SlideShare ist ein Scribd-Unternehmen logo
1 von 38
gangcoptechspeak
     carterfsmith
    615-656-3505
abstract
• technology changes lives
• gangs evolve & adopt biz
  model
 – affect LE strategy?
prepare for
• overview criminal communications
  options, actions, interactions
• LE – mostly gang cops – response
• engaging, assisting (thwarting)
  detection of such activity
• “impromptu” brainstorming session
  –metaphors to explain technology
criminal communications
•in person
•document
•digital
 –text       –voip
 –twitter    –gaming
 –cell       –other
law enforcement response


    learn     ignore
cops are key
•investigate
•pass learning to
 prosecutor
 –who passes to judge
  and/or jury
so how do they learn?
• attend department training
• self-taught
• friendly assistance and
  availability
 –(this is where you can help)
twitbanging
• Twitter useful for
  coordinating activities,
  talk in code
• Police able to stop
  attacks before they
  happen
Mocospace
stealth surfing
web-based storage
• No pages added to list of
private browsing     sites in History menu.
                   • Nothing you enter into
                     text boxes on websites or
                     Search bar and no Cookies
                     saved.
                   • No passwords
                     automatically filled in and
                     no new passwords saved.
                   • No files you download will
                     remain in the list in
                     Downloads.
                   • The cache stores
                     temporary files such as
                     web pages, images and
                     other online media. All
                     items added to cache will
                     be deleted.

Voice Over Internet Protocol (VoIP)
(partially) Concealing identity
Anonymize your phone call
• Caller ID displays
  number you want them
  to see, changes tone of
  your voice and keeps
  backup
• Unblocks blocked and
  restricted calls with any
  cell phone.
Legal considerations
• Locate/assemble available expertise
  –Include translation (geekspeak-English)
   needs (prosecutor/judge/jury)
• Coordination with forensics/lab in
  advance – familiarity
• Coordination with prosecutor in
  advance – familiarity
engage, assist, thwart detection
  •   •   •   •   •   •   •   •   •
  S   S   N   A   A   E   I   C   C
  e   t   o   l   s   x   g   o   o
  e   o   t   e   s   p   n   n   n
      p   i   r   i   l   o   c   s
          f   t   s   a   r   e   p
          y       t   i   e   a   i
                      n       l   r
                                  e
metaphorically speaking . . .
• a file on dropbox or g-drive is like . . .
• a DDoS attack is like . . .
what LE cannot do
 but citizens can
Technohood Watch
(relevant)
       Constitutional provisions
1st freedom of speech, right to assemble
2nd right to bear arms
4th unreasonable searches and seizures
4th search warrants based on probable
  cause
5th/14th due process
5th self-incrimination
6th right to confront accuser
1st freedom of speech
• Issue: right to communicate opinions &
  ideas
• Police Limitations: public safety
• Citizen Limitations: when freedom of
  speech conflicts with other rights
• Example: cops' freedom of speech
  limited -- citizens can call out a violator
  with fewer repercussions
1st - right to assemble
             (freedom of association)
• Issue: right to express, promote, pursue and
  defend common interests (together)
• Police Limitations: objective criteria
  (permits, injunctions) with oversight (like 2d
  opinion) to limit association
• Citizen Limitations: Follow rules for
  detention or kidnapping
  – Obstacles placed in someone’s way make travel
    inconvenient
2nd - right to bear arms
• Issue: personal right to firearms
  for individual use, and a collective
  right to bear arms in a militia
• Example - government can't
  unduly restrict
  –citizens not required to sell guns or
   ammo to others
4th - search warrants
• Issue: law enforcement search for evidence
  and confiscate evidence if found
• Police Limitations
     Warrant                Emergency
     Consent                Incident to arrest
     Hot pursuit of felon   Plain view
• Example - cops have to explain curiosity in
  detail to get search warrant
  – citizens can be curious when not breaking law
4th   . . . probable cause
• Issue: reasonable suspicion,
  circumstances justify belief
  certain facts true
• Example - cops can't enter
  without probable cause or
  exigent circumstances
  – citizens perception creates
   circumstances
5th - self-incrimination

• Issue: Self-incrimination -
  interrogation OR voluntarily.
• Example - cops can't ask
  questions if they suspect crime
 –citizens can ask and keep asking
6th - right to confront accuser
• Issue: Confrontation Clause provides
  in all criminal prosecutions, accused
  shall enjoy right…to be confronted
  with witnesses against him.
• Example – anonymous source –
  provides information regarding crime
  and information independently
  verifiable.
THE KEY IS THAT THE
 CITIZEN MUST NOT BE
 GUIDED, DIRECTED, OR
OTHERWISE TARGETED BY
 OR REPRESENT (AS AN
  AGENT) THE POLICE
In preparing this concept and
presentation I did not consult with any
  police officers or other government
 officials to see if they agreed with my
    perspectives. These are just my
  personal opinions. I have seen this
work, but you should rely only on your
own due diligence inquiry before acting
              in this manner.
Technohood Watch is
• related to USAonWatch
• somewhat like Citizen Observer
 –With no meetings with police or
  prosecutors
• complementary, but very
  different.
it’s not
• if you see something,
  say something

• total information awareness

• NSA recruiting pitch at DefCon
Technohood Watch
• educates citizens on application of basic legal
  principles and common sense
• teaches citizens to help themselves &
  community by identifying and reporting
  suspicious activity
• provides citizens with opportunity to make
  world safer and improve quality of life
• focus on
  – observation and awareness
  – employing strategies
Technohood Watch
• no membership requirements
  – no members
• venue for information and education
• no connections between learners and police,
  government employee, agent, or
  representative
  – no directions to authors of alerts, advisories, or
    other information or to readers
  – no one targeted to investigate certain people,
    property, or activities
Technohood Watch
• participants may identify a
  child pornography ring one
  day and a cyberterrorist the
  next
• a focus on space, not crime,
  with emphasis on reporting
q4me?
carterfsmith
615-656-3505

Weitere ähnliche Inhalte

Was ist angesagt?

American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesFrederick Lane
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicityNatalie Yap
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentialityempalmer
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)festival ICT 2016
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipbecnicholas
 
Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014virtruprivacy
 
Comm law ppt invasion of privacy
Comm law ppt invasion of privacyComm law ppt invasion of privacy
Comm law ppt invasion of privacyJulie Price
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
An Intro to Research on Burglary
An Intro to Research on BurglaryAn Intro to Research on Burglary
An Intro to Research on BurglaryLaura Huey
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)webdagene
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementBill Bode
 

Was ist angesagt? (20)

American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Legal issues concerning social media & publicity
Legal issues concerning social media & publicityLegal issues concerning social media & publicity
Legal issues concerning social media & publicity
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Maintaining confidentiality
Maintaining confidentialityMaintaining confidentiality
Maintaining confidentiality
 
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
 
OSINT
OSINTOSINT
OSINT
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014Virtru: Trends in Federal Surveillance Law Q2 2014
Virtru: Trends in Federal Surveillance Law Q2 2014
 
Comm law ppt invasion of privacy
Comm law ppt invasion of privacyComm law ppt invasion of privacy
Comm law ppt invasion of privacy
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Deep web
Deep webDeep web
Deep web
 
Final class 145
Final class 145Final class 145
Final class 145
 
An Intro to Research on Burglary
An Intro to Research on BurglaryAn Intro to Research on Burglary
An Intro to Research on Burglary
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)Tom Armitage: Den materielle verden (Webdagene 2013)
Tom Armitage: Den materielle verden (Webdagene 2013)
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
Cyber Thursday Webinar Log Management
Cyber Thursday Webinar Log ManagementCyber Thursday Webinar Log Management
Cyber Thursday Webinar Log Management
 

Andere mochten auch

Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperCarter F. Smith, J.D., Ph.D.
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Carter F. Smith, J.D., Ph.D.
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Carter F. Smith, J.D., Ph.D.
 

Andere mochten auch (6)

Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
 
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...
 

Ähnlich wie Gangcoptechspeak

Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionMarcus Leaning
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction Vinil Patel
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataRobin Rice
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13jan4tarheels
 
POLE Investigations with Neo4j
POLE Investigations with Neo4jPOLE Investigations with Neo4j
POLE Investigations with Neo4jNeo4j
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propellaExo Futures
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyMultiscope
 
DETECTING DECEPTION.ppt psychology crimi
DETECTING DECEPTION.ppt psychology crimiDETECTING DECEPTION.ppt psychology crimi
DETECTING DECEPTION.ppt psychology crimiRegent University
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdfGnanavi2
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 

Ähnlich wie Gangcoptechspeak (20)

Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 Introduction
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13
 
POLE Investigations with Neo4j
POLE Investigations with Neo4jPOLE Investigations with Neo4j
POLE Investigations with Neo4j
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Digital investigations
Digital investigationsDigital investigations
Digital investigations
 
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and PrivacyData Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
Data Pioneers - Barry Ryan (EFAMRO) - Online Data Collection and Privacy
 
DETECTING DECEPTION.ppt psychology crimi
DETECTING DECEPTION.ppt psychology crimiDETECTING DECEPTION.ppt psychology crimi
DETECTING DECEPTION.ppt psychology crimi
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 

Mehr von Carter F. Smith, J.D., Ph.D.

Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...Carter F. Smith, J.D., Ph.D.
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Carter F. Smith, J.D., Ph.D.
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...Carter F. Smith, J.D., Ph.D.
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Carter F. Smith, J.D., Ph.D.
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Carter F. Smith, J.D., Ph.D.
 
Gangs in the military forces conspire to make u.s. gangs a worldwide threat
Gangs in the military   forces conspire to make u.s. gangs a worldwide threatGangs in the military   forces conspire to make u.s. gangs a worldwide threat
Gangs in the military forces conspire to make u.s. gangs a worldwide threatCarter F. Smith, J.D., Ph.D.
 
Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Carter F. Smith, J.D., Ph.D.
 
Corrections today corrections in the classroom - a recruiting tool
Corrections today   corrections in the classroom - a recruiting toolCorrections today   corrections in the classroom - a recruiting tool
Corrections today corrections in the classroom - a recruiting toolCarter F. Smith, J.D., Ph.D.
 
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threat
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threatGangs in the military: Forces conspire to make U.S. gangs a worldwide threat
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threatCarter F. Smith, J.D., Ph.D.
 

Mehr von Carter F. Smith, J.D., Ph.D. (20)

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
 
The Hounds
The HoundsThe Hounds
The Hounds
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
 
Flash gangs scja2011
Flash gangs scja2011Flash gangs scja2011
Flash gangs scja2011
 
Gangs+college
Gangs+collegeGangs+college
Gangs+college
 
Gangs in the military forces conspire to make u.s. gangs a worldwide threat
Gangs in the military   forces conspire to make u.s. gangs a worldwide threatGangs in the military   forces conspire to make u.s. gangs a worldwide threat
Gangs in the military forces conspire to make u.s. gangs a worldwide threat
 
Carole Hitchcox
Carole HitchcoxCarole Hitchcox
Carole Hitchcox
 
Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...Perceptions of gang investigators regarding presence of military trained gang...
Perceptions of gang investigators regarding presence of military trained gang...
 
Corrections today corrections in the classroom - a recruiting tool
Corrections today   corrections in the classroom - a recruiting toolCorrections today   corrections in the classroom - a recruiting tool
Corrections today corrections in the classroom - a recruiting tool
 
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threat
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threatGangs in the military: Forces conspire to make U.S. gangs a worldwide threat
Gangs in the military: Forces conspire to make U.S. gangs a worldwide threat
 

Kürzlich hochgeladen

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Kürzlich hochgeladen (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Gangcoptechspeak

  • 1. gangcoptechspeak carterfsmith 615-656-3505
  • 2. abstract • technology changes lives • gangs evolve & adopt biz model – affect LE strategy?
  • 3. prepare for • overview criminal communications options, actions, interactions • LE – mostly gang cops – response • engaging, assisting (thwarting) detection of such activity • “impromptu” brainstorming session –metaphors to explain technology
  • 4. criminal communications •in person •document •digital –text –voip –twitter –gaming –cell –other
  • 6. cops are key •investigate •pass learning to prosecutor –who passes to judge and/or jury
  • 7. so how do they learn? • attend department training • self-taught • friendly assistance and availability –(this is where you can help)
  • 8. twitbanging • Twitter useful for coordinating activities, talk in code • Police able to stop attacks before they happen
  • 12. • No pages added to list of private browsing sites in History menu. • Nothing you enter into text boxes on websites or Search bar and no Cookies saved. • No passwords automatically filled in and no new passwords saved. • No files you download will remain in the list in Downloads. • The cache stores temporary files such as web pages, images and other online media. All items added to cache will be deleted.

  • 13. Voice Over Internet Protocol (VoIP)
  • 15. Anonymize your phone call • Caller ID displays number you want them to see, changes tone of your voice and keeps backup • Unblocks blocked and restricted calls with any cell phone.
  • 16.
  • 17. Legal considerations • Locate/assemble available expertise –Include translation (geekspeak-English) needs (prosecutor/judge/jury) • Coordination with forensics/lab in advance – familiarity • Coordination with prosecutor in advance – familiarity
  • 18. engage, assist, thwart detection • • • • • • • • • S S N A A E I C C e t o l s x g o o e o t e s p n n n p i r i l o c s f t s a r e p y t i e a i n l r e
  • 19. metaphorically speaking . . . • a file on dropbox or g-drive is like . . . • a DDoS attack is like . . .
  • 20. what LE cannot do but citizens can
  • 22. (relevant) Constitutional provisions 1st freedom of speech, right to assemble 2nd right to bear arms 4th unreasonable searches and seizures 4th search warrants based on probable cause 5th/14th due process 5th self-incrimination 6th right to confront accuser
  • 23. 1st freedom of speech • Issue: right to communicate opinions & ideas • Police Limitations: public safety • Citizen Limitations: when freedom of speech conflicts with other rights • Example: cops' freedom of speech limited -- citizens can call out a violator with fewer repercussions
  • 24. 1st - right to assemble (freedom of association) • Issue: right to express, promote, pursue and defend common interests (together) • Police Limitations: objective criteria (permits, injunctions) with oversight (like 2d opinion) to limit association • Citizen Limitations: Follow rules for detention or kidnapping – Obstacles placed in someone’s way make travel inconvenient
  • 25. 2nd - right to bear arms • Issue: personal right to firearms for individual use, and a collective right to bear arms in a militia • Example - government can't unduly restrict –citizens not required to sell guns or ammo to others
  • 26. 4th - search warrants • Issue: law enforcement search for evidence and confiscate evidence if found • Police Limitations Warrant Emergency Consent Incident to arrest Hot pursuit of felon Plain view • Example - cops have to explain curiosity in detail to get search warrant – citizens can be curious when not breaking law
  • 27. 4th . . . probable cause • Issue: reasonable suspicion, circumstances justify belief certain facts true • Example - cops can't enter without probable cause or exigent circumstances – citizens perception creates circumstances
  • 28. 5th - self-incrimination • Issue: Self-incrimination - interrogation OR voluntarily. • Example - cops can't ask questions if they suspect crime –citizens can ask and keep asking
  • 29. 6th - right to confront accuser • Issue: Confrontation Clause provides in all criminal prosecutions, accused shall enjoy right…to be confronted with witnesses against him. • Example – anonymous source – provides information regarding crime and information independently verifiable.
  • 30. THE KEY IS THAT THE CITIZEN MUST NOT BE GUIDED, DIRECTED, OR OTHERWISE TARGETED BY OR REPRESENT (AS AN AGENT) THE POLICE
  • 31. In preparing this concept and presentation I did not consult with any police officers or other government officials to see if they agreed with my perspectives. These are just my personal opinions. I have seen this work, but you should rely only on your own due diligence inquiry before acting in this manner.
  • 32. Technohood Watch is • related to USAonWatch • somewhat like Citizen Observer –With no meetings with police or prosecutors • complementary, but very different.
  • 33. it’s not • if you see something, say something • total information awareness • NSA recruiting pitch at DefCon
  • 34. Technohood Watch • educates citizens on application of basic legal principles and common sense • teaches citizens to help themselves & community by identifying and reporting suspicious activity • provides citizens with opportunity to make world safer and improve quality of life • focus on – observation and awareness – employing strategies
  • 35. Technohood Watch • no membership requirements – no members • venue for information and education • no connections between learners and police, government employee, agent, or representative – no directions to authors of alerts, advisories, or other information or to readers – no one targeted to investigate certain people, property, or activities
  • 36. Technohood Watch • participants may identify a child pornography ring one day and a cyberterrorist the next • a focus on space, not crime, with emphasis on reporting
  • 37. q4me?

Hinweis der Redaktion

  1. gangcoptechspeakcarterfsmith615-656-3505
  2. abstracttechnology changes livesgangs evolve & adopt biz model affect LE strategy?
  3. prepare foroverview criminal communications options, actions, interactions LE – mostly gang cops – response engaging, assisting (thwarting) detection of such activity“impromptu” brainstorming session metaphors to explain technology
  4. criminal communicationsin persondocumentdigitaltexttwittercellvoipgamingother
  5. http://gizmodo.com/5A 15-year old member of The New Dons claims that twitter is useful for coordinating violent activities, and that they often use new lingo that would be difficult for anyone but insiders to understand. Still, the NYPD has been successful in stopping attacks before they happen by keeping track of the online activities of gang members. http://help.twitter.com/entries/41949-guidelines-for-law-enforcement415423/ny-gangs-use-twitter-to-plan-crimes-while-the-ny-police-use-twitter-to-arrest-gangs
  6. Web-based storagehttp://www.remotedatastorage.net/
  7. No pages added to list of sites in History menu. Nothing you enter into text boxes on websites or Search bar and no Cookies saved. No passwords automatically filled in and no new passwords saved. No files you download will remain in the list in Downloads. The cache stores temporary files such as web pages, images and other online media. All items added to cache will be deleted.

  8. Call someone from your phone and the person's Caller ID displays the number that you intend them to see.Change the tone of your voice to the point that you'll be unrecognizable even to your closest friends and family.Perfect for capturing important information or simply to keep a phone call as a backup for future reference.http://www.spoofcard.com/Unblocks blocked and restricted calls.Trapcall works with any cell phone.No need to change your current number.Different plans for different folks.http://www.trapcall.com
  9. engage, assist, thwart detectionSeeStopNotifyAlertAssistExplainIgnoreConcealConspire
  10. 1st freedom of speech, freedom of religion, and freedom of the press, as well as the right to assemble and petition the government 2nd right to bear arms 3rd forced quartering of soldiers out of war time 4th unreasonable searches and seizures and requirements for search warrants based on probable cause 5th indictment by grand jury, eminent domain, right to due process, prohibits self-incrimination and double jeopardy 6th right to a fair and speedy public trial by jury, right to be notified of accusations, confront accuser, obtain witnesses and retain counsel 7th right to trial by jury in certain civil cases8th excessive fines and bail, cruel and unusual punishment 9th rights not enumerated in the constitution10th Limits powers of federal government to those delegated to it by Constitution 11th Immunity of states from suits from out-of-state citizens and foreigners not living within borders. Lays foundation for sovereign immunity 12th Revises presidential election procedures 13th Abolishes slavery and involuntary servitude, except as punishment for crime 14th Defines citizenship, contains Privileges or Immunities Clause, Due Process Clause, Equal Protection Clause, and post-Civil War issues
  11. 1st freedom of speechIssue: right to communicate one's opinions and ideasPolice Limitations: issues of public safety Citizen Limitations: when freedom of speech conflicts with other values or rightsExample:  cops' freedom of speech limited -- citizens can call out a violator with fewer repercussions
  12. 1st - right to assemble(often interchangeable with freedom of association)Issue: right to come together and collectively express, promote, pursue and defend common interestsPolice Limitations: must have objective criteria (permits, injunctions) with oversight (like 2d opinion) to limit associationCitizen Limitations: Follow rules for detention or kidnappingExample: Obstacles placed in someone’s way make travel inconvenient
  13. 2nd - right to bear arms Issue: personal right to firearms for individual use, and a collective right to bear arms in a militiaExample - government can't unduly restrict citizens not required to sell guns or ammo to others
  14. in certain cases a search warrant is not required, such as where consent is given by a person in control of the object or property to be searched. Some commonly cited exigent circumstances are: hot pursuit of a felon (to prevent a felon's escape or ability to harm others); imminent destruction of evidence before a warrant can be properly obtained; emergency searches (such as where someone is heard screaming for help inside a dwelling); or a search incident to arrest (to mitigate the risk of harm to the arresting officers specifically).[2]Another exception is when evidence is in plain view—if the officer is legitimately on the premises, his observation is from a legitimate vantage point, and it is immediately obvious that the evidence is contraband (for example, a cannabis cigarette on the front seat of a car while the officer has pulled the suspect over for a seat belt violation), the officer is within his right to seize the object in question.When police arrest an individual shortly after exiting a vehicle, the police may conduct a full search of the suspect's person, any area within that person's immediate reach, and the passenger compartment of the vehicle which was recently occupied, for weapons or any other contraband. (However, a recent Supreme Court decision limits such searches to circumstances where the arrested person has the possibility of accessing the vehicle, or when the vehicle could contain evidence of the crime that the person is being arrested for.[3]) If the subject is arrested in a home, police may search the room in which they were arrested, and conduct a "protective sweep" of the premises where there is reasonable suspicion that other individuals may be hiding. Searches are also allowed in emergency situations where the public is in danger.With rented property, a landlord may refuse to allow law enforcement to search a tenant's apartment without a search warrant, and a warrant must be obtained using the same guidelines as if it was a tenant's own home. But in some jurisdictions, ahotel room may be searched with permission of the hotel's management but without permission from a guest and without a warrant.
  15. 4th . . . based on probable cause Issue: reasonable suspicion, supported by circumstances to justify prudent and cautious person's belief that certain facts are probably trueExample - cops can't enter without probable cause or exigent circumstances - citizens perception creates circumstances
  16. 5th - self-incriminationIssue: Self-incrimination either directly or indirectly: directly, by means of interrogation where information is disclosed; indirectly, when information disclosed voluntarily without pressure from another person.Example - cops can't ask questions if they suspect crime committed -- citizens can ask and keep asking
  17. 6th - right to confront accuserIssue: Confrontation Clause of the Sixth Amendment to the United States Constitution provides that "in all criminal prosecutions, the accused shall enjoy the right…to be confronted with the witnesses against him.Example – anonymous source – provides information regarding a crime and that information is independently verifiable.