<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Criminality</title><description>Blog about criminality that occurs in people or personal majority</description><managingEditor>noreply@blogger.com (more tips)</managingEditor><pubDate>Thu, 19 Dec 2024 10:30:53 +0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">9</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://thecriminality.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Blog about criminality that occurs in people or personal majority</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>The More Cyber Crime</title><link>http://thecriminality.blogspot.com/2011/02/more-cyber-crime.html</link><category>carder</category><category>carding</category><category>cracking</category><category>credit card</category><category>cyber crime</category><category>factors of criminality</category><category>hacker</category><category>hacking</category><author>noreply@blogger.com (more tips)</author><pubDate>Tue, 15 Feb 2011 06:06:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-2913176954545708246</guid><description>&lt;b&gt;Carding&lt;/b&gt;&lt;br /&gt;
Carding is shopping using credit card numbers and identities of others, which is obtained illegally, usually by stealing the data on the internet. The name the culprit was Carder. Another term for this type of crime is &lt;a href="http://thecriminality.blogspot.com/2011/02/cyber-crime.html"&gt;cyber froud&lt;/a&gt; alias fraud in cyberspace. Of course this is done by people who have high technology capabilities.&lt;br /&gt;
As many as 20 percent of transactions over the Internet from Indonesia is the result of carding.&lt;br /&gt;
&lt;br /&gt;
As a result, many online shopping sites that block the internet. According to the observing ICT Watch, who observed the world of internet agencies in Indonesia, the carder is now operating further away, to commit fraud through chat rooms on mIRC. The way the carder offering goods as if the results of his carding a low price on the channel.&lt;br /&gt;
&lt;br /&gt;
HACKING&lt;br /&gt;
Hacking is activity through a computer program owned by the person / the other party. Hackers are people who like open computer, have the expertise to make and read a particular program, and obsessed with watching the safety (security) it. Sometimes &lt;a href="http://thecriminality.blogspot.com/2011/02/hacker-and-cyber-crime.html"&gt;hackers&lt;/a&gt; provide news or news that the computer where you store the data can give way to others, then offer how to prevent it.&lt;br /&gt;
&lt;br /&gt;
CRACKING&lt;br /&gt;
Cracking is hacking for malicious purposes. Cracker is the term for a black hat hackers. Unlike the carder that only credit card peek, peek cracker deposits of customers at various banks or other sensitive data centers to benefit themselves.&lt;br /&gt;
Although both through other people's computer security, hackers focus more on the process. Meanwhile, cracker more focus to enjoy the results.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">16</thr:total></item><item><title>Cyber Crime Parth 2</title><link>http://thecriminality.blogspot.com/2011/02/cyber-crime-parth-2.html</link><category>cyber crime</category><category>factors of criminality</category><category>mental illness</category><category>the criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Sat, 12 Feb 2011 07:47:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-5368711717174160433</guid><description>&lt;div style="text-align: justify;"&gt;Cyber crime (cybercrime) more intense, along with the increase of Internet users, the average is taken as target novice Internet users, who used various kinds of modes in accordance with the expertise now want to do evil in cyberspace is. Like making a false document checks, credit card fraud, confidence fraud, identity fraud, pornography and other similar more crimes.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&amp;nbsp;Although cyber crime or cybercrime generally refers to criminal activity with a computer or computer network as its main element, the term is also used for traditional ciminal activity where computers or computer networks are used to facilitate or enable the crime occurred.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Examples of cyber crime where the computer as a tool is spamming and crimes against copyright and intellectual property. Examples of cyber crime where the computer as the target is illegal access (to fool access control), malware and DoS attacks. Examples of &lt;a href="http://thecriminality.blogspot.com/2011/02/cyber-crime.html"&gt;cyber crime&lt;/a&gt; as a place where the computer is identity fraud. While examples of traditional crimes with a computer as a tool is child pornography and online gambling.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Why increase?&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Cyber crime increases, because the Internet more easily accessible, while Internet users have no interest. Crime on the Internet are beginning to play play, but because making money then these crimes continue to be crimes committed by professional people whose hearts are sick. The perpetrators have never known sin and wrong to others, they act on their own volition and their own benefit.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;We must always be vigilant in dealing with cyber crime. Because there is no clear legal laws to prosecute them. Always be alert and pay attention to &lt;a href="http://thecriminality.blogspot.com/2010/11/factors-of-criminally.html"&gt;factors that lead to criminal&lt;/a&gt; acts such as this model&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cyber Crime</title><link>http://thecriminality.blogspot.com/2011/02/cyber-crime.html</link><category>cyber crime</category><category>factors of criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Sat, 12 Feb 2011 05:48:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-296388419525172241</guid><description>&lt;div style="text-align: justify;"&gt;Internet brings many benefits but on the other hand, the Internet also have negative impact on the wearer. therefore we get some conclusions that depend on the &lt;a href="http://thecriminality.blogspot.com/2011/02/mental-illness-facts.html"&gt;mental users illness&lt;/a&gt;, users that have a criminal mentality will make the Internet as a tool to do crimes or so-called cyber crime&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;According to Edmon Makarim (2001: 12) crime on the Internet or cybercrime essentially is a criminal offense relating to cyberspace, whether that attack public facilities in private ownership atupun cyberspace.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The types of crimes on the Internet are divided into various versions. One version states that these crimes are divided into two types, namely crimes with intellectual motive. Usually the first type does not cause any harm and done for personal satisfaction. The second type is a crime with political motives, economic, or potential criminal enimbulkan losses even information warfare.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Other versions cybercrime divide into three parts, namely an access violation, theft of data, and dissemination of information for criminal purposes.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Broadly speaking, there are several types of cybercrime, such as the proposed Philip Renata in Warta Ekonomi No. BisTek supplements. 24th edition, July 2000, h.52 namely:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;a. Joy computing, namely the use of other people's computers without permission. These include theft of computer operating time.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;b. Hacking, namely access illegally or without permission by means of a terminal.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;c. The Trojan Horse, the manipulation of data or programs by way of changing the data or instructions in a program, erase, add, make out of reach with goals for personal or private interest of others.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;d. Data leakage, that is concerning the leaking of data to the outside, especially with regard to data that must be kept secret. Disclosure of computer data that can be a form of state secrets, the company entrusted to one's data and data in certain situations.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;e. Diddling data, ie an act that changes the valid or invalid data in a way not valid, change the input data, or output data.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;f. To frustate data communication or a waste of computer data.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;g. Software piracy is software piracy of copyright-protected intellectual property rights.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Of the seven types of cybercrime such, it appears that cybercrime is the assault on the core content, computer systems and communication systems owned by others or the public in cyberspace (Edmon Makarim, 2001: 12).&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The general pattern that is used to attack computer networks are gaining access to user accounts and then use the victim's system as a platform to attack other sites. This can be completed within 45 seconds and automate will greatly reduce the time required (Purbo, and Wijahirto, 2000: 9).&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The phenomenon of cybercrime is to watch out because the crime is rather different from other crimes in general. Cybercrime can be done without knowing the territorial limits and not required direct interaction between actors with victims of crime. Can be ensured by the global nature of the Internet, all countries that perform Internet activities will almost certainly be affected by the development of cybercrime break even this.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;News Kompas Cyber Media (03/19/2002) writes that according to AC Nielsen survey of 2001 Indonesia was ranked the sixth largest in the world or the fourth in Asia dala crime on the internet. Although not mentioned in detail what sort of crimes that occurred in Indonesia and Indonesians involved in these crimes, this is a warning to all parties to be aware of crime that has been, is, and will emerge from users of information technology (Heru Sutadi, Kompas, 12 April 2002, 30).&lt;/div&gt;&lt;div style="text-align: justify;"&gt;According to RM Roy Suryo in Warta Ekonomi No. 9, March 5, 2001 h.12, cybercrime cases that frequently occur in Indonesia at least three types based on the mode, namely:&lt;/div&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;1. Theft No Credit.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;According Rommy Alkatiry (Deputy Head of Informatics KADIN), misuse of credit cards owned by other people on the internet is the largest cybercrime case relating to the world of internet business in Indonesia.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Abuse of other people's credit cards are not complicated and can be done physically or on-line. The names and credit cards of others obtained at various locations (restaurant, hotel, or any place of payment transactions by credit card) is included in the application of purchase of goods on the internet.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;2. Entering, Modifying, or damage Homepage (Hacking)&lt;/div&gt;&lt;div style="text-align: justify;"&gt;According to John. S. Tumiwa in general, Indonesia has not been as bad hackers action action abroad. Indonesian hacker behavior is merely go to a site other people's computers that were vulnerable to intrusion and notify the owner to be careful. Overseas hackers had accessed the system and destroying data base perbnkan bank&lt;/div&gt;&lt;div style="text-align: justify;"&gt;3. Attack sites or e-mail through a virus or spamming.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The most common mode is to send a virus through e-mail. According to Roy M. RM Suryo, such crimes abroad has been given a severe enough punishment. Unlike in Indonesia, which are difficult to overcome because existing regulations do not reach them.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Meanwhile, Yusuf As'ad detailing the cases of cybercrime that often occur in Indonesia into five, namely:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;a. credit card numbers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;b. Takeover website belongs to someone else.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;c. Theft of Internet access that is often experienced by ISPs.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;d. Crime domain name.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;e. Cause interference with business competition for rival sites.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Special cybercrime in e-commerce, by Edmon Makarim is defined as any action that inhibits and on behalf of others in the trade over the internet. Edmon Makarim predicted that the new mode such as buy-sell consumer data and presenting false information in starting a business site frequently occur in e-commerce.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;According to Mas Wigrantoro in BisTek No. 10, July 24, 2000, p. 52 outline there are five topics of cyberlaw in each country, namely:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;a. Information security, concerning the problem of authenticity and integrity of the sender or receiver of messages flowing through the Internet. In this set of confidentiality issues and the validity of electronic signatures.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;b. On-line transactions, including bidding, buying and selling, payment until the shipment of goods via the internet.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;c. Right in electronic information, a matter of copyright and the rights that arise for users and content providers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;d. Information content regulation, the extent of legal instruments which regulate content streamed over the Internet.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;e. Regulation on-line contact, good karma in communicating and doing business via the Internet, including taxation, export-import restriction, crime and legal jurisdiction.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Currently in Indonesia has already made script cyberlaw bill prepared by the Faculty of Law University of Indonesia in cooperation with the Ministry of Trade and Law Faculty of Padjadjaran University, Bandung in cooperation with the Ministry of Post and Telecommunications. Until now, Cyberlaw draft law has not been passed as legal cases relating to crime on the Internet continue to emerge from the credit card piracy, banking fraud, illegal access to information systems, the destruction of the web site until the theft of data.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Currently, regulation is used as the legal basis for the cases of cybercrime is the Telecommunications Law and the Criminal Penal Code (Penal Code). However, the interpretation is done on the articles of the Criminal Code in cases of cybercrime are sometimes less inclined to apply. Hence the urgency of ratification of the Bill should Cyberlaw priority to the era of cyberspace with all the consequences that accompany it, including the recent rise of cybercrime.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Hacker and Cyber Crime</title><link>http://thecriminality.blogspot.com/2011/02/hacker-and-cyber-crime.html</link><category>cyber crime</category><category>factors of criminality</category><category>hacker</category><category>mental illness</category><category>the criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Tue, 8 Feb 2011 05:52:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-2636406292155807893</guid><description>&lt;div style="text-align: justify;"&gt;Criminal way pursued by the netter growt wide open with the existence of hackers who perform a variety of &lt;a href="http://thecriminality.blogspot.com/2011/02/cyber-crime.html"&gt;cyber crime&lt;/a&gt;, the crimes of burglary credit cards, spam, viruses, Internet and data destroyer. crime hackers are usually confronted with much how to update the browser, but it is nonetheless there are still gaps. The Internet is a vast sea of the contents of which various sorts, kinds crime level range, its benefits as well as various kinds as well.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Our data that we save should really clean from hands of hackers by providing key data for not meeting the collapse by the criminals. We all know many ways to keep data safe. And should we know also that we can not be separated from the name Internet. Away from the internet is part of a desperate, do not we stay away from the internet but we use as a means to explore and share information to other users&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The cyber crime should continue to be monitored so as not to penetrate the business that we run on this day. Hackers steal contributed greatly in the news a secret by the owner, the main goal of hackers is to obtain data with withheld or can steal something that has value for money.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Global era is the era of information, information has a value price that is very expensive, as well as those who make information should be made accountable towards justice information. Although sometimes the truth is still highly subjective information from the manufacturer's own information please read &lt;a href="http://thecriminality.blogspot.com/2011/02/mental-illness-facts.html"&gt;mental illness&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Mental Illness Facts</title><link>http://thecriminality.blogspot.com/2011/02/mental-illness-facts.html</link><category>cyber crime</category><category>factors of criminality</category><category>mental</category><category>mental illness</category><author>noreply@blogger.com (more tips)</author><pubDate>Tue, 8 Feb 2011 04:31:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-390146754308970242</guid><description>&lt;div style="text-align: justify;"&gt;Mental illnesses are medical conditions that disrupt a person's thinking, feeling, mood, ability to relate to others and daily functioning. Just as diabetes is a disorder of the pancreas, mental illnesses are medical conditions that often result in a diminished capacity for coping with the ordinary demands of life.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Serious mental illnesses include major depression, schizophrenia, bipolar disorder, obsessive compulsive disorder (OCD), panic disorder, post traumatic stress disorder (PTSD) and borderline personality disorder. The good news about &lt;a href="http://thecriminality.blogspot.com/2010/11/factors-of-criminally.html"&gt;mental illness&lt;/a&gt; is that recovery is possible.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Mental illnesses can affect persons of any age, race, religion, or income. Mental illnesses are not the result of personal weakness, lack of character or poor upbringing. Mental illnesses are treatable. Most people diagnosed with a serious mental illness can experience relief from their symptoms by actively participating in an individual treatment plan.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;In addition to medication treatment, psychosocial treatment such as cognitive behavioral therapy, interpersonal therapy, peer support groups and other community services can also be components of a treatment plan and that assist with recovery. The availability of transportation, diet, exercise, sleep, friends and meaningful paid or volunteer activities contribute to overall health and wellness, including mental illness recovery.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Here are some important facts about mental illness and recovery:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Mental illnesses are serious medical illnesses. They cannot be overcome through "will power" and are not related to a person's "character" or intelligence. Mental illness falls along a continuum of severity. Even though mental illness is widespread in the population, the main burden of illness is concentrated in a much smaller proportion-about 6 percent, or 1 in 17 Americans-who live with a serious mental illness. The National Institute of Mental Health reports that One in four adults-approximately 57.7 million Americans-experience a mental health disorder in a given year&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The U.S. Surgeon General reports that 10 percent of children and adolescents in the United States suffer from serious emotional and mental disorders that cause significant functional impairment in their day-to-day lives at home, in school and with peers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The World Health Organization has reported that four of the 10 leading causes of disability in the US and other developed countries are mental disorders. By 2020, Major Depressive illness will be the leading cause of disability in the world for women and children.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Mental illness usually strike individuals in the prime of their lives, often during adolescence and young adulthood. All ages are susceptible, but the young and the old are especially vulnerable.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Without treatment the consequences of mental illness for the individual and society are staggering: unnecessary disability, unemployment, substance abuse, homelessness, inappropriate incarceration, suicide and wasted lives; The economic cost of untreated mental illness is more than 100 billion dollars each year in the United States.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The best treatments for serious mental illnesses today are highly effective; between 70 and 90 percent of individuals have significant reduction of symptoms and improved quality of life with a combination of pharmacological and psychosocial treatments and supports.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;With appropriate effective medication and a wide range of services tailored to their needs, most people who live with serious mental illnesses can significantly reduce the impact of their illness and find a satisfying measure of achievement and independence. A key concept is to develop expertise in developing strategies to manage the illness process.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Early identification and treatment is of vital importance; By ensuring access to the treatment and recovery supports that are proven effective, recovery is accelerated and the further harm related to the course of illness is minimized.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Stigma erodes confidence that mental disorders are real, treatable health conditions. We have allowed stigma and a now unwarranted sense of hopelessness to erect attitudinal, structural and financial barriers to effective treatment and recovery. It is time to take these barriers down. original from (http://www.nami.org)&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Factors of criminally</title><link>http://thecriminality.blogspot.com/2010/11/factors-of-criminally.html</link><category>factors of criminality</category><category>the criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Wed, 24 Nov 2010 21:45:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-5024684075818887873</guid><description>&lt;div style="text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI1TpIhQ1OH3SdW6iQjEVIYlZcMjmkWBS2a9Gxqq_VBQFp8K3n9eqhdJwFtwNAWOJbQQuDS1yRX9QW8C3uF_gaY0Vg4HuGllIMUJnq78qu_pmZPLPvNN3rwa0thE1ERzuAH_5_CMOaUkY/s1600/anak+mencuri.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI1TpIhQ1OH3SdW6iQjEVIYlZcMjmkWBS2a9Gxqq_VBQFp8K3n9eqhdJwFtwNAWOJbQQuDS1yRX9QW8C3uF_gaY0Vg4HuGllIMUJnq78qu_pmZPLPvNN3rwa0thE1ERzuAH_5_CMOaUkY/s320/anak+mencuri.jpg" width="320" /&gt;&lt;/a&gt;In sains of sociology, criminal caused with more factors has occurrence of crime, there is which from internal self of and factor external self also either environmental or social problems that support it.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;If viewed from the perpetrator review from the side of his deeds, crime is divided into two factors, sometimes done in the light of the open form of the crime, and crime committed by illegal means such as murder and other crime.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The internal causes of which are caused by the lack of someone to control itself against acts that breach, it is caused due to low education and low belief in god.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;While external factors are the main drivers of the growing crime in the world today;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;1. Because of the influence of social circumstances that trigger error. Because the circumstances that triggered the conflict so that a person becomes aroused and easily offended. Usually this condition preceded the existence of class sentiment, related to ethnicity, race or religion&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;2. Because of the influence of chance, sometimes crime occurs not from a person motivated by personal desire but due to the opportunity of crime itself. Someone who has no desire to do evil but because there is a chance that crime instincts emerge, it is recognized as a natural thing of the human psyche.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;3. Criminals former (recidivist) a person who never committed evil and opportunities as well as a strong influence can cause these criminals to recur and do it again. Given the punishment given was measured according to his ability&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;4. Criminality as a professional, there is evil crime that it was done by some professional people, example &lt;a href="http://thecriminality.blogspot.com/2009/11/criminal-overwrite-pilgrims.html"&gt;crime for overwrite pilgrim&lt;/a&gt; are like cyber crime, bank burglary over the Internet, and burglary important data state. Such crimes categories professional crime because crime is done by people who have high ability&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;span style="background-color: yellow;"&gt;Notes: Post for&lt;/span&gt; &lt;a href="http://technorati.com/"&gt;SGZBCQEFQW3H&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgI1TpIhQ1OH3SdW6iQjEVIYlZcMjmkWBS2a9Gxqq_VBQFp8K3n9eqhdJwFtwNAWOJbQQuDS1yRX9QW8C3uF_gaY0Vg4HuGllIMUJnq78qu_pmZPLPvNN3rwa0thE1ERzuAH_5_CMOaUkY/s72-c/anak+mencuri.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Criminal overwrite pilgrims</title><link>http://thecriminality.blogspot.com/2009/11/criminal-overwrite-pilgrims.html</link><category>murder case</category><category>the criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Fri, 6 Nov 2009 07:35:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-8648833108274185111</guid><description>Jakarta - indeed a criminal act can occur anywhere, including at the shrine, the Grand Mosque. Most candidates haji (calhoj) who experienced crimes were elderly.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;"Most pilgrims who become victims of fraud and robbery older so easily deceived. Worse, the action of fraud and robbery committed by mukimin," said Chairman of the Special Sector Jamaa'ah PPIH Daker Wrong Way to Mecca, Ali saifudin in front of Gate Babu Salam Mosque in Makkah, Mecca, Wednesday (4/11/2009).&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Perpetrators usually offer services to help the pilgrims who will perform Tawaf, Sai, and kissing the Black Stone.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Congregation of women, Saisah Tamiami binti Adnan Tjarsa (70) from Pekalongan, Central Java claimed weak as money lost. He also reported the missing money by 1,400 Saudi Riyal (USD 3.5 million).&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;At first, I was given Saisah he offered services led to the ablutions. At first she hesitated, but continued to convince people that, according Saisah eventually too.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Once up the escalator, the stranger said Saisah not allowed to bring bags to the place of ablution. Saisah ago&lt;br /&gt;&lt;div style="text-align: justify;"&gt;ordered way, but not for a while he looked back the man had fled. Saisah was panic and tell the police (Askar) at the Grand Mosque, which is then taken to the Special Sector officers Jamaa'ah Wrong Way.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Juwan Parta bin Parta also experienced the same thing. After tawaf, Juwan when separated from his entourage will make sa'i. He immediately approached by two men who speak Indonesian, and offered to help.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;When asked was it about indentitasnya, Juwan and then opened the bag&lt;br /&gt;&lt;div style="text-align: justify;"&gt;search passport identity in question. That's when players are robbed of money in the bag for Juwan Saudi Riyal 630 (1.6 million USD) and the rupiah worth Rp 2.5 million.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Other robbery victim hit, Junarto pilgrims from Banten Kloter 4. He dikerjai 'pimp' Black Stone. 'Calo' is to persuade him to help him kissing the black stone Kaaba dipojokan it. Junarto also requested a fee of 4000 Saudi Riyal (USD 10 million). Because the claims do not have the money, the brokers were forced to pay the money himself sober.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;While it reaches for his pocket, the brokers immediately seized cash worth Saudi Riyal 100.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Meanwhile, different again experienced criminal Nurhayati Lulu (40), assembly origin Kloter 3 Surabaya. He was sexually abused on Tuesday (3 / 11) night when Umroh worship.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;"When the victim was sa'i, (sorry) ass held by Arab men, the victim had tried to move away but the players desperate to repeat his actions," said Ali again.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Victim then yelled for her husband who is at the forefront. After a stubborn, finally pinned actors Saudi Arabian security officers who were on duty at the scene. (detik.net) &lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Murder case of commercial sex workers</title><link>http://thecriminality.blogspot.com/2009/11/murder-case-of-commercial-sex-workers.html</link><category>murder case</category><author>noreply@blogger.com (more tips)</author><pubDate>Wed, 4 Nov 2009 00:05:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-6493003962806378190</guid><description>Commercial Sex Workers), Vienna Lestari, on the localization of Sunan Kuning Semarang, the background is revealed after the suspect Agus Supriyadi (30) claimed to be hurt by the behavior of Vienna. Agus admitted, stabbing the first time performed at the waist causing the victim staggered direct victims. "I am pissed. The day before I come and 'service' is not satisfactory, "I suspect, when asked why cruelty to wring the victim's body. After the murder, added the suspect, convinced his arrival is not known by others, then he did not run anywhere.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;In fact, the suspect confessed keep working at PT Cipta Wijaya Semarang Purwodadi Road, KM 19.5, Mrangen Demak.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Recognition was reinforced by the statement of Chief of Police of West Semarang AKBP accompanied Drs Sugihardi AKP Reskrim Garjita visible. According to him in recognition given, the suspect intentionally brought sharp weapons from the house of a bayonet.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;"The knife used to kill the victims, dumped at the construction site Giant Mall, located on the east terminal Penggaron. Knife evidence, we find in the gutter, "explained police chief.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Chief of Police added the murder suspect description imitation, made when suspects are annoyed by 'service' provided victims. "In his statement, the suspect confessed to killing the victim because of irritation after double-booking to the victim, but disappointed," said Police Chief.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Only suspect&lt;br /&gt;&lt;div style="text-align: justify;"&gt;From the results of the investigation, Agus Supriyadi defined as the sole suspect homicide Vienna. Because of his actions, Agus threatened the death penalty. The suspect is known as a citizen Road Pasir Mas, II, Sub-District Stage Lor, North Semarang, entangled with the provisions of Article 340 of the Penal Code, Jo 338, Penal Code Penal Code 365 sub death penalty or life imprisonment.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;"The suspect, arrested at their work places are located in Jalan Raya Semarang Grobogan km 19.5 Mranggen, Demak Regency, Thursday (6 / 11) at around 13:30," added Police Chief.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;As it is known suspects arrested Agus seteleah officer who led the combined direct Resmob three officers from the Central Java Regional Police, each Iptu Suwarsono, Iptu Hendrik, and AKP Sugeng Wahyudi, do penyanggongan for three days at the company where tesangka work.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;In addition to the suspect Agus, Semarang Police Force Reskrim West, until Saturday (8 / 11) morning, is also still doing checks on the information on Kustiyah Siti (25) citizen Mrangen, Demak Regency, which was suspected to be penandah handphone (HP) of victims Vienna carried away by the suspect.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Police Chief adds, Siti Kustiyah (25) intensively questioned the possibility of his involvement in the brutal murder of karaoke locations Berbie III, who was in Road Argorejo III, Kalibanteng Kulon, Kalibateng, Friday (24/10) and.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;"Currently, we secured the decree as witnesses for questioning. If the inspection found the elements involved, then his status will be increased to a suspect," explained police chief. lek-yan (http://www.wawasandigital.com/)&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The Criminality</title><link>http://thecriminality.blogspot.com/2009/11/criminality.html</link><category>the criminality</category><author>noreply@blogger.com (more tips)</author><pubDate>Tue, 3 Nov 2009 16:44:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8305387142822389974.post-1991253241739205811</guid><description>&lt;div style="text-align: justify;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9XaafiuSKyv-83rh2T-v75L2Wc_77MiByCCaRlP_CsrZmCXKFZqrckiHH9gxR5XMXclrQWy7rg_lNQ8DKSsFT0WR4JhwSct88KD4VSk83XJB9pd-DkEGehHlwcQYTHXWWrGpYw9Q47AU/s1600-h/criminal.jpeg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 145px; height: 96px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9XaafiuSKyv-83rh2T-v75L2Wc_77MiByCCaRlP_CsrZmCXKFZqrckiHH9gxR5XMXclrQWy7rg_lNQ8DKSsFT0WR4JhwSct88KD4VSk83XJB9pd-DkEGehHlwcQYTHXWWrGpYw9Q47AU/s320/criminal.jpeg" alt="" id="BLOGGER_PHOTO_ID_5399812460904219106" border="0" /&gt;&lt;/a&gt;This blog about criminals, motives and the impact of the crime. many things that are classified as either crime in the home, school or neighborhood. This blog also aims to provide a warning to us all of the dangers posed by the criminal act itself.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Crime is an act that is contrary to law, if the rule applies in the social society then that would be punished in the form of social sanction, and if the criminal has been invited will be legislated in accordance with applicable formal legal&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;Good surf at his blog about crime and various factors determining the occurrence of crime. &lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9XaafiuSKyv-83rh2T-v75L2Wc_77MiByCCaRlP_CsrZmCXKFZqrckiHH9gxR5XMXclrQWy7rg_lNQ8DKSsFT0WR4JhwSct88KD4VSk83XJB9pd-DkEGehHlwcQYTHXWWrGpYw9Q47AU/s72-c/criminal.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item></channel></rss>