SlideShare a Scribd company logo
Brandy Tamplain
1/19/2014

Hong Kong's Domestic
Worker Abuse
Indonesian maid tells her story of violence
Erwiana said her wounds are the product of seven months of
abuse that she suffered while "working" as a domestic helper.

Doctors at Amel Sehat Islamic Hospital say
she is suffering from swelling of the brain
from repeated blows to the head. She also
has several broken teeth, a broken nose
and her hands and feet are brown and
swollen with cellulitis - an infection of the
skin that resulted from her long-untreated
wounds.
Recruited
 About 330,000 foreigners
work as domestic helpers in
Hong Kong. London-based
rights group Amnesty
International said
thousands like Erwiana
from Indonesia are being
tricked into working in Hong
Kong by brokers and
agencies with blatant
disregard for their clients'
welfare

 Erwiana was recruited in
Indonesia by PT Graha
Ayukarsa, with whom she
said she agreed to have
$328 deducted from her
$505 monthly wage, until a
$2,320 recruitment fee was
paid off.
Amnesty International
Asia-Pacific
 Robert Godden, Amnesty's AsiaPacific coordinator:
"actually, when you look into the
specifics…many of the factors
leading to the abuse can be
applied to thousands of migrant
domestic workers:
underpayment, the employer didn't
pay the minimum wage; restrictions
on movement; you can see that
she was heavily indebted by the
illegal recruitment fees charged by
the agency; and you can see that
she didn't know how to access
justice.“

 Amnesty International is an
organization/ global movement
with more than 3 million
supporters, members and
activists in over 150 countries
and territories who campaign to
end grave abuses of human
rights.
 http://www.amnesty.org/en
http://www.aljazeera.com/indepth/features/2014/01/hong-kong-domesticworker-abuse-20141199347455882.html
http://www.amnesty.org/en
Chapter 3 Trafficking Human Subjects in the Malay Worlds, 1850-1910
Global Smuggling (K&K text)
Bitcoins: Part 1
What is the Bitcoin?
Bitcoins
 Bitcoins are units of currency in the form of software code that
are generated, transmitted, and stored digitally. They combine
the power of Gold, the U.S. Dollar, and PayPal.
 Unlike other virtual forms of currency (PayPal etc.), its value is
not backed by a hard currency such as the dollar and its value is
determined by the demand for Bitcoins.
 Some are calling it “the first decentralized digital currency.”
While other’s argue that Bitcoins are only useful to criminals.
 Terror financing is defined as “the financial support, in any
form, of terrorism or of those who engage in terrorism.”
(Botha, 2006)
 Financial experts agree that the financing of terror can occur
anywhere in the world, whether or not it has a complex financial
system in place. (Basdeo, 2011) Such as Africa, in which as
much as 70% of the population does not have access to a
formal banking system. (Smith, 2013)
 This reaches out to the World Wide Web. (Fagen, 2013)
Bitcoins as Currency
 1 BTC = $818.12 USD *OR* €602.83 EUR
 Online programs are used to “purchase” Bitcoins and they
are stored in electronic wallets (untethered to any
bank/financial institution or country)
 In September of 2013, digital currency worth $27m (€ 20m)
was seized from an anonymous online black market called
the Silk Road (See update below.)
 Authorities say the Silk Road is conduit for purchases of
drugs and computer hacking services – even a place where
assassins and professional forgers may have advertised.
 It was closed after FBI agents took control of its server and
arrested the man they say was its founder in San Francisco.
Bitcoins
 According to the F.B.I. fraud, forgery, kidnapping, money
laundering, murder-for-hire, human sex
trafficking, poaching, and numerous other criminal activities
are considered among the primary threats from digital
currency.
 E.J. Fagan of Global Financial Integrity, a group that studies
illicit financial flows, argues that Bitcoin allows criminals to
conduct business without going through intermediaries.
(Fagan, 2013)
 The danger of facilitating peer-to-peer transactions makes
these heinous crimes much more difficult to track.
 The 9/11hijackers were successful in part because their
financial transactions were small, and fell below the reporting
threshold and did not arouse suspicions.
 Due to the nature of Bitcoins, they pose a similar threat.
Bitcoins
 Next week:

 Bitcoins are a threatening tool in Africa’s violent and crimeridden culture.
 James Smith, Professor of African and Development Studies
at University of Edinburg says that the Bitcoin is fueling
Africa’s next banking revolution.
 News reports from Africa
References
 http://www.gfintegrity.org/content/view/662/72/
 http://ivn.us/2014/01/13/bitcoin-investigated-around-worldpotential-criminal-activity/
 http://investigations.nbcnews.com/_news/2014/01/16/223293
91-30000-bitcoin-forfeiture-in-silk-road-case-is-biggest-everprosecutors-say?lite
 http://theconversation.com/bitcoin-fuels-africas-bankingrevolution-16044

More Related Content

Similar to Global Crime_ MOD 2

Cause_and_Effects_of_Digital_currency.docx
Cause_and_Effects_of_Digital_currency.docxCause_and_Effects_of_Digital_currency.docx
Cause_and_Effects_of_Digital_currency.docx
MunguuRoza
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
Tracy Morgan
 
PPT WCC and the crimes.evolution concept & notespptx
PPT WCC and the crimes.evolution concept & notespptxPPT WCC and the crimes.evolution concept & notespptx
PPT WCC and the crimes.evolution concept & notespptx
Anu Singh
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
Free Law - by De Jure
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Bitcoin fbi
Bitcoin fbiBitcoin fbi
171-Article Text-307-1-10-20210702 (1).pdf
171-Article Text-307-1-10-20210702 (1).pdf171-Article Text-307-1-10-20210702 (1).pdf
171-Article Text-307-1-10-20210702 (1).pdf
UmarFarouq29
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
Steven Rhyner
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
SARON MESSEMBE OBIA
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
Donald E. Hester
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Gamaliel Olayiwola Fasuyi
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
AkashSharma618775
 
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY LAUNDERING
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY  LAUNDERINGBEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY  LAUNDERING
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY LAUNDERING
Md Arman
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
Simone Domenico Casadei Bernardi
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
Beerajaah Sswain
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
Beerajaah Sswain
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 

Similar to Global Crime_ MOD 2 (20)

Cause_and_Effects_of_Digital_currency.docx
Cause_and_Effects_of_Digital_currency.docxCause_and_Effects_of_Digital_currency.docx
Cause_and_Effects_of_Digital_currency.docx
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
PPT WCC and the crimes.evolution concept & notespptx
PPT WCC and the crimes.evolution concept & notespptxPPT WCC and the crimes.evolution concept & notespptx
PPT WCC and the crimes.evolution concept & notespptx
 
Frequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdfFrequent White Collar Crimes And Their Causes.pdf
Frequent White Collar Crimes And Their Causes.pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Bitcoin fbi
Bitcoin fbiBitcoin fbi
Bitcoin fbi
 
171-Article Text-307-1-10-20210702 (1).pdf
171-Article Text-307-1-10-20210702 (1).pdf171-Article Text-307-1-10-20210702 (1).pdf
171-Article Text-307-1-10-20210702 (1).pdf
 
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAYTERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
TERRORISTS NOT USING BITCOIN? POLITICIANS WANT TO REGULATE IT ANYWAY
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
THE LEGAL AND INSTITUTIONAL FRAMEWORKS FOR COMBATTING MONEY LAUNDERING IN CAM...
 
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY LAUNDERING
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY  LAUNDERINGBEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY  LAUNDERING
BEHIND CLOSED DOORS: THE SECRET WORLD OF MONEY LAUNDERING
 
Terrorist Use of Cryptocurrencies
Terrorist Use of CryptocurrenciesTerrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 

Recently uploaded

CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 

Recently uploaded (20)

CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 

Global Crime_ MOD 2

  • 1. Brandy Tamplain 1/19/2014 Hong Kong's Domestic Worker Abuse Indonesian maid tells her story of violence
  • 2. Erwiana said her wounds are the product of seven months of abuse that she suffered while "working" as a domestic helper. Doctors at Amel Sehat Islamic Hospital say she is suffering from swelling of the brain from repeated blows to the head. She also has several broken teeth, a broken nose and her hands and feet are brown and swollen with cellulitis - an infection of the skin that resulted from her long-untreated wounds.
  • 3. Recruited  About 330,000 foreigners work as domestic helpers in Hong Kong. London-based rights group Amnesty International said thousands like Erwiana from Indonesia are being tricked into working in Hong Kong by brokers and agencies with blatant disregard for their clients' welfare  Erwiana was recruited in Indonesia by PT Graha Ayukarsa, with whom she said she agreed to have $328 deducted from her $505 monthly wage, until a $2,320 recruitment fee was paid off.
  • 4. Amnesty International Asia-Pacific  Robert Godden, Amnesty's AsiaPacific coordinator: "actually, when you look into the specifics…many of the factors leading to the abuse can be applied to thousands of migrant domestic workers: underpayment, the employer didn't pay the minimum wage; restrictions on movement; you can see that she was heavily indebted by the illegal recruitment fees charged by the agency; and you can see that she didn't know how to access justice.“  Amnesty International is an organization/ global movement with more than 3 million supporters, members and activists in over 150 countries and territories who campaign to end grave abuses of human rights.  http://www.amnesty.org/en
  • 6. Bitcoins: Part 1 What is the Bitcoin?
  • 7. Bitcoins  Bitcoins are units of currency in the form of software code that are generated, transmitted, and stored digitally. They combine the power of Gold, the U.S. Dollar, and PayPal.  Unlike other virtual forms of currency (PayPal etc.), its value is not backed by a hard currency such as the dollar and its value is determined by the demand for Bitcoins.  Some are calling it “the first decentralized digital currency.” While other’s argue that Bitcoins are only useful to criminals.  Terror financing is defined as “the financial support, in any form, of terrorism or of those who engage in terrorism.” (Botha, 2006)  Financial experts agree that the financing of terror can occur anywhere in the world, whether or not it has a complex financial system in place. (Basdeo, 2011) Such as Africa, in which as much as 70% of the population does not have access to a formal banking system. (Smith, 2013)  This reaches out to the World Wide Web. (Fagen, 2013)
  • 8. Bitcoins as Currency  1 BTC = $818.12 USD *OR* €602.83 EUR  Online programs are used to “purchase” Bitcoins and they are stored in electronic wallets (untethered to any bank/financial institution or country)  In September of 2013, digital currency worth $27m (€ 20m) was seized from an anonymous online black market called the Silk Road (See update below.)  Authorities say the Silk Road is conduit for purchases of drugs and computer hacking services – even a place where assassins and professional forgers may have advertised.  It was closed after FBI agents took control of its server and arrested the man they say was its founder in San Francisco.
  • 9. Bitcoins  According to the F.B.I. fraud, forgery, kidnapping, money laundering, murder-for-hire, human sex trafficking, poaching, and numerous other criminal activities are considered among the primary threats from digital currency.  E.J. Fagan of Global Financial Integrity, a group that studies illicit financial flows, argues that Bitcoin allows criminals to conduct business without going through intermediaries. (Fagan, 2013)  The danger of facilitating peer-to-peer transactions makes these heinous crimes much more difficult to track.  The 9/11hijackers were successful in part because their financial transactions were small, and fell below the reporting threshold and did not arouse suspicions.  Due to the nature of Bitcoins, they pose a similar threat.
  • 10. Bitcoins  Next week:  Bitcoins are a threatening tool in Africa’s violent and crimeridden culture.  James Smith, Professor of African and Development Studies at University of Edinburg says that the Bitcoin is fueling Africa’s next banking revolution.  News reports from Africa
  • 11. References  http://www.gfintegrity.org/content/view/662/72/  http://ivn.us/2014/01/13/bitcoin-investigated-around-worldpotential-criminal-activity/  http://investigations.nbcnews.com/_news/2014/01/16/223293 91-30000-bitcoin-forfeiture-in-silk-road-case-is-biggest-everprosecutors-say?lite  http://theconversation.com/bitcoin-fuels-africas-bankingrevolution-16044

Editor's Notes

  1. Erwiana is a domestic worker (house servant) in Hong Kong that was coerced into working for a family with promises of good pay and housing. It’s the law in Hong Kong for domestic help to live with the family, so many like Erwiana find themselves trapped in these abusive situations and unable to flee because they are in the country on working visas that are costly and expire quickly. The first and largest portion of her pay go towards paying off the family that paid in advance her “recruitment fees” and admission into Hong Kong.
  2. About 330,000 foreigners are recruited to work as domestic slaves in Hong Kong each year. That’s about 8 times the population of the city that I live in,roughly the same number of Drug Offenders in the US Prison system, OR the entire population of Iceland.
  3. In summation, Domestic Worker abuse is very real, is very harmful, and ongoing. Despite having lived among many cultures around the world and experiencing and trying to accept many different cultural norms, this is still difficult to imagine that this is still happening. I think it is VERY important for Americans in particular to look outside their own culture and see that the world has not developed equally, and that in doing so, we could perhaps make changes in ourselves to collectively make the world a better place. If anything, it should make you feel very sad that you have taken so much in your life for granted.
  4. Two parts: 1.) What is the Bitcoin 2.) How does the Bitcoin finance crime in Africa – How it is really centralized to horrible crimes in Africa
  5. UPDATE: U.S. Attorney's Office put the value of all the bitcoins seized at more than $33.6 million. In its statement Thursday, it said the 29,655 forfeited this week were valued at $28 million, and the 144,336 seized from Ulbricht were worth more than $130 million. Exchange rate calculators checked by NBC News on Thursday put the total amount at $142 million to $146 million
  6. So I hope that you have learned a little about the bitcoin, how dangerous it is, and what role it plays in Global Crime. Next week we will look more closely at activities in Africa that further show how unethical the bitcoin is and why its so important that the government gets a handle on it as soon as possible.