Presentation is loading. Please wait.

Presentation is loading. Please wait.

14-15 December 2009 Illicit Networks Workshop 1 IN ‘09 Wollongong Australia CTCP, Centre for Transnational Crime Prevention The Use of Mobile Social Networking.

Similar presentations


Presentation on theme: "14-15 December 2009 Illicit Networks Workshop 1 IN ‘09 Wollongong Australia CTCP, Centre for Transnational Crime Prevention The Use of Mobile Social Networking."— Presentation transcript:

1 14-15 December 2009 Illicit Networks Workshop 1 IN ‘09 Wollongong Australia CTCP, Centre for Transnational Crime Prevention The Use of Mobile Social Networking in Illicit Networks: the medium is the message Katina Michael, MG Michael, SJ Fusco, R Abbas School of Information Systems and Technology Faculty of Informatics, University of Wollongong katina@uow.edu.aukatina@uow.edu.au +61242213937 katina@uow.edu.au

2 14-15 December 2009Illicit Networks Workshop2 Ancient Methods of Sending Concealed Messages

3 14-15 December 2009Illicit Networks Workshop3 Pigeons (Carriers)

4 14-15 December 2009Illicit Networks Workshop4 Innovations: Mail, Phone, Fax Physical Touchpoints

5 14-15 December 2009Illicit Networks Workshop5 “He allegedly gave orders with written notes, not trusting cell phone conversations for fear of being monitored by police. Grasso said investigators were studying notes found at the farmhouse, along with a typewriter Provenzano apparently used for writing them.” “He allegedly gave orders with written notes, not trusting cell phone conversations for fear of being monitored by police. Grasso said investigators were studying notes found at the farmhouse, along with a typewriter Provenzano apparently used for writing them.” [2006] [2006]

6 14-15 December 2009Illicit Networks Workshop6 The Internet- Packets Disassemble & Reassemble Source Source Destination Destination Length Length Number Number Sequence Sequence

7 14-15 December 2009Illicit Networks Workshop7 Illicit Networks- Organised or Dis-organised? The Internet analogy? The Internet analogy? –Is the Internet organised or disorganised? –Is the Internet centralised or decentralised? –Is the Internet local or global or glocal? –Is the Internet symmetrical or asymmetrical? –Is the Internet tightly coupled or loosely coupled? With respect to how it evolved? With respect to how it evolved? With respect to how it is structured? With respect to how it is structured? With respect to how we can “get” information? With respect to how we can “get” information? With respect to how we use it? With respect to how we use it?

8 14-15 December 2009Illicit Networks Workshop8 Are Illicit Networks a Form of Transnational Supply Chain? “Readers will note that ‘value’ or supply chain encompasses both the support activities of the firm and the primary activities that produce its final products. “Readers will note that ‘value’ or supply chain encompasses both the support activities of the firm and the primary activities that produce its final products. Support activities include the infrastructure of the business, its financial and planning systems, human resources and technology. Support activities include the infrastructure of the business, its financial and planning systems, human resources and technology. –Its primary activities include ‘inbound logistics’. These consist of materials, money, time and information. The business operates on these to generate its products. –Outbound logistics take the products to the customers, aided by the activities of marketing, sales and service. –The effective working of both support and primary activities produces a profit margin for the business.” Wright, 89 Wright, 89

9 14-15 December 2009Illicit Networks Workshop9 Are Cells in a Network like Virtual Teams? Banding together  disbanding  re-band? Banding together  disbanding  re-band? ‘a group of individuals who work across time, space, and organizational boundaries with links strengthened by webs of communication technology. They have complementary skills and are committed to a common purpose, have interdependent performance goals, and share an approach to work for which they hold themselves mutually accountable.’ ‘a group of individuals who work across time, space, and organizational boundaries with links strengthened by webs of communication technology. They have complementary skills and are committed to a common purpose, have interdependent performance goals, and share an approach to work for which they hold themselves mutually accountable.’

10 14-15 December 2009Illicit Networks Workshop10 Depends on the business model?

11 14-15 December 2009Illicit Networks Workshop11 Five Typologies of Organised Crime Groups A - Rigid hierarchy: Single boss. Organization or division into several cells reporting to the centre. Strong internal systems of discipline. A - Rigid hierarchy: Single boss. Organization or division into several cells reporting to the centre. Strong internal systems of discipline. B - Devolved hierarchy: Hierarchical structure and line of command. However regional structures, with their own leadership hierarchy, have a degree of autonomy over day to day functioning. B - Devolved hierarchy: Hierarchical structure and line of command. However regional structures, with their own leadership hierarchy, have a degree of autonomy over day to day functioning. C - Hierarchical conglomerate: An association of organized crime groups with a single governing body. The latter can range from an organized umbrella type body to more flexible and loose oversight arrangements. C - Hierarchical conglomerate: An association of organized crime groups with a single governing body. The latter can range from an organized umbrella type body to more flexible and loose oversight arrangements. D - Core criminal group: Ranging from relatively loose to cohesive group of core individuals who generally regard themselves as working for the same organization. Horizontal rather than vertical structure. D - Core criminal group: Ranging from relatively loose to cohesive group of core individuals who generally regard themselves as working for the same organization. Horizontal rather than vertical structure. E - Organized criminal network: Defined by the activities of key individuals who engage in illicit activity together in often shifting alliances. They do not necessary regard themselves as an organized criminal entity. Individuals are active in the network through the skills and capital that they may bring. E - Organized criminal network: Defined by the activities of key individuals who engage in illicit activity together in often shifting alliances. They do not necessary regard themselves as an organized criminal entity. Individuals are active in the network through the skills and capital that they may bring. Source: UN, 2002

12 14-15 December 2009Illicit Networks Workshop12 Social Networks

13 14-15 December 2009Illicit Networks Workshop13 From Michael Kenney “Embedded within these intergroup networks are interpersonal networks, based on participants’ family, friendship, geographic, and professional ties. Social networks play important roles in Columbian trafficking enterprises. They generate trust and reciprocity among wary criminals…” (p. 27) “Embedded within these intergroup networks are interpersonal networks, based on participants’ family, friendship, geographic, and professional ties. Social networks play important roles in Columbian trafficking enterprises. They generate trust and reciprocity among wary criminals…” (p. 27)

14 14-15 December 2009Illicit Networks Workshop14 Online Social Networks

15 14-15 December 2009Illicit Networks Workshop15 The Promise of Ubiquity: Anywhere/Anytime

16 14-15 December 2009Illicit Networks Workshop16 http://www.letstalk.com/blog/post.htm?blogId=673 Mobile Social Networks Connect Connect Share Share Collaborate Collaborate

17 14-15 December 2009Illicit Networks Workshop17 What is LBSN? A LBS is any technology that can be used to determine the location of an entity (subject or object) and use that information to provide some context- based service. A LBS is any technology that can be used to determine the location of an entity (subject or object) and use that information to provide some context- based service. Online social networking is the process of maintaining and building social networks using electronic media. Online social networking is the process of maintaining and building social networks using electronic media.

18 14-15 December 2009Illicit Networks Workshop18

19 14-15 December 2009Illicit Networks Workshop19 Location Alert

20 14-15 December 2009Illicit Networks Workshop20 Sharing “Gadgets” on Social Network Spaces

21 14-15 December 2009 Illicit Networks Workshop 21 So What? What Can Terrorists or Members of Transnational Organised Crime Groups Do With Emerging Technologies?

22 14-15 December 2009Illicit Networks Workshop22

23 14-15 December 2009Illicit Networks Workshop23 “Mr Hanke has previously addressed controversy about the security implications of Google Maps. Terrorists in Mumbai used mapping programs to help plot their attacks. Google also replaced images of a British base in Iraq after military objections.”


Download ppt "14-15 December 2009 Illicit Networks Workshop 1 IN ‘09 Wollongong Australia CTCP, Centre for Transnational Crime Prevention The Use of Mobile Social Networking."

Similar presentations


Ads by Google