toes of the institution. b) The ability to analyze, to organize and set objectives. c) The communication system, vertically and horizontally ~ 123 ~
124 d) The strength assume responsibility for the decision and the authority to enforce it. The way these factors manifest in determining the anticipatory capability of managers is, usually, direct, and with different intensities depending on the situation or current step undergone. A well motivated manager, who wants to achieve something that lasts and of quality, will foresee the his unit s evolution with maximum attention, and vitality. If the institutions interests are a priority, the anticipatory capacity will assure a positive evolution of the unit, while private interests will not have the strength to affect the evolution goals. In case that preconceived ideas or small interests are dominant, the anticipating effort will be misplaced, loosing track or intentionally neglecting,objective elements, of importance, which occur as a result of the evolution of the unit. Furthermore, when private interests are a priority, any signal with potentially intelligence value that is contradictory or affects these interests will be rejected, blocked, refused and misinterpreted. If the intelligence s message came from a risk factor, the factors sown above, will increase its potential and will generate surprising evolutions. Anticipation is a result of the analyzing and evaluating process. The more effort is put in analyzing the more fixed points of anticipation the evolution of a situation will have. An efficient manager will recognize the primary role of intelligence, encourages the use of it, and the intelligence process, will exploit to a maximum the elements within every carrier of an operational message. Behavior such as: its not my concern, I know its not so, its not important etc, generate consequences which damage the analyzing process, and lead to a growth in negligence when making decisions, and thus a growing risk of being surprised. The real communication system and not the formal one determines the level of anticipating capacity. The managers conduct in many units facilitates different shades of selective communication, depending on who communicates or what he communicates. JOURNAL OF CRIMINAL INVESTIGATIONS There are some situations when the manager is very receptive to the massages coming from a limited number of persons, considered as being close to him and sometimes, not keeping an open mind towards any massage, no matter the content, that comes from other persons, tagged as being uncomfortable,with different ideas or principles. Also there are some situations when managers set some subjective barriers, taking into consideration only certain types of messages or intelligence, usually those that are not contrary to his personal interests. In these kinds of situations, subordinates race to please the manager, adopting a two faced conduct, with negative ideas and proposals, emptied of any substance regarding to competence and responsibility. This kind of situation is very damaging when it is established between the intelligence s beneficiary and the protection unit responsible for the unit. This kind of perspective on such a relation is always compromising one, with all the disadvantages that affect credibility,valor and truth. Anticipatory capacity is also affected by the strength of the manager to assume responsibility. A good and constructive position one from the manager will stimulate the dynamics of the group and will keep it in a receptive and implicated mood towards current activities This aspect has special meaning when it refers to the relation between the manager and the intelligence protection unit. When based on intel at hand, the manager makes prompt decisions, the intelligence structure s commitment will be mixed. The unit will concentrate its efforts in the detailed documentation of the issues pointed out to them and towards knowing and identifying new aspects, assuring a high percentage of anticipatory value in the manager s decision s substance. In contrast situations, when the intelligence s beneficiary takes on a position of shilly-shally, avoiding involvement, when he emits or allows superficial checkup measures, with an inclination towards inefficient measures or even covering up some aspects, the efficiency and work rate of the intelligence protection unit are severely diminished. Such a situation, if allowed to persist a log time could destabilize the intelligence unit s potential, generating suspicion and mistrust between it and it s primary sources of intelligence. References: 1. Romania s Security Strategy 2. Romania s Public Order Strategy 3. The organizing and functioning rules of D.G.I.P.I 4. Popescu Ion Gheorghe, The management of protection activities within the Ministry of Interior, Publishing House Sitech, Craiova, ~ 124 ~
125
126 JOURNAL OF CRIMINAL INVESTIGATIONS ~ 126 ~
127 ALEXANDRU IOAN CUZA POLICE ACADEMY CONSTABULARY COOPERATION THROUGH NATIONAL INFORMATICS SYSTEM FOR ALERTS Lect. Ligia Teodora ILIESCU Ph.D Police Academy Al. I. Cuza Appearance Law no. 141/2010, published in Official Gazette no. 498 of 2010, referred to the establishment, organization and functioning of the NISA and Romania's participation in the Schengen Information System by providing the legal framework for the use by the Romanian Schengen Information System. The NISA, NISA is called the informatics system compatible with the second generation Schengen Information, which contains records of national and Schengen alerts entered by the competent national authorities. Keywords: Convention Schengen, cooperation, frontiers, national informatics system for alerts. In the early 80s, at a European level there have been some debates regarding the importance of free movement. As a result, after long deliberations, Belgium, France, Luxembourg, Netherlands and Federal Republic of Germany have agreed to initiate a common travel area, an area without internal frontiers. The agreement between these countries was signed on , in the town known as Schengen from Luxembourg. This agreement's purpose was the gradual abolition of border checks at the common borders. On the same five states signed a Convention implementing the Schengen Agreement. It was this Convention that created the Schengen Area through the complete abolition of border controls between Schengen states, common rules on visas, and police and judicial cooperation and the result was borderless area where people from different countries could move freely from one country to another. The first Schengen Convention member states were Belgium, France, Luxembourg, Netherlands and Federal Republic of Germany and later Italy, Spain, Greece, Austria, Portugal also became Schengen Convention member states. On Denmark, Sweden and Finland also subscribed at the Convention, whilst Iceland and Norway signed a cooperation treaty with the Schengen Convention member states. Each and every European Union member state is allowed to sign the Schengen Convention. Ratification by the former agreement signatory states is not required for altering or repealing some or all of the former Schengen-Acquis. Legal acts setting out the conditions for entry into the Schengen Area are now enacted by majority vote in the legislative bodies of the European Union. New EU member states do not sign the Schengen Agreement as such; instead, they are bound to implement the Schengen rules as part of the pre-existing body of EU law, which every new entrant is required to accept. On the other hand it is important to be said that it is necessary for a little time to pass between the subscription at the Convention and its absolute implementation. Moreover, there are some situations when the subscription at the Convention implies a transitional period meaning that The Convention is only partially implemented( total or partial border control maintenance and the implementation of some dispositions submitted by the Schengen Convention). The Schengen Convention stipulates that transfrontier police cooperation includes especially the following activities: mutual assistance regarding crime prevention and discovery; transfrontier surveillance; transfrontier pursuit; communicating pieces of information in particular cases regarding more or less serious crimes which bring harm to the public order and security in order to prevent them in the future; information exchanges for better external border control and surveillance; the middlemen assignment; two-sided agreement subscription between states in order to improve border police cooperation; the making and maintenance of a common computer system, Schengen Computer System. ~ 127 ~
128 The Schengen Convention establishes the mutual assistance principle between the different countries' police authorities in order to prevent and discover preparing or committed crimes. This principle can be implemented by subscribing to twosided agreements between neighbouring states. Transfrontier surveillance represents a sum of operative proceedings undertaken for discovering a person's illegal activity or the route that a good takes on more than one country's territory. These operative proceedings are made in case a person is suspected to be the author of a crime/offence and he/ she risks to be extradited. Foreigner agents of an entitled authority of another state can operate transfrontier surveillance on Romania's territory only if the Romanian entitled authority give their approval to the assistance request regarding transfrontier surveillance. This Request is sent to Romania before crossing the border to Romania. The Romanian entitled authority to approve the assistance request is the Prosecutor's Office near the High Court of Cassation and Justice. The response is given as fast as possible to the requesting state. Transfrontier pursuit represents a sum of operative proceedings carried on the territory of several states in order to pin down someone who was caught with the goods while committing a crime or took part in committing one or evaded while being on remand or while executing a prison sentence. Foreigner agents from the Schengen Convention member state entitled authority can operate transfrontier pursuit if Romanian authorities were beforehand informed about their future's presence on Romania's territory. Romanian entitled authorities that are to be informed about this fact are Romanian Police and Romanian Border Police. The transfrontier pursuit has to stop if the Romanian authorities require so. Schengen Computer System. The Schengen Convention stipulated the making and maintenance by the member states of a common computer system, Schengen Computer System. The purpose of this computer system is to maintain public order and security, including state security and the Schengen Convention application with respect to the people's movement on the territory of the Convention statemembers, using the information that this system puts at the authorities' disposal. The Schengen Computer System is a system that consists of data regarding persons and objects JOURNAL OF CRIMINAL INVESTIGATIONS (vehicles, guns, money, white papers or completed documents) used for investigative purposes. Due to this system, the communication of information with respect to people and objects is much easier. Schengen Computer System consists of: Central Schengen Computer System, which can be found in Strasbourg; National Computer Systems of the member states which are connected to the Central Computer System and which allow the national authorities to search in the Central Computer System; Entitled authorities are allowed to search when: they make controls at the external borders; during the controls made by the Police Authorities or Police Border Authorities on the national territory ; during the examination of the applications for visa and the residence permits. The Schengen Computer System consists of data exclusively known as Schengen data which are handed over by each and every member state and that are needed for the cases stipulated in the Convention, such as: The person looked for who is to be arrested in order to be extradited; foreigners known as unwanted( their entrance or staying on the national territory is prohibited) persons gone missing or persons, that for their own good, need temporary residence given by another country) witnesses, persons that are subpoenaed to go to the judicial authorities regarding a trial in which they were involved, or persons to whom authorities need to communicate a Court's decision or persons who are called in because they need to execute a prison sentence; persons or objects that are put on an inconspicuous surveillance so that public security is granted; objects that are looked for and that are to be confiscated or used as evidence in a trial. The Convention provides with concrete proceedings that are to be followed when introducing data regarding each and every one of the cases mentioned before. The Convention member state that is to introduce the information in the system verifies if the information. Information regarding persons: name, first name and nicknames used by that person and which were eventually registered separately; distinctive physical marks; ~ 128 ~
129 the first letter of the second first name; the date and place of birth; gender; citizenship; the mention if the person is armed; the mention if the person is violent; the reason why he/she is being taken into account; what should be done regarding the person. Regarding the goods that are looked for, the information that is given about the stolen, lost, concealed, or obtained due to a false identity goods, is the following: vehicles that have a cylinder capacity bigger that 50 cmc as well as their registration documents; trailers and their registration documents; firearms; blank official documents; identity documents of the persons as well as their registered goods. The access to the information registered in the Schengen Computer System as well as the right to search directly in the database is exclusively reserved to the authorities that are enabled to make border controls, and any other police controls within the country's territory on the one hand and on the other hand this right is reserved to the persons that coordinate these activities. What is more, the information regarding the foreigners known as unwanted can be accessed by the authorities that have attributions in releasing visas, in according temporary residence permits. The protection of the information that regards each person as well as the security of those pieces of information within the Schengen Computer System is a very important issue which is stated in the articles from 102 to 108, in the Convention. The most important performances of the system are: Central Schegen Computer System: daily update of a request in all databases of the National Schengen Computer System in less than 5 minutes; the capacity to create or to modify a new a registration in a second, average time for repairing: approximately one hour, permanent availability. National Schengen Computer System: permanent availability; responds to the requests made by the users in one second. The moment that Romania will subscribe to Convention implementing the Schengen Agreement, it will have to implement the national sections of ALEXANDRU IOAN CUZA POLICE ACADEMY the computer system as part of the Schengen Computer System. In order to make the fieldwork for the agents in the field much easier, each member state has a SIRENE Bureau. This Bureau acts as a intermediary point for any information transfer, besides the information transferred within the National and Central Computer System, information requested by any police officer in relation to the computer system. These pieces of information are changed through fax, and phone. This system allows the SIRENE Bureaus to change information, to ensure the correspondence between and system and national legislation, and to establish the real identity of the person that the police officers are interested in. Appearance Law no. 141/2010, published in Official Gazette no. 498 of 2010, referred to the establishment, organization and functioning of the NISA and Romania's participation in the Schengen Information System by providing the legal framework for the use by the Romanian Schengen Information System. The NISA, NISA is called the informatics system compatible with the second generation Schengen Information, which contains records of national and Schengen alerts entered by the competent national authorities. The Ministry of Administration and Interior, through SIS (Schengen Information System) National Center is responsible with NISA implementation, well functioning, upkeeping and security on the one hand and access ensurance to NISA for national competent authorities on the other hand. As per art.4 paragraph 2 from the notified law, The Technical Committee is brought into existence under the Ministry of Administration and Interior coordination whose attributions are to analyze and solve the technical problems which can appear and damage the performances of SINS and which is composed of high level professionals on behalf of national competent authorities which have access rights to NISA. The access rights to NISA for introduction, rectification and erasing are settled for Romanian public authorities that propagate specific information as foreseen at art. 6 from their own NISA database. The institutions from the judicial system will have the obligation to provide with specific pieces of information as foreseen at art. 6, only when the informatics system allow their automatic remittance. ~ 129 ~
130 The access right to SINS for consulting the data is established in the 1 st article for: a) Romanian public authorities that have the capacities in carrying out border controls according to the European Parliament Regulation (CE) no. 562/2006 and according to the Council Regulation from March 15 th 2006 establishing a Community Code regarding the crossing border treatment( Schengen Borders Code), made public in the European Union s Official Diary no. L. 105 from April 13 th 2006; b) Romanian public authorities that have capacities in carrying out police controls or visitations on Romania s territory or capacities in coordinating such controls; c) Romanian public authorities that have capacities in having the legislation regarding the foreigners treatment in Romania applied also by giving the visa applications a good going over and by granting the visa; d) Romanian public authorities that have capacities regarding the release of vehicle registration certificate for the alerts foreseen in the European Parliament Regulation (CE) no. 562/2006 and the Council Regulation from December 20 th 2006 regarding the access to the Schengen Informatics System from the second generation ( SIS II) of competent departments, within the member countries, for the release of vehicle registration certificate, ), made public in the European Union s Official Diary no. L. 105 from December28 th 2006; e) Prosecutor Department and Courts of Justice. The national competent authorities carry out transactions over the existent alerts in NSIS only for the purposes that they have been made, with the limits of their legal qualifications and they ensure the access to these only to the authorized staff taking into account their duty tasks. The information given by the existent alerts in N SIS cannot be used for administrative purposes. In SINS are made the following types of alerts: a) The persons who are subject to some extradition procedure or handing over according to an European arresting mandate; b) The missing persons; JOURNAL OF CRIMINAL INVESTIGATIONS c) The persons who are subject to some extradition procedure or handing over according to an European arresting mandate; d) The persons or goods with the purpose of inconspicuous check up; e) The goods that are being sought to be confiscated in order to be used as evidence during criminal proceedings; f) The foreigners who are to be banned from entering in Romania or who are to be who are subject to move away from the Romanian territory; The alerts within SINS regarding the persons will at the most consist of: a) Surname and first name, the pseudonyms registered separately; b) Particular physical signs, objective and permanent too; c) Date and place of birth; d) Sex; e) Photos f) Citizenship; g) Fingerprints h) The mention that the persons are armed, violent or fugitive; i) The signal-alert reason; j) The decision upon which the alert was made; k) The authority that made the alert; l) The measure that must be taken; m) The link with other alerts; n) The type of crime. The alerts regarding the persons cannot be registered in SINS without the information mentioned at letters a), d), l) and when necessary k). When it is available all the information is registered. The photos and the fingerprints are registered only after having checked that they fulfil the least quality standard according to the established characteristics stated in the Council Decision 2007/533 JAI for the alerts pointed out at art. 6 letter a) to e) and according to the purviews of the European Parliament Regulation (CE) no /2006 and the purviews of the Council Regulation from December 20 th 2006 regarding the introduction, functioning and using SIS from the second generation ( SIS II), published in the European Union Official Diary no. L. 381 from December 28 th 2006, for the alerts pointed out at art. 6 letter f) and they are used only for confirming the identity of a person as a result from a positive alert from SINS. ~ 130 ~
131 The alerts regarding the persons who make the subject of a handing over procedure according to an European arresting mandate are registered in NISA in accordance with the proceedings regarding the European arresting mandate, stipulated in the Law no. 302/2004 with references to international judicial cooperation in criminal matters with the later completions and amendments to which the following information has been registered: a) The European arresting mandate copy b) The translation of the European arresting mandate in one or more of the official languages spoken in the European Union countries, when this possible. The alerts regarding the persons who are to be expelled are registered in SINS for the following categories of persons: a) Missing persons who need to be located; b) Missing persons who after being located, need to be brought sanitary institutions or units. c) Under aged or persons put under an interdict who must be returned to their legal representatives after being located. The evidence given of the gone missing persons who only have to be located is registered in the NISA database by the national competent authorities only after the validity of the intimations has been confirmed. In this case the intimations can be made by any other citizen. The evidence given of the gone missing persons who after having been located need to be put into sanitary institutions or units is registered in the NISA database. In this case the intimations can be made by the sanitary institutions or units on the issued documents and these represent the legal basis for the unwillingly internment for the psychic disturbed persons or the legal basis for the binding internment in a medicaleducational institution for the ones suffering from a transmissible illness or due to an injunction in which the medical internment or the internment in a medical-educational institution is stipulated as a measure to be taken only after the validity of the intimations is confirmed. The evidence given of the under aged or of the persons put under an interdict who have to be returned to their legal representatives after being located is registered by the national competent authorities at the alert made by any other person, the registration being made only after confirming the validity of the intimations. The alerts that are made regarding persons, vehicles, vessels, airships, cabinets so that inconspicuous verifications should be made are ALEXANDRU IOAN CUZA POLICE ACADEMY registered in the NISA database by the national competent authorities at the criminal investigation organism petitions. The criminal investigation organisms can solicit the registration of one of the earlier mentioned evidence with the purpose of preventing and combating organized crime, in one of the following cases: a) When there is information which indicates that indicates that there is a person who has the intention to commit or he or she has committed one of the crimes for which it can be issued an European arresting mandate stipulated in the Law no. 302/2004, with the later completions and amendments; b) When after a person s general assessment there are enough clues which indicate that the person is susceptible of committing again one of the crimes for which it can be issued an European arresting mandate stipulated in the Law no. 302/2004, with the later completions and amendments; c) When there is information which indicates that the vehicle, vessel, airship or the cabinet is linked to the commission of the crime for which it can be issued an European arresting mandate stipulated in the Law no. 302/2004, with the later completions and amendments; The alerts regarding persons or vehicles, vessels, airships, cabinets with the purpose of carrying out inconspicuous verifications are registered in the NISA database by the national competent authorities at the solicitation of state organisms which have attributions in the national security field. The state organisms with attributions in the national security field can make a solicitation for alerts to be registered, from the earlier mentioned categories, in the following instances: a) When there is data or clues that the pieces of information are necessary to prevent a threat came from the endorsed person regarding the national security b) When the vehicle, vessel, airship or the cabinet is linked to the threat regarding the national security. If the competent authorities to undergo investigations at the borders of the state or any other kind of police investigations or during visitations they identify persons, vehicles, vessels, airships, cabinets about which there were registered alerts in the NISA database with the ~ 131 ~
132 purpose of carrying out inconspicuous verifications, they gather and devolve to the national competent authorities which registered the alert as many of the following pieces of information as possible: a) The fact that the person, vehicle, vessel, airship or the cabinet was located; b) Place, date or reason of the investigation; c) The route and destination of the trip; d) The persons accompanying the persons of operational interest who, due to a of sound mind account, are assumed to be associated with the persons of operational interest; e) The vehicle, vessel, airship or cabinet; f) The transported goods; g) The circumstances under which the person, vehicle, vessel, airship, cabinet was located. The procedure to be followed when gathering the earlier reminded information is the one also followed for the investigation during which the identity of the person, vehicle, vessel, aircraft, cabinet is established. During the investigations earlier mentioned the person of operational interest is not to be told that in the NISA database there is a request for inconspicuous investigations. The signs about the goods that are sought in order to be used as evidence during the criminal investigations are introduced in the NISA database by the national competent authorities at the request from the criminal investigation organisms or from the court law and they refer to: a) Vehicles that have a cylindrical capacity over 50 cm 3, vessels and aircrafts. b) Tows that weigh over 750 kg without having a cargo, caravans, industrial equipments, exterior engines and cabinets; c) Guns; JOURNAL OF CRIMINAL INVESTIGATIONS d) Official blank documents who had been stolen and were illegally used or lost; e) Released identity documents such as passports, identity cards, driving licence, documents that testify their staying and also their residence on Romania s territory, which were stolen, illegally obtained lost or cancelled travel; f) Registration certificates of the vehicles that had not been stolen but illegally used, lost or cancelled; g) Greenbacks; h) Securities, different ways of making the payments, such as checks, credit cards, bonds and actions which were stolen, illegally obtained, lost or cancelled. In case of identifying a good about which there is a piece of information from the ones previously reminded in the NISA database, the criminal investigation organism that made the registration is immediately announced. The alerts regarding foreigners are made by the national competent authorities and the effect of those alerts is banning those foreigners from entering or banning their staying on Romania s territory. These measures are taken according to the Government s Emergency Decree no. 194/2004 regarding the foreigners regime in Romania, republished with the later completions and amendments. The transactions within SINS regarding the strangers have the purpose to bann their entrance or their staying on Romania s territory. These measures are taken by the national competent authorities according to the European Parliament Regulation (CE) no /2006 and the Council Regulation. References: 1. Iliescu Ligia Teodora, Combating Organized Crime, vol. II, Sitech Edition, Craiova Law no. 141/2010, published in the Official Gazette no. 498/2010, regarding the founding, organizing and functioning National Informatics System for Alerts and Romania s participation to the Schengen Information System. ~ 132 ~
133
134 JOURNAL OF CRIMINAL INVESTIGATIONS ~ 134 ~
135 ALEXANDRU IOAN CUZA POLICE ACADEMY "( ) in the field of "intellectual property" today occur most rights violations, violations that harm not only the authors or assignees of rights but also industry and commerce in general and indirectly Member States economies. The causes of this situation are numerous, but as an investigator and mentor of investigators - not the causes of violations are examined in detail in the work that I propose (although neither the causes nor the effects of violations are ignored, but they are investigated and exposed only to the extent necessary for understanding the seriousness of the phenomenon), but the means and methods of investigation for cases of infringement of the rights of authors: acknowledging the facts, researching, and stressing the peculiarities. And what the author tells us is not only the result of years of study but also the result of personal experiences as investigator specialized in the field, which are successfully exploited in a book written with grace and talent and to be read with pleasure and with interest. Fraud Investigation is targeted against plagiarism, piracy and counterfeiting which are serious acts of infringement of the rights of authors and fighting the phenomenon is a priority. This requires trained people and the work of Mr. Marius Pantea is certainly a useful scientific approach to a sensitive area of concern not only for authors, but industrialists, merchants and Member States confronted with the need to ensure effective protection for the works". Prof. VIOREL ROŞ Ph.D "This paper is a successfull scientific approach in a sensitive field which represents a major priority at European level and which was materialized in a complete research that offers information for the B.A and master students and Ph.D candidates at the Alexandru Ioan Cuza Police Academy. The author with a teaching experience of more than 10 years and a practitioner for 15 years in the field of intellectual property rights, notices the current trends in the filed and sends a message in order to give the reader the possibility to learn how to prevent and combat all illegal acts in the field of intellectual property and industrial property". Prof. COSTICĂ VOICU Ph.D ~ 135 ~
136 JOURNAL OF CRIMINAL INVESTIGATIONS "Fraud Investigation" coursebook Volume II, written by Mr. Marius Pantea Ph.D, is addressed to future judicial police officers, and is a long-awaited work both by specialists of the national police and the students of the"alexandru Ioan Cuza" Police Academy. Crimes manifested in the field of insurance and reinsurance, tourism and services have destructive effects on the national economy, the impact affecting not only business entities but rather the interests of consumers. We appreciate that the way in which the methods of committing the crime in the field of insurance - reinsurance, services and tourism is valuable and authentic, thus increasing awareness in preventing and combating economic and financial crime". Lawyer prof. FLORIN SANDU Ph.D "The expertise of Mr. Marius Pantea Ph.D circumscribed to the sphere of irregularities in services, tourism, insurance and reinsurance has left its mark on a systematic and integrated approach to the issue at national and European level, the author managing to capture key issues in specific areas. In conclusion we can say unquestionably that the prestigious teaching activity harmoniously blended with vast professional police experience gives to "Fraud Investigation" Volume II a real value for teaching and practice which compels us to a "sine qua non " condition to give an excellent rating". Prof. IOAN DASCĂLU Ph.D ~ 136 ~
Natixis Asset Management Response to the European Commission Green Paper on shadow banking
European Commission DG MARKT Unit 02 Rue de Spa, 2 1049 Brussels Belgium [email protected] 14 th June 2012 Natixis Asset Management Response to the European Commission Green
APPENDIX 2. Provisions to be included in the contract between the Provider and the. Holder
Page 1 APPENDIX 2 Provisions to be included in the contract between the Provider and the Obligations and rights of the Applicant / Holder Holder 1. The Applicant or Licensee acknowledges that it has read
Credit Note and Debit Note Information (GST/ HST) Regulations
CANADA CONSOLIDATION CODIFICATION Credit Note and Debit Note Information (GST/ HST) Regulations Règlement sur les renseignements à inclure dans les notes de crédit et les notes de débit (TPS/ TVH) SOR/91-44
RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5
RULE 5 - SERVICE OF DOCUMENTS General Rules for Manner of Service Notices of Application and Other Documents 5.01 (1) A notice of application or other document may be served personally, or by an alternative
INDIVIDUALS AND LEGAL ENTITIES: If the dividends have not been paid yet, you may be eligible for the simplified procedure.
Recipient s name 5001-EN For use by the foreign tax authority CALCULATION OF WITHHOLDING TAX ON DIVIDENDS Attachment to Form 5000 12816*01 INDIVIDUALS AND LEGAL ENTITIES: If the dividends have not been
First Nations Assessment Inspection Regulations. Règlement sur l inspection aux fins d évaluation foncière des premières nations CONSOLIDATION
CANADA CONSOLIDATION CODIFICATION First Nations Assessment Inspection Regulations Règlement sur l inspection aux fins d évaluation foncière des premières nations SOR/2007-242 DORS/2007-242 Current to September
Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation
THE CONSUMER PROTECTION ACT (C.C.S.M. c. C200) Call Centres Telemarketing Sales Regulation LOI SUR LA PROTECTION DU CONSOMMATEUR (c. C200 de la C.P.L.M.) Règlement sur le télémarketing et les centres d'appel
Application Form/ Formulaire de demande
Application Form/ Formulaire de demande Ecosystem Approaches to Health: Summer Workshop and Field school Approches écosystémiques de la santé: Atelier intensif et stage d été Please submit your application
Name Use (Affiliates of Banks or Bank Holding Companies) Regulations
CANADA CONSOLIDATION CODIFICATION Name Use (Affiliates of Banks or Bank Holding Companies) Regulations Règlement sur l utilisation de la dénomination sociale (entités du même groupe qu une banque ou société
CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT
CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT La présente convention a pour objet de définir les conditions dans lesquelles le stagiaire ci-après nommé sera accueilli dans l entreprise. This contract
Support Orders and Support Provisions (Banks and Authorized Foreign Banks) Regulations
CANADA CONSOLIDATION CODIFICATION Support Orders and Support Provisions (Banks and Authorized Foreign Banks) Regulations Règlement sur les ordonnances alimentaires et les dispositions alimentaires (banques
Archived Content. Contenu archivé
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
Cheque Holding Policy Disclosure (Banks) Regulations. Règlement sur la communication de la politique de retenue de chèques (banques) CONSOLIDATION
CANADA CONSOLIDATION CODIFICATION Cheque Holding Policy Disclosure (Banks) Regulations Règlement sur la communication de la politique de retenue de chèques (banques) SOR/2002-39 DORS/2002-39 Current to
Input Tax Credit Information (GST/HST) Regulations
CANADA CONSOLIDATION CODIFICATION Input Tax Credit Information (GST/HST) Regulations Règlement sur les renseignements nécessaires à une demande de crédit de taxe sur les intrants (TPS/ TVH) SOR/91-45 DORS/91-45
ETABLISSEMENT D ENSEIGNEMENT OU ORGANISME DE FORMATION / UNIVERSITY OR COLLEGE:
8. Tripartite internship agreement La présente convention a pour objet de définir les conditions dans lesquelles le stagiaire ci-après nommé sera accueilli dans l entreprise. This contract defines the
BILL C-452 PROJET DE LOI C-452 C-452 C-452 HOUSE OF COMMONS OF CANADA CHAMBRE DES COMMUNES DU CANADA
C-452 C-452 First Session, Forty-first Parliament, Première session, quarante et unième législature, HOUSE OF COMMONS OF CANADA CHAMBRE DES COMMUNES DU CANADA BILL C-452 PROJET DE LOI C-452 An Act to amend
Paxton. ins-20605. Net2 desktop reader USB
Paxton ins-20605 Net2 desktop reader USB 1 3 2 4 1 2 Desktop Reader The desktop reader is designed to sit next to the PC. It is used for adding tokens to a Net2 system and also for identifying lost cards.
Instructions Mozilla Thunderbird Page 1
Instructions Mozilla Thunderbird Page 1 Instructions Mozilla Thunderbird Ce manuel est écrit pour les utilisateurs qui font déjà configurer un compte de courrier électronique dans Mozilla Thunderbird et
Nouveautés printemps 2013
» English Se désinscrire de la liste Nouveautés printemps 2013 19 mars 2013 Dans ce Flash Info, vous trouverez une description des nouveautés et mises à jour des produits La Capitale pour le printemps
Calculation of Interest Regulations. Règlement sur le calcul des intérêts CONSOLIDATION CODIFICATION. Current to August 4, 2015 À jour au 4 août 2015
CANADA CONSOLIDATION CODIFICATION Calculation of Interest Regulations Règlement sur le calcul des intérêts SOR/87-631 DORS/87-631 Current to August 4, 2015 À jour au 4 août 2015 Published by the Minister
Loi sur l aide financière à la Banque Commerciale du Canada. Canadian Commercial Bank Financial Assistance Act CODIFICATION CONSOLIDATION
CANADA CONSOLIDATION CODIFICATION Canadian Commercial Bank Financial Assistance Act Loi sur l aide financière à la Banque Commerciale du Canada S.C. 1985, c. 9 S.C. 1985, ch. 9 Current to September 10,
Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.
Rational ClearCase or ClearCase MultiSite Version 7.0.1 Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite. Product Overview IBM Rational
NOM ENTREPRISE. Document : Plan Qualité Spécifique du Projet / Project Specific Quality Plan
Document : Plan Qualité Spécifique du Projet Project Specific Quality Plan Référence Reference : QP-3130-Rev 01 Date Date : 12022008 Nombre de Pages Number of Pages : 6 Projet Project : JR 100 Rédacteur
Import Allocation Regulations. Règlement sur les autorisations d importation CONSOLIDATION CODIFICATION
CANADA CONSOLIDATION CODIFICATION Import Allocation Regulations Règlement sur les autorisations d importation SOR/95-36 DORS/95-36 Current to May 17, 2011 À jour au 1 er 17 mai 2011 Published by the Minister
Improving the breakdown of the Central Credit Register data by category of enterprises
Improving the breakdown of the Central Credit Register data by category of enterprises Workshop on Integrated management of micro-databases Deepening business intelligence within central banks statistical
Railway Operating Certificate Regulations. Règlement sur les certificats d exploitation de chemin de fer CODIFICATION CONSOLIDATION
CANADA CONSOLIDATION CODIFICATION Railway Operating Certificate Regulations Règlement sur les certificats d exploitation de chemin de fer SOR/2014-258 DORS/2014-258 Current to September 10, 2015 À jour
Quatre axes au service de la performance et des mutations Four lines serve the performance and changes
Le Centre d Innovation des Technologies sans Contact-EuraRFID (CITC EuraRFID) est un acteur clé en matière de l Internet des Objets et de l Intelligence Ambiante. C est un centre de ressources, d expérimentations
LOI SUR LE RÉGIME D ASSURANCE COLLECTIVE DE LA FONCTION PUBLIQUE PUBLIC SERVICE GROUP INSURANCE BENEFIT PLAN ACT
PUBLIC SERVICE GROUP INSURANCE BENEFIT PLAN ACT LOI SUR LE RÉGIME D ASSURANCE COLLECTIVE DE LA FONCTION PUBLIQUE Application of this Act 1(1) This Act applies to the following (a) persons employed by the
EN UNE PAGE PLAN STRATÉGIQUE
EN UNE PAGE PLAN STRATÉGIQUE PLAN STRATÉGIQUE EN UNE PAGE Nom de l entreprise Votre nom Date VALEUR PRINCIPALES/CROYANCES (Devrait/Devrait pas) RAISON (Pourquoi) OBJECTIFS (- AN) (Où) BUT ( AN) (Quoi)
Discours du Ministre Tassarajen Pillay Chedumbrum. Ministre des Technologies de l'information et de la Communication (TIC) Worshop on Dot.
Discours du Ministre Tassarajen Pillay Chedumbrum Ministre des Technologies de l'information et de la Communication (TIC) Worshop on Dot.Mu Date: Jeudi 12 Avril 2012 L heure: 9h15 Venue: Conference Room,
Tier 1 / Tier 2 relations: Are the roles changing?
Tier 1 / Tier 2 relations: Are the roles changing? Alexandre Loire A.L.F.A Project Manager July, 5th 2007 1. Changes to roles in customer/supplier relations a - Distribution Channels Activities End customer
Package Contents. System Requirements. Before You Begin
Package Contents DWA-125 Wireless 150 USB Adapter CD-ROM (contains software, drivers, and manual) Cradle If any of the above items are missing, please contact your reseller. System Requirements A computer
Critères à l attention des fabricants et des fournisseurs de biens ou de services : dispositifs mécaniques pour bingo
Alcohol and Gaming Commission des alcools Commission of Ontario et des jeux de l'ontario Gaming Registration & Lotteries Inscription pour les jeux et loteries 90 Sheppard Avenue East 90, avenue Sheppard
English Q&A #1 Braille Services Requirement PPTC 144918. Q1. Would you like our proposal to be shipped or do you prefer an electronic submission?
English Q&A #1 Braille Services Requirement PPTC 144918 Q1. Would you like our proposal to be shipped or do you prefer an electronic submission? A1. Passport Canada requests that bidders provide their
DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0
DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0 INDEX : DOCUMENTATION - FRANCAIS... 2 1. INSTALLATION... 2 2. CONFIGURATION... 2 3. LICENCE ET COPYRIGHT... 3 4. MISES
Form of Deeds Relating to Certain Successions of Cree and Naskapi Beneficiaries Regulations
CANADA CONSOLIDATION CODIFICATION Form of Deeds Relating to Certain Successions of Cree and Naskapi Beneficiaries Regulations Règlement sur la forme des actes relatifs à certaines successions de bénéficiaires
POLICY: FREE MILK PROGRAM CODE: CS-4
POLICY: FREE MILK PROGRAM CODE: CS-4 Origin: Authority: Reference(s): Community Services Department Cafeteria Services and Nutrition Education Division Resolution #86-02-26-15B.1 POLICY STATEMENT All elementary
APPENDIX 6 BONUS RING FORMAT
#4 EN FRANÇAIS CI-DESSOUS Preamble and Justification This motion is being presented to the membership as an alternative format for clubs to use to encourage increased entries, both in areas where the exhibitor
SERVEUR DÉDIÉ DOCUMENTATION
SERVEUR DÉDIÉ DOCUMENTATION Release 5.0.6.0 19 Juillet 2013 Copyright 2013 GIANTS Software GmbH, All Rights Reserved. 1/9 CHANGE LOG Correction de bug divers (5.0.6.0) Ajout d une option de relance automatique
INSTITUT MARITIME DE PREVENTION. For improvement in health and security at work. Created in 1992 Under the aegis of State and the ENIM
INSTITUT MARITIME DE PREVENTION For improvement in health and security at work Created in 1992 Under the aegis of State and the ENIM Maritime fishing Shellfish-farming Sea transport 2005 Le pilier social
Export Permit (Steel Monitoring) Regulations. Règlement sur les licences d exportation (surveillance de l acier) CONSOLIDATION CODIFICATION
CANADA CONSOLIDATION CODIFICATION Export Permit (Steel Monitoring) Regulations Règlement sur les licences d exportation (surveillance de l acier) SOR/87-321 DORS/87-321 Current to August 4, 2015 À jour
COUNCIL OF THE EUROPEAN UNION. Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53
COUNCIL OF THE EUROPEAN UNION Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53 WORKING DOCUMENT from : Presidency to : delegations No prev. doc.: 12621/08 PI 44 Subject : Revised draft
ONTARIO Court File Number. Form 17E: Trial Management Conference Brief. Date of trial management conference. Name of party filing this brief
ONTARIO Court File Number at (Name of court) Court office address Form 17E: Trial Management Conference Brief Name of party filing this brief Date of trial management conference Applicant(s) Full legal
Gestion des prestations Volontaire
Gestion des prestations Volontaire Qu estce que l Income Management (Gestion des prestations)? La gestion des prestations est un moyen de vous aider à gérer votre argent pour couvrir vos nécessités et
Contents Windows 8.1... 2
Workaround: Installation of IRIS Devices on Windows 8 Contents Windows 8.1... 2 English Français Windows 8... 13 English Français Windows 8.1 1. English Before installing an I.R.I.S. Device, we need to
COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 61303:1997
COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 61303:1997 COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 61303:1997 COPYRIGHT Danish Standards. NOT
NORME INTERNATIONALE INTERNATIONAL STANDARD. Dispositifs à semiconducteurs Dispositifs discrets. Semiconductor devices Discrete devices
NORME INTERNATIONALE INTERNATIONAL STANDARD CEI IEC 747-6-3 QC 750113 Première édition First edition 1993-11 Dispositifs à semiconducteurs Dispositifs discrets Partie 6: Thyristors Section trois Spécification
Disclosure on Account Opening by Telephone Request (Trust and Loan Companies) Regulations
CANADA CONSOLIDATION CODIFICATION Disclosure on Account Opening by Telephone Request (Trust and Loan Companies) Regulations Règlement sur la communication en cas de demande téléphonique d ouverture de
How to Login to Career Page
How to Login to Career Page BASF Canada July 2013 To view this instruction manual in French, please scroll down to page 16 1 Job Postings How to Login/Create your Profile/Sign Up for Job Posting Notifications
INVESTMENT REGULATIONS R-090-2001 In force October 1, 2001. RÈGLEMENT SUR LES INVESTISSEMENTS R-090-2001 En vigueur le 1 er octobre 2001
FINANCIAL ADMINISTRATION ACT INVESTMENT REGULATIONS R-090-2001 In force October 1, 2001 LOI SUR LA GESTION DES FINANCES PUBLIQUES RÈGLEMENT SUR LES INVESTISSEMENTS R-090-2001 En vigueur le 1 er octobre
Ships Elevator Regulations. Règlement sur les ascenseurs de navires CODIFICATION CONSOLIDATION. C.R.C., c. 1482 C.R.C., ch. 1482
CANADA CONSOLIDATION CODIFICATION Ships Elevator Regulations Règlement sur les ascenseurs de navires C.R.C., c. 1482 C.R.C., ch. 1482 Current to September 10, 2015 À jour au 10 septembre 2015 Last amended
Contrôle d'accès Access control. Notice technique / Technical Manual
p.1/18 Contrôle d'accès Access control INFX V2-AI Notice technique / Technical Manual p.2/18 Sommaire / Contents Remerciements... 3 Informations et recommandations... 4 Caractéristiques techniques... 5
Projet de réorganisation des activités de T-Systems France
Informations aux medias Saint-Denis, France, 13 Février 2013 Projet de réorganisation des activités de T-Systems France T-Systems France a présenté à ses instances représentatives du personnel un projet
RAPID 3.34 - Prenez le contrôle sur vos données
RAPID 3.34 - Prenez le contrôle sur vos données Parmi les fonctions les plus demandées par nos utilisateurs, la navigation au clavier et la possibilité de disposer de champs supplémentaires arrivent aux
Bill 12 Projet de loi 12
1ST SESSION, 41ST LEGISLATURE, ONTARIO 63 ELIZABETH II, 2014 1 re SESSION, 41 e LÉGISLATURE, ONTARIO 63 ELIZABETH II, 2014 Bill 12 Projet de loi 12 An Act to amend the Employment Standards Act, 2000 with
Bill 204 Projet de loi 204
3RD SESSION, 37TH LEGISLATURE, ONTARIO 51 ELIZABETH II, 2002 3 e SESSION, 37 e LÉGISLATURE, ONTARIO 51 ELIZABETH II, 2002 Bill 204 Projet de loi 204 An Act to amend the Ontario Energy Board Act, 1998 to
that the child(ren) was/were in need of protection under Part III of the Child and Family Services Act, and the court made an order on
ONTARIO Court File Number at (Name of court) Court office address Applicant(s) (In most cases, the applicant will be a children s aid society.) Full legal name & address for service street & number, municipality,
AUDIT COMMITTEE: TERMS OF REFERENCE
AUDIT COMMITTEE: TERMS OF REFERENCE PURPOSE The Audit Committee (the Committee), assists the Board of Trustees to fulfill its oversight responsibilities to the Crown, as shareholder, for the following
Le Cloud Computing est-il l ennemi de la Sécurité?
Le Cloud Computing est-il l ennemi de la Sécurité? Eric DOMAGE Program manager IDC WE Security products & Solutions Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Quelques
Règlement sur les baux visés à la Loi no 1 de 1977 portant affectation de crédits. Appropriation Act No. 1, 1977, Leasing Regulations CODIFICATION
CANADA CONSOLIDATION CODIFICATION Appropriation Act No. 1, 1977, Leasing Regulations Règlement sur les baux visés à la Loi no 1 de 1977 portant affectation de crédits C.R.C., c. 320 C.R.C., ch. 320 Current
PIB : Définition : mesure de l activité économique réalisée à l échelle d une nation sur une période donnée.
PIB : Définition : mesure de l activité économique réalisée à l échelle d une nation sur une période donnée. Il y a trois approches possibles du produit intérieur brut : Optique de la production Optique
IPSAS 32 «Service concession arrangements» (SCA) Marie-Pierre Cordier Baudouin Griton, IPSAS Board
IPSAS 32 «Service concession arrangements» (SCA) Marie-Pierre Cordier Baudouin Griton, IPSAS Board 1 L élaboration de la norme IPSAS 32 Objectif : traitement comptable des «service concession arrangements»
Editing and managing Systems engineering processes at Snecma
Editing and managing Systems engineering processes at Snecma Atego workshop 2014-04-03 Ce document et les informations qu il contient sont la propriété de Ils ne doivent pas être copiés ni communiqués
22/09/2014 sur la base de 55,03 euros par action
CORPORATE EVENT NOTICE: Amortissement d'orane Reprise de cotation PUBLICIS GROUPE S.A. PLACE: Paris AVIS N : PAR_20140902_06559_EUR DATE: 02/09/2014 MARCHE: EURONEXT PARIS Amortissement en titres et en
La création et la mise à jour de votre profil de fournisseur d Accenture
ACCENTURE FRANCE GUIDE DU FOURNISSEUR POUR LA FACTURATION A ACCENTURE (french) Cher fournisseur, Nous vous remercions de l intérêt que vous portez à Accenture. Afin de vous aider, vous trouverez dans ce
LOI SUR LE PROGRAMME DE TRAVAUX COMPENSATOIRES L.R.T.N.-O. 1988, ch. F-5. FINE OPTION ACT R.S.N.W.T. 1988,c.F-5
FINE OPTION ACT R.S.N.W.T. 1988,c.F-5 LOI SUR LE PROGRAMME DE TRAVAUX COMPENSATOIRES L.R.T.N.-O. 1988, ch. F-5 INCLUDING AMENDMENTS MADE BY S.N.W.T. 1997,c.3 S.N.W.T. 2003,c.31 In force April 1, 2004;
If the corporation is or intends to become a registered charity as defined in the Income Tax Act, a copy of these documents must be sent to:
2014-10-07 Corporations Canada 9th Floor, Jean Edmonds Towers South 365 Laurier Avenue West Ottawa, Ontario K1A 0C8 Corporations Canada 9e étage, Tour Jean-Edmonds sud 365 avenue Laurier ouest Ottawa (Ontario)
THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002
2-aes THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002 MOVED BY SECONDED BY THAT By-Law 19 [Handling
Interest Rate for Customs Purposes Regulations. Règlement sur le taux d intérêt aux fins des douanes CONSOLIDATION CODIFICATION
CANADA CONSOLIDATION CODIFICATION Interest Rate for Customs Purposes Regulations Règlement sur le taux d intérêt aux fins des douanes SOR/86-1121 DORS/86-1121 Current to August 4, 2015 À jour au 4 août
The new consumables catalogue from Medisoft is now updated. Please discover this full overview of all our consumables available to you.
General information 120426_CCD_EN_FR Dear Partner, The new consumables catalogue from Medisoft is now updated. Please discover this full overview of all our consumables available to you. To assist navigation
SMALL CITY COMMERCE (EL PEQUEÑO COMERCIO DE LAS PEQUEÑAS CIUDADES)
CIUDADES) ES/08/LLP-LdV/TOI/149019 1 Project Information Title: Project Number: SMALL CITY COMMERCE (EL PEQUEÑO COMERCIO DE LAS PEQUEÑAS CIUDADES) ES/08/LLP-LdV/TOI/149019 Year: 2008 Project Type: Status:
Practice Direction. Class Proceedings
Effective Date: 2010/07/01 Number: PD - 5 Title: Practice Direction Class Proceedings Summary: This Practice Direction describes the procedure for requesting the assignment of a judge in a proceeding under
OUVRIR UN COMPTE CLIENT PRIVÉ
OUVRIR UN COMPTE CLIENT PRIVÉ LISTE DE VERIFICATION Pour éviter tous retards dans le traitement de votre application pour l ouverture d un compte avec Oxford Markets ( OM, l Entreprise ) Veuillez suivre
de stabilisation financière
CHAPTER 108 CHAPITRE 108 Fiscal Stabilization Fund Act Loi sur le Fonds de stabilisation financière Table of Contents 1 Definitions eligible securities valeurs admissibles Fund Fonds Minister ministre
Borrowing (Property and Casualty Companies and Marine Companies) Regulations
CANADA CONSOLIDATION CODIFICATION Borrowing (Property and Casualty Companies and Marine Companies) Regulations Règlement sur les emprunts des sociétés d assurances multirisques et des sociétés d assurance
PROJET DE LOI. An Act to Amend the Employment Standards Act. Loi modifiant la Loi sur les normes d emploi
2nd Session, 57th Legislature New Brunswick 60-61 Elizabeth II, 2011-2012 2 e session, 57 e législature Nouveau-Brunswick 60-61 Elizabeth II, 2011-2012 BILL PROJET DE LOI 7 7 An Act to Amend the Employment
Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :
FOIRE AUX QUESTIONS COMMENT ADHÉRER? Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante : 275, boul des Braves Bureau 310 Terrebonne (Qc) J6W 3H6 La
BELAC 1-04 Rev 1-2015
BELAC 1-04 Rev 1-2015 PROCEDURE ET MODALITES D APPLICATION POUR L ACCREDITATION DES ORGANISMES D EVALUATION DE LA CONFORMITE OPERANT AU DEPART DE PLUSIEURS SITES (ORGANISMES MULTI-SITES) Les versions des
Acce s aux applications informatiques Supply Chain Fournisseurs
Acce s aux applications informatiques Supply Chain Fournisseurs Toujours plus de service pour vous ; rapide, pratique, sécurisé, écologique et gratuit! Vous vous connectez à notre site MESSIER BUGATTI
Resident Canadian (Insurance Companies) Regulations. Règlement sur les résidents canadiens (sociétés d assurances) CONSOLIDATION CODIFICATION
CANADA CONSOLIDATION CODIFICATION Resident Canadian (Insurance Companies) Regulations Règlement sur les résidents canadiens (sociétés d assurances) SOR/92-284 DORS/92-284 Current to August 4, 2015 À jour
IDENTITÉ DE L ÉTUDIANT / APPLICANT INFORMATION
vice Direction des Partenariats Internationaux Pôle Mobilités Prrogrramme de bourrses Intterrnattiionalles en Mastterr (MIEM) Intterrnattiionall Mastterr Schollarrshiip Prrogrramme Sorrbonne Parriis Ciitté
CALCUL DE LA CONTRIBUTION - FONDS VERT Budget 2008/2009
Société en commandite Gaz Métro CALCUL DE LA CONTRIBUTION - FONDS VERT Budget 2008/2009 Taux de la contribution au Fonds vert au 1 er janvier 2009 Description Volume Coûts Taux 10³m³ 000 $ /m³ (1) (2)
CEPF FINAL PROJECT COMPLETION REPORT
CEPF FINAL PROJECT COMPLETION REPORT I. BASIC DATA Organization Legal Name: Conservation International Madagascar Project Title (as stated in the grant agreement): Knowledge Management: Information & Monitoring.
Institut français des sciences et technologies des transports, de l aménagement
Institut français des sciences et technologies des transports, de l aménagement et des réseaux Session 3 Big Data and IT in Transport: Applications, Implications, Limitations Jacques Ehrlich/IFSTTAR h/ifsttar
Lesson Plan Physical Descriptions. belle vieille grande petite grosse laide mignonne jolie. beau vieux grand petit gros laid mignon
Lesson Plan Physical Descriptions Objective: Students will comprehend and describe the physical appearance of others. Vocabulary: Elle est Il est Elle/Il est Elle/Il a les cheveux belle vieille grande
Stratégie DataCenters Société Générale Enjeux, objectifs et rôle d un partenaire comme Data4
Stratégie DataCenters Société Générale Enjeux, objectifs et rôle d un partenaire comme Data4 Stéphane MARCHINI Responsable Global des services DataCenters Espace Grande Arche Paris La Défense SG figures
iqtool - Outil e-learning innovateur pour enseigner la Gestion de Qualité au niveau BAC+2
iqtool - Outil e-learning innovateur pour enseigner la Gestion de Qualité au niveau BAC+2 134712-LLP-2007-HU-LEONARDO-LMP 1 Information sur le projet iqtool - Outil e-learning innovateur pour enseigner
GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+
GIGABIT PCI DESKTOP ADAPTER Quick Installation Guide+ Guide d installation+ Check Your Package Contents Quick Installation Guide Gigabit Ethernet PCI Adapter CD with Manual and Drivers DO NOT insert the
MANAGEMENT SOFTWARE FOR STEEL CONSTRUCTION
Ficep Group Company MANAGEMENT SOFTWARE FOR STEEL CONSTRUCTION KEEP ADVANCING " Reach your expectations " ABOUT US For 25 years, Steel Projects has developed software for the steel fabrication industry.
Appointment or Deployment of Alternates Regulations. Règlement sur la nomination ou la mutation de remplaçants CONSOLIDATION CODIFICATION
CANADA CONSOLIDATION CODIFICATION Appointment or Deployment of Alternates Regulations Règlement sur la nomination ou la mutation de remplaçants SOR/2012-83 DORS/2012-83 Current to August 30, 2015 À jour
SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2015-2 APPLICATION FORM
SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2015-2 APPLICATION FORM APPLICATION FORM / FORMULAIRE DE CANDIDATURE Note: If there is insufficient space to answer a question, please attach additional
F1 Security Requirement Check List (SRCL)
F1 Security Requirement Check List (SRCL) Liste de vérification des exigences relatives à la sécurité (LVERS) Cyber Protection Supply Arrangement (CPSA) Arrangement en matière d approvisionnement en cyberprotection
Règlement relatif à l examen fait conformément à la Déclaration canadienne des droits. Canadian Bill of Rights Examination Regulations CODIFICATION
CANADA CONSOLIDATION CODIFICATION Canadian Bill of Rights Examination Regulations Règlement relatif à l examen fait conformément à la Déclaration canadienne des droits C.R.C., c. 394 C.R.C., ch. 394 Current
Comprendre l impact de l utilisation des réseaux sociaux en entreprise SYNTHESE DES RESULTATS : EUROPE ET FRANCE
Comprendre l impact de l utilisation des réseaux sociaux en entreprise SYNTHESE DES RESULTATS : EUROPE ET FRANCE 1 Objectifs de l étude Comprendre l impact des réseaux sociaux externes ( Facebook, LinkedIn,
Academic Project. B2- Web Development. Resit Project. Version 1.0 Last update: 24/05/2013 Use: Students Author: Samuel CUELLA
SUPINFO Academic Dept. Resit Project Academic Project B2- Web Development 2012-2013 Version 1.0 Last update: 24/05/2013 Use: Students Author: Samuel CUELLA Conditions d utilisations : SUPINFO International
Name of document. Audit Report on the CORTE Quality System: confirmation of the certification (October 2011) Prepared by.
AUDIT REPORT ON THE CORTE QUALITY SYSTEM: CONFIRMATION OF THE CERTIFICATION (OCTOBER 2011) Name of document Prepared by Audit Report on the CORTE Quality System: confirmation of the certification (October
Utiliser une WebCam. Micro-ordinateurs, informations, idées, trucs et astuces
Micro-ordinateurs, informations, idées, trucs et astuces Utiliser une WebCam Auteur : François CHAUSSON Date : 8 février 2008 Référence : utiliser une WebCam.doc Préambule Voici quelques informations utiles
Multiple issuers. La cotation des actions ROBECO ci-dessous est suspendue sur EURONEXT PARIS dans les conditions suivantes :
CORPORATE EVENT NOTICE: Suspension de cotation Multiple issuers PLACE: Paris AVIS N : PAR_20141002_07393_EUR DATE: 02/10/2014 MARCHE: EURONEXT PARIS La cotation des fonds mentionnés ci-dessous sera suspendue
BILL 203 PROJET DE LOI 203
Bill 203 Private Member's Bill Projet de loi 203 Projet de loi d'un député 4 th Session, 40 th Legislature, Manitoba, 63 Elizabeth II, 2014 4 e session, 40 e législature, Manitoba, 63 Elizabeth II, 2014
