<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2422-4200</journal-id>
<journal-title><![CDATA[Revista Logos Ciencia & Tecnología]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. logos cienc. tecnol.]]></abbrev-journal-title>
<issn>2422-4200</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2422-42002023000200070</article-id>
<article-id pub-id-type="doi">10.22335/rlct.v15i2.1721</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An exploratory study of police impersonation crimes: Confrontational offenders and offenses]]></article-title>
<article-title xml:lang="es"><![CDATA[Un estudio exploratorio de los delitos de suplantación de identidad policial: Delincuentes confrontativos y ofensas]]></article-title>
<article-title xml:lang="pt"><![CDATA[Um estudo exploratório sobre os crimes de falsificação de identidade policial: infratores em confronto e ofensas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ghareeb]]></surname>
<given-names><![CDATA[Shahla Al]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Dodge]]></surname>
<given-names><![CDATA[Mary]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,University of Colorado Denver  ]]></institution>
<addr-line><![CDATA[Denver ]]></addr-line>
<country>USA</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,University of Colorado Denver  ]]></institution>
<addr-line><![CDATA[Denver ]]></addr-line>
<country>USA</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2023</year>
</pub-date>
<volume>15</volume>
<numero>2</numero>
<fpage>70</fpage>
<lpage>85</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S2422-42002023000200070&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S2422-42002023000200070&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S2422-42002023000200070&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This research focuses on confrontational police impersonation crimes, which include the false impersonation of federal agents, official and state personnel, and local or national law enforcement. Extant research that examines police impersonators suggests that the extent of this crime is more widespread than commonly believed and is rarely researched. This study offers a broader perspective compared to previous research and examines different types of fraudulent acts. Data from identity fraud incidents reported in the news media were collected using the Google Alert system. News articles from February 2016 through May 2020 were coded employing content and thematic analyses. The results indicate that police impersonation crimes vary in type and motive. Finally, the discussion offers suggestions for future research, policies, and regulations.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Esta investigación se centra en los delitos de suplantación de identidad policial por confrontación, que incluyen agentes federales, personal oficial y estatal, y agentes del orden público locales o nacionales. La investigación existente que examina a los imitadores de policías sugiere que el alcance de este delito está más extendido de lo que comúnmente se cree y rara vez se investiga. Este estudio intenta ofrecer una perspectiva más amplia en comparación con investigaciones anteriores y examina diferentes tipos de actos fraudulentos. Los datos de los incidentes de suplantación informados en los medios de comunicación internacionales se recopilaron mediante el sistema Google Alert. Los artículos de noticias de febrero de 2016 a mayo de 2020 se codificaron empleando un análisis de contenido y temático. Los resultados indican que los delitos de suplantación de identidad policial varían en tipo y motivo. La discusión ofrece sugerencias para futuras investigaciones, políticas y regulaciones.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Esta pesquisa se concentra em crimes de falsificação de identidade policial em confronto, que incluem agentes federais, funcionários oficiais e estaduais, e policiais locais ou nacionais. As pesquisas existentes que examinam os falsos policiais sugerem que o escopo desse crime seja mais amplo do que se acredita e raramente é investigado. Este estudo tenta oferecer uma perspectiva mais ampla em comparação com pesquisas anteriores e examina diferentes tipos de atos fraudulentos. Os dados sobre incidentes de falsificação de identidade relatados na mídia internacional foram coletados usando o Google Alert. Os artigos de notícias de fevereiro de 2016 a maio de 2020 foram codificados por meio de análise temática e de conteúdo. Os resultados indicam que os crimes de falsificação de identidade policial variam em tipo e motivo. A discussão oferece sugestões para futuras pesquisas, políticas e regulamentações.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[delito de suplantación de identidad]]></kwd>
<kwd lng="es"><![CDATA[imitadores de policías]]></kwd>
<kwd lng="es"><![CDATA[aplicación de la ley]]></kwd>
<kwd lng="es"><![CDATA[COVID-19]]></kwd>
<kwd lng="en"><![CDATA[impersonation crime]]></kwd>
<kwd lng="en"><![CDATA[police impersonators]]></kwd>
<kwd lng="en"><![CDATA[law enforcement]]></kwd>
<kwd lng="en"><![CDATA[COVID-19]]></kwd>
<kwd lng="pt"><![CDATA[crime de falsificação de identidade]]></kwd>
<kwd lng="pt"><![CDATA[falsificação de identidade policial]]></kwd>
<kwd lng="pt"><![CDATA[aplicação da lei]]></kwd>
<kwd lng="pt"><![CDATA[COVID-19]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[K. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Durbin]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Salinger]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identity theft]]></article-title>
<source><![CDATA[Journal of Economic Perspectives]]></source>
<year>2008</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>171-92</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bassey]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Ohaeri]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Elegbeleye]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel RFID-based design - theoretical framework for combating police impersonation]]></article-title>
<source><![CDATA[International Journal of Computer Science and Information Security]]></source>
<year>2015</year>
<volume>13</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>BBC News Europe</collab>
<source><![CDATA[Norway police say 85 killed in island youth camp attack]]></source>
<year>23/0</year>
<month>7/</month>
<day>20</day>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benson]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Simpson]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Whitecollar crime: An opportunity perspective]]></source>
<year>2018</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berg]]></surname>
<given-names><![CDATA[B. L]]></given-names>
</name>
</person-group>
<source><![CDATA[Qualitative research methods for the social sciences (6th ed.)]]></source>
<year>2007</year>
<publisher-name><![CDATA[Pearson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bharat]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[F. S. Stinson turns 10 (Web log post). Google News Blog]]></source>
<year>22/0</year>
<month>9/</month>
<day>20</day>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[L. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social change and crime rate trends: A routine activity approach]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1979</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>588-605</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cornish]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Clarke]]></surname>
<given-names><![CDATA[R. V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding crime displacement: an application of rational choice theory]]></article-title>
<source><![CDATA[Criminology]]></source>
<year>1987</year>
<volume>25</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>933-48</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Crime Museum</collab>
<source><![CDATA[Ted Bundy: serial killers: crime library]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cruywagen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Beware of bogus police cars that look exactly like the real thing, Capetonians warned]]></source>
<year>3/07</year>
<month>/2</month>
<day>01</day>
<publisher-name><![CDATA[IOLNews]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Collo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Identity theft. Colorado Legislative Council]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime and nature]]></source>
<year>2006</year>
<publisher-name><![CDATA[Sage Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gellately]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime, identity and power: Stories of police imposters in Nazi Germany]]></article-title>
<source><![CDATA[Crime, History &amp; Societies]]></source>
<year>2000</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>5-18</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hurl-Eamon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Westminster imposters: Impersonating law enforcement in early Eighteenth-Century London]]></article-title>
<source><![CDATA[Eighteenth-Century Studies]]></source>
<year>2005</year>
<volume>38</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>461-83</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<collab>Indian Penal Code (IPC)</collab>
<source><![CDATA[Personating a public servant. Chapter 9, Section 170]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[D. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predatory personalities as behavioral mimics and parasites: Mimicry-deception theory]]></article-title>
<source><![CDATA[Perspectives on Psychological Science]]></source>
<year>2014</year>
<volume>9</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>445-51</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kapan]]></surname>
<given-names><![CDATA[D. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Three-butterfly system provides a field test of Mullerian mimicry]]></article-title>
<source><![CDATA[Nature]]></source>
<year>2001</year>
<volume>409</volume>
<page-range>338-3340</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Levinson-King]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Could Canada&#8217;s worst mass shooting have been avoided]]></source>
<year>17/0</year>
<month>7/</month>
<day>20</day>
<publisher-name><![CDATA[BBC News]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marx]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The new police undercover work]]></article-title>
<source><![CDATA[Urban Life]]></source>
<year>1980</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>399-446</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marx]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Are you for real? Police and other impersonators]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neuendorf]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The content analysis guidebook]]></source>
<year>2002</year>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ojedokun]]></surname>
<given-names><![CDATA[U. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Situational and contextual factors sustaining police impersonation in Nigeria]]></article-title>
<source><![CDATA[Policing: A Journal of Policy and Practice]]></source>
<year>2018</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>428-37</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Payne]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[White-collar crime: The essentials]]></source>
<year>2017</year>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rakestraw]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Cameron]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ted Bundy: The development of a serial murderer]]></source>
<year>2019</year>
<volume>52</volume>
<publisher-name><![CDATA[Posters]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rennison]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dodge]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Police impersonation: Pretenses and predators]]></article-title>
<source><![CDATA[American Journal of Criminal Justice]]></source>
<year>2012</year>
<volume>37</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>505-22</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rennison]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hart]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research methods in criminal justice and criminology]]></source>
<year>2019</year>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reynolds]]></surname>
<given-names><![CDATA[R. G. Jr.]]></given-names>
</name>
</person-group>
<source><![CDATA[Caryl Chessman: Red light bandit?]]></source>
<year>2014</year>
<publisher-name><![CDATA[Apple Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salmon]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[The laws for South African police services. In Law Made Simple - Compliance for Business, Citizens and for our Government]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Trugman]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power lures police impersonators. The Washington Times, p. C1. US Legal, Inc. (n.d.). Criminal impersonation law and legal definition]]></source>
<year>1999</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Natta]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[In Florida, criminals pose as police more frequently and for more violent ends]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walckner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Understanding police impersonators: Common motives, characteristics, and patterns]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Milton ]]></publisher-loc>
<publisher-name><![CDATA[Curry College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zarei]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Farahbakhsh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Crespi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep dive on politician impersonating accounts in social media]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 IEEE Symposium on Computers and Communications (ISCC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zarei]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Farahbakhsh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Crespi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[How impersonators exploit Instagram to generate fake engagement?]]></source>
<year>2020</year>
<conf-name><![CDATA[ IEEE International Conference on Communications (ICC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
