I gangs hi tech gang communication-handout


Published on

Basic gangs and technology presentation

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

I gangs hi tech gang communication-handout

  1. 1. Carter F. Smithcarterfsmith@gmail.com 615-656-3505
  2. 2. What do we know? Young folks can’t remember life without cell phones, CDs or an email address.  Many gang members are a part of this generation. As gangs evolve, they take on more of a business model than they had when they started.  This affects the way we should investigate them. 2
  3. 3. Focus on issuesfrom these perspectivesInformationIntelligenceEvidence 3
  4. 4. Overview Mobile telephone & text messaging Traditional instant messaging Web based sites & text/voice/video messaging Open source intelligence Convergence/virtual communication Evidentiary considerations Legal considerations Future vision 4
  5. 5. Disclaimer 3G2 Based on the coining and development of the phrase Third Generation Street Gangs by John P. Sullivan and Dr. Robert Bunker Compiled from the listed references by the Gangfighters Network – www.Gangfighters.net The technology identified in this presentation may not be used by all gang members in all locations. It will be used by a few 1st Gen gangs, many 2nd Gen gangs, and most 3rd Gen gangs. None of the information presented herein should be mistaken for an endorsement of methods, applications, or techniques used. 5
  6. 6. Flash Mob + Gang activity = Flash gangbanging
  7. 7. George Knox, NGCRC, June 15, 2011
  8. 8. flash banging"smash and grab“  create diversion  smash window of ○ jewelry store ○ fur/leather store  take what they can grab  in seconds they are gone 8
  9. 9. In the News Groups of youth using text messaging and social media to gather at specified locations primarily on Chicago’s South Side robbers attack people with pepper spray also been reported in Los Angeles, Philadelphia and Washington D.C. 9
  10. 10. May 12, 2004 Dallas Almost 3 dozen people arrested for street fight. Fight arranged via Internet chat room. Two gangs arranged time to meet. Gang members identified and arrested with aid of digital video. Some of them actually signed in with their true names, so that helped us identify people. 10
  11. 11. April 19, 2011 – Los Angeles Man shot in head after Gang inspired flash mob trash Venice Beach Many involved dressed in gang attire and tattoos. Victim shot in head and side. Message on Twitter: ‘Venice beach bball ct going up tomorrow.’ LAPD called for reinforcements as crowd, clearly including gang members, swelled. Six to eight shots rang out at 6.30pm Victim ran into alley before collapsing. 11
  12. 12. April 2011 - Washington, D.C. 20 youths outside G-Star Raw clothing store filed in together, brushing past customers marched directly to shelves of expensive designer jeans and racks of high-end shirts sorted through selections for their sizes and tucked them under their arms, behaving like customers suddenly made for exit, before police suspects stole estimated $20,000 in merchandise 12
  13. 13. June 4, 2011 - Chicago Police arrested 7 of the 15-20 suspects across the street from Northwestern University on East Chicago Avenue. One suspect hit male victim with baseball bat. Several offenders punched and kicked him. Right after attack, 2d man robbed by 5-6 nearby. 13
  14. 14.  Of 129 retailers, primarily national store chains, 94.5 percent said they were victimized by organized criminals in the past year. 84.8 percent said the problem has only worsened in the past three years. High percentages arent entirely due to flash mob crime, but they are contributing. 14
  15. 15. Bureau of Justice Statistics – stalking  Technology (e-mail, IM, GPS & spyware) used to harass 1 in 4 stalking victims.  about 1.2 million victims.  Law enforcement remains under- equipped..  Victims have mixed feelings about police response. 15
  16. 16. 16
  17. 17. APP: Application Short for ‘application program’.(Broadly, an app is often a self-contained environment forperforming some well-defined task such as ‘word processing’)
  18. 18. Evidence considerations withMobile (Wireless) Telephones
  19. 19. Sprint/Nextel 19
  20. 20. Sprint/Nextel •1 to a group at once •all-digital, secure •U.S., Canada, Mexico and other countries 20
  21. 21. AT&T Wireless (formerly Cingular Wireless)  Up to 2000 contacts can be stored with up to four numbers within each contact.  “VoiceClip,” allows you to record and send a message to up to three people without ringing the telephone 21
  22. 22. Verizon Wireless  saves a copy of the names, phone numbers, and email addresses stored in your phone.  view, print, add, delete, and edit your contacts online. 22
  23. 23. Apple MobileMe new email, contacts, and calendar events over the air to all your devices 23
  24. 24. Should we be concerned? Bulk purchases of cell phones Sold at a loss to create a market for real profit maker  more call time Middlemen deactivates lock so they can be used on other services Recent court actions may change, but there is still a degree of anonymity 24
  25. 25. boost 25
  26. 26. Jump Mobile no monthly commitments, no long-term contracts, and no hidden fees 26
  27. 27. Evidence considerations withMobile (Phone) Text Messaging
  28. 28. 28
  29. 29. 29
  30. 30. Mobile Phone Text messaging At the end of 2011, 6 billion mobile subscriptions Equivalent to 87 percent of the world population  huge increase from 5.4 billion in 2010 ○ and 4.7 billion in 2009. 30
  31. 31. Mobile Phone Text messaging Text Messaging (aka SMS-Short Message Service)  An alphanumeric message sent to a mobile phone, typed using ○ Your phone keypad ○ Another form of interface (computer)  Allows short text messages to be sent and received on a mobile phone 31
  32. 32. Mobile Phone Text Messaging (w/o phone) 32
  33. 33. Mobile Phone Text Messaging Hey! Hey! 33
  34. 34.  http://www.webopedia.com/quick_ref/textmessageabbreviations.asp 34
  35. 35. Web-based technology
  36. 36. Traditional instant messaging(chat) AIM Yahoo MSN ICQ Google Talk Trillian Skype 36
  37. 37. Web-based CommunicationsTechnology 37
  38. 38. one billion users by end of summer 38
  39. 39. 39
  40. 40. Twitter Is a free website designed to provide the exchange of public content in the form of 140 characters messages sent from the web interface or from a user’s phone. Users may have a public or private account, and choose to view the 140 character messages of other Twitter users, which range from businesses (such as Comcast, Whole Foods, etc.) to political figures (BarackObama) to celebrities or popular accounts (Oprah or Britney Spears) to normal people. Twitter conducts most correspondence via email, so PLEASE INCLUDE A VALID EMAIL ADDRESS so we may contact you. To contact us, email: lawenforcement@twitter.com 40
  41. 41. Twitbanging A 15-year old member of The New Dons claims that twitter is useful for coordinating violent activities, and that they often use new lingo that would be difficult for anyone but insiders to understand. Still, the NYPD has been successful in stopping attacks before they happen by keeping track of the online activities of gang members. http://help.twitter.com/entries/41949-guidelines-for- law-enforcement 41
  42. 42. 42
  43. 43. Mocospacegangsta-colb 43
  44. 44. 04/14/2008 Gang threats go high-tech YouTube.com videos threatening more than two dozen Salinas youths  questions about free speech and authorities responsibility to protect potential victims. Modern iteration of way gang members have been threatening each other forever. We have watched (threats) happen for years ... ever since spray paint and walls were invented," Salinas police Cmdr. Kelly McMillin said. 44
  45. 45. YouTube 45
  46. 46. YouTube 46
  47. 47. YouTube 47
  48. 48. More video 48
  49. 49. Gaming conversations 49
  50. 50. Anonymous Proxy Servers Hide your IP address (think fake or alias ID) Prevent unauthorized access to your computer Effectively hide any information about you Don’t let anyone know that you are surfing through a proxy Used for  Web searching  Web-Mail (MSN Hot Mail, Yahoo mail),  Web-chat rooms,  FTP archives, etc. 50
  51. 51. Stealth Surfing (anonymous proxyservers/software) 51
  52. 52. Open Source Intelligence
  53. 53. 53
  54. 54. http://www.spy.appspot.com/ 54
  55. 55. 55
  56. 56. Profile on a social network site 75% of online adults 18-24 57% of online adults 25-34 30% of online adults 35-44 19% of online 45 to 54 year olds 10% of online 55 to 64 year olds 7% of online adults 65 and older 56
  57. 57. Portable Technology
  58. 58. Portable Info/Commo PDA  Personal digital assistants are handheld computers that were originally designed as personal organizers, but became much more versatile over the years. (Wikipedia) PPC  the Pocket PC is "a handheld device that enables users to store and retrieve e-mail, contacts, appointments, tasks, play multimedia files, games, exchange text messages (Microsoft, according to Wikipedia) Smartphone  a full-featured mobile phone with personal computer like functionality. Most smartphones are cellphones that support full featured email capabilities with the functionality of a complete personal organizer. (Wikipedia) iPhone/iPod  The iPhone is a multimedia and Internet-enabled quad-band GSM EDGE-supported mobile phone designed and sold by Apple Inc. The iPhones functions include those of a camera phone and a multimedia player, in addition to text messaging and visual voicemail. It also offers Internet services including e-mail, web browsing, and local Wi-Fi connectivity. User input is accomplished via a multi-touch screen with virtual keyboard and buttons. (Wikipedia) 59
  59. 59. Like a Dumb Terminal . . . USB/iPod/SD Card used as hard-drive  Traceless on host comp  May not remember/know to include in warrant  Major IT security breaches . . . Web-based data storage  May not remember/know to include in warrant  Major IT security breaches . . . 60
  60. 60. www.mojopac.com 61
  61. 61. Mini-data storage iPod/MP3 players SD data cards  Message typed/recorded/embedded SIM cards 62
  62. 62. Remote monitoring 63
  63. 63. Web-based storage 64
  64. 64. Private Browsing  No pages will be added to the list of sites in the History menu.  Nothing you enter into text boxes on websites or the Search bar and no Cookies will be saved.  No passwords will be automatically filled in during Private Browsing and no new passwords will be saved.  No files you download will remain in the list in the Downloads window after you turn off Private Browsing..  The cache stores temporary files such as web pages, images and other online media. All of the items that get added to the cache will be deleted when you turn off Private Browsing.
  65. 65. Augmented Reality live direct or indirect view of a physical real-world environment whose elements are augmented by virtual computer- generated imagery 66
  66. 66. Convergence/Virtual technology
  67. 67. Voice Over Internet Protocol(VoIP)Three main technologies used for mobile VoIP: UMA - The Unlicensed Mobile Access, designed to allow VoIP to run over the GSM cellular backbone SIP - The standard used by most VoIP services, and now being implemented on mobile handsets Skype Protocol and Barablu - a proprietary modified version of Jabber 68
  68. 68. (partially) Concealing identity 1. Enter your mobile number 2. Enter your friends mobile number 3. Call the local jaxtr number and talk 69
  69. 69. (partially) Concealing identity  Complete IP voice and messaging platform  Services allow calls via mobile, landline, computer or Wi-Fi vice 70
  70. 70. Anonymize your phone call Caller ID displays the number you want them to see, change the tone of your voice and keep a backup Unblocks blocked and restricted calls with any cell phone. 71
  71. 71. 72
  72. 72. Google Voice Call screening - Announce  Forwarding phones - Add  Conference calling - Join and screen callers phones - decide which ring people into a single call Listen in - before taking call  Voicemail transcripts -  Call record - Record calls Block calls Read what your voicemail and store them online SMS - Send, receive, store says  Call switch - Switch phones Place calls - Call US  Listen to voicemail - Online during a call numbers for free or from your phone  Mobile site - View your Taking calls - Answer on  Notifications - Via email or inbox from your mobile any of your phones SMS  GOOG-411 - Check Phone routing - Phones  Personalize greeting - Vary directory assistance ring based on who calls greetings by caller  Manage groups - Set  Share voicemail - Forward preferences by group or download voicemails 73
  73. 73. Phonebooth.com 74
  74. 74.  Telephone Number Identification with Caller ID lookups. You can also click on an area code and it will give you a list of the cities and their exchange numbers. http://tnid.us/ 75
  75. 75. Mass-communication Delivered anywhere within the CONUS. NO long distance charges Message can be up to 45 seconds Delivered to people, voice mail, answering machines Import existing contact list or manually enter Status reports and call histories available on line 76
  76. 76. Mass-communication 77
  77. 77. Evidentiary considerations
  78. 78. Preparation Plan (equipment, collection material, warrant, etc.) to collect power source, peripheral accessories Document as-is, as able (fungible evidence) Know who needs to be contacted to probe further – don’t delay 79
  79. 79. Seizing Evidence  First Responder Training First Responder Handling Handheld Device Evidence 80
  80. 80. Legal considerations Compiled by the Gangfighters Network – www.Gangfighters.net
  81. 81. Legal considerations Locate/assemble available expertise  Include translation (geekspeak-English) needs (prosecutor/judge/jury) Coordination with forensics/lab in advance – familiarity Coordination with prosecutor in advance – familiarity 82
  82. 82. i-Warrants  Include “uncommon” technical terms in affidavit.  Describe role of the device/technology in the offense  Justify your need to search off site  Treat contents as evidence AND intelligence 83
  83. 83. i-Warrants If you can logically tie potential evidence to the crime, and can articulate the need in the warrant, you should be able to access more areas where evidence exists.  (think passwords, cases, cables, synchronizing) 84
  84. 84. 5th Circuits opinion - January2007  "the permissible scope of a search incident to a lawful arrest extends to containers found on an arrestees person."  A cell phone is an electronic "container," in that it stores information that may have great evidentiary value (and that might easily be destroyed or corrupted). 85
  85. 85. Search of cell phones cannot bejustified as search incident to lawfularrest. The justification is the need for officer safety and to preserve evidence... A text message on a cell phone presents no danger of physical harm to the arresting officers or others. 86
  86. 86.  Searching through information stored on a cell phone is analogous to a search of a sealed letter, which requires a warrant. The search of text messages does not constitute an inventory search.  The purpose of an inventory search is to document property in an arrested persons possession to protect property from theft and the police from lawsuits for lost or stolen property. 87
  87. 87. the basic principle still applies: incident to a persons arrest, a mobile phone or beeper may be briefly inspected to see if it contains evidence relevant to the charge for which the defendant has been arrested. 88
  88. 88. Future vision
  89. 89. Two ways to send money with PayPal Mobile: By text message: Text message to 729725 (or PAYPAL) with the amount and the phone number to send it to. For example, to send $10.00 USD to the phone number 4150001234, text: Send 10 to 4150001234 By phone call:Call 1-800-4PAYPAL to send money by voice or keypad. You’ll be askedfor your PIN to login, and then simply follow the prompts to send money.
  90. 90. boku No registration.  Get goods faster. No cards.  Just you and your phone. No problem.  Safe and secure, always. 91
  91. 91. Facebook Credits: The Worlds First Global Currency? 93
  92. 92. Future vision  Application  Technology  Identity theft  Wifi/WiMax  Bank fraud  Bluetooth & Mobile  Money laundering developments  Drug Trafficking  Anonymous interaction  Steganography 94
  93. 93. Carter F. Smithcarterfsmith@gmail.com 615-656-3505