Carter F. Smith is a gang expert who provides information on how gangs are evolving with technology. As communication technologies have advanced, gangs now utilize mobile phones, text messaging, social media, and the internet to coordinate activities and exchange information. This raises evidentiary and legal issues for law enforcement investigating gang activities in the digital age.
"Shortened" presetation given by Geoff Peterson at ERE Expo in San Diego and First Interview event in New Orleans, March 2010. Full presentation available with FREE mobile consultations.
This presentation gives an overview of mobile technologies and the mobile recruiting landscape.
A presentation that should make our clients aware that mobile advertising will become huge in the near future and that they should start engage in it now.
A set of slides about the issues I faced during my research project Digital Culture Industry: A History of Digital Distribution. It focuses on the use of digital documents in documentary analysis and the issues of using these documents.
Caller identification remains a key issue in the wireless industry as robocallers and spammers
increasingly target subscribers by hiding behind a veil of anonymity, leading to the industry and
FCC taking action and protecting mobile users by establishing a Robocall Strike Force. Cequint, a
Transaction Network Services company, conducted a survey* among adult Android and iOS
mobile phone users in the US to document how significant this issue is and identify areas of focus
for the Strike Force.
From phone phreaking with cereal box whistles to make free long distance phone calls to stealing credit card numbers and making millions in fraudulent purchases, hacking has certainly come a long way – both in technology and in motive.
This week we look at some of history’s most notorious hackers, and the fate they met when the law caught up with their illegal activities.
(c) Bedford/St. Martin's bedfordstmartins.com 1-457-62096-0 / 978-1-457-62096-6
CHAPTER 2 ○ INTERNET���37
MASS MEDIA AND
THE CULTURAL LANDSCAPE
40
The Evolution of the
Internet
48
The Internet Today:
From Media
Convergence
to Web 3.0
52
Video Games
and Interactive
Environments
56
The Economics and
Issues of the Internet
66
The Internet and
Democracy
The Internet,
Digital Media,
and Media
Convergence
Starting a decade ago, the most famous mar-
keting campaign for mobile phones involved
a Verizon Wireless test technician wearing
horn-rimmed glasses saying “Can you hear me
now?” into his phone from various locations.
These days, the original purpose of a mobile
phone—a voice call—is no longer the main
attraction. Instead, the Blackberry, the iPhone,
and Google’s Android phones lead a growing list
of smartphones that feature options like mobile
broadband, Wi-Fi, texting, GPS navigators,
music players, touch screens, full keyboards,
cameras, and speech recognition. Mobile
phones today represent a “fourth screen” (after
movie screens, televisions, and computers) for
many users, allowing us to go online, watch vid-
eos, or take and send photos wherever we are.
We may be on the go, but now we aren’t discon-
nected from the mass media—we take it with us.
(c) Bedford/St. Martin's bedfordstmartins.com 1-457-62096-0 / 978-1-457-62096-6
38���MASS MEDIA AND THE CULTURAL LANDSCAPE
THE INTERNET, DIGITAL MEDIA,
AND MEDIA CONVERGENCE
The change in the technology and
culture of mobile phones is evident
in current mobile phone marketing.
When HTC released its Droid Incred-
ible smartphone for Verizon in 2010,
voice calls were hardly even a feature
worth promoting. Indeed, the only times
Verizon mentioned voice was in connec-
tion to the voice-enabled keyboard (so
users can speak their text messages in-
stead of typing them) and voice search,
which uses voice recognition to search
Google. The more important features
in the marketing campaign were the
powerful processors, the touch screen,
social networking ease, synced e-mail
accounts, Google Maps, the 8 mega-
pixel camera, and thousands of apps
and widgets from the Android Market
(similar to the iPhone’s App Store).
One of the latest entries, Motorola’s
Bravo (for AT&T) is a smartphone whose
design and features focus on Web
browsing and social networking so much
that most reviews don’t even address
the phone’s call quality. Instead, the
Bravo’s marketing efforts show off its
full HTML browser with Adobe Flash
Lite 3 (for a content-rich surfing experi-
ence) and a large touch screen (making
it better for watching video). The phone
also features MOTOBLUR, a service
that syncs your Facebook, MySpace,
and Twitter updates into a single feed.
However, given the fierce competition
in the market, it can be difficult to know
which of the many new smartphones
will be popular with consumers and have
lasting power.
This shift i ...
This paper is intended to educate mobile and internet users on the daily threats they face while using their cell phone, emails to communicate and browsing the web.
It contains current statistics on cybercrimes, online dating, web browsing privacy issues and so forth. Analyses case studies and offers solutions to protect your privacy.
Mobile Privacy and Security - Study by MobidiggerHubert Moik
In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.
"Shortened" presetation given by Geoff Peterson at ERE Expo in San Diego and First Interview event in New Orleans, March 2010. Full presentation available with FREE mobile consultations.
This presentation gives an overview of mobile technologies and the mobile recruiting landscape.
A presentation that should make our clients aware that mobile advertising will become huge in the near future and that they should start engage in it now.
A set of slides about the issues I faced during my research project Digital Culture Industry: A History of Digital Distribution. It focuses on the use of digital documents in documentary analysis and the issues of using these documents.
Caller identification remains a key issue in the wireless industry as robocallers and spammers
increasingly target subscribers by hiding behind a veil of anonymity, leading to the industry and
FCC taking action and protecting mobile users by establishing a Robocall Strike Force. Cequint, a
Transaction Network Services company, conducted a survey* among adult Android and iOS
mobile phone users in the US to document how significant this issue is and identify areas of focus
for the Strike Force.
From phone phreaking with cereal box whistles to make free long distance phone calls to stealing credit card numbers and making millions in fraudulent purchases, hacking has certainly come a long way – both in technology and in motive.
This week we look at some of history’s most notorious hackers, and the fate they met when the law caught up with their illegal activities.
(c) Bedford/St. Martin's bedfordstmartins.com 1-457-62096-0 / 978-1-457-62096-6
CHAPTER 2 ○ INTERNET���37
MASS MEDIA AND
THE CULTURAL LANDSCAPE
40
The Evolution of the
Internet
48
The Internet Today:
From Media
Convergence
to Web 3.0
52
Video Games
and Interactive
Environments
56
The Economics and
Issues of the Internet
66
The Internet and
Democracy
The Internet,
Digital Media,
and Media
Convergence
Starting a decade ago, the most famous mar-
keting campaign for mobile phones involved
a Verizon Wireless test technician wearing
horn-rimmed glasses saying “Can you hear me
now?” into his phone from various locations.
These days, the original purpose of a mobile
phone—a voice call—is no longer the main
attraction. Instead, the Blackberry, the iPhone,
and Google’s Android phones lead a growing list
of smartphones that feature options like mobile
broadband, Wi-Fi, texting, GPS navigators,
music players, touch screens, full keyboards,
cameras, and speech recognition. Mobile
phones today represent a “fourth screen” (after
movie screens, televisions, and computers) for
many users, allowing us to go online, watch vid-
eos, or take and send photos wherever we are.
We may be on the go, but now we aren’t discon-
nected from the mass media—we take it with us.
(c) Bedford/St. Martin's bedfordstmartins.com 1-457-62096-0 / 978-1-457-62096-6
38���MASS MEDIA AND THE CULTURAL LANDSCAPE
THE INTERNET, DIGITAL MEDIA,
AND MEDIA CONVERGENCE
The change in the technology and
culture of mobile phones is evident
in current mobile phone marketing.
When HTC released its Droid Incred-
ible smartphone for Verizon in 2010,
voice calls were hardly even a feature
worth promoting. Indeed, the only times
Verizon mentioned voice was in connec-
tion to the voice-enabled keyboard (so
users can speak their text messages in-
stead of typing them) and voice search,
which uses voice recognition to search
Google. The more important features
in the marketing campaign were the
powerful processors, the touch screen,
social networking ease, synced e-mail
accounts, Google Maps, the 8 mega-
pixel camera, and thousands of apps
and widgets from the Android Market
(similar to the iPhone’s App Store).
One of the latest entries, Motorola’s
Bravo (for AT&T) is a smartphone whose
design and features focus on Web
browsing and social networking so much
that most reviews don’t even address
the phone’s call quality. Instead, the
Bravo’s marketing efforts show off its
full HTML browser with Adobe Flash
Lite 3 (for a content-rich surfing experi-
ence) and a large touch screen (making
it better for watching video). The phone
also features MOTOBLUR, a service
that syncs your Facebook, MySpace,
and Twitter updates into a single feed.
However, given the fierce competition
in the market, it can be difficult to know
which of the many new smartphones
will be popular with consumers and have
lasting power.
This shift i ...
This paper is intended to educate mobile and internet users on the daily threats they face while using their cell phone, emails to communicate and browsing the web.
It contains current statistics on cybercrimes, online dating, web browsing privacy issues and so forth. Analyses case studies and offers solutions to protect your privacy.
Mobile Privacy and Security - Study by MobidiggerHubert Moik
In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.
The Hounds were a group of gang members in New York who joined the military to fight in the Mexican-American War, and ended up in Yerbe Buena (San Francisco) as Domestic Terrorists. Check these guys out with this short presentation.
Communities everywhere have experienced the negative effects of street gangs, domestic terrorists, and outlaw motorcycle gangs. The presence of these criminals increases the threat of violence to the community. When they have military training, the threat increases significantly. The problem addressed in this study was the growing presence of military-trained gang members in civilian communities. The purpose of the study was to determine the perceived presence of military-trained gang members in jails and community corrections and to examine whether there was a relationship between the perceptions of sheriff’s deputies regarding that presence and a number of variables.
The presence of military-trained gang members (MTGMs) in the community increases the threat of violence to citizens. The problem addressed was the growing presence of military-trained gang members in civilian communities in Tennessee. We examined the perceived presence of military-trained gang members of gang investigators at the annual conference and whether there had been changes since the previous survey. Many respondents reported gang members in their jurisdictions were increasingly using military-type weapons or explosives (51%), as well as military-type equipment like body armor, night-vision devices, etc. (30%). Although few (24%) agreed that gang members were using military-type tactics, a majority (over 90%) reported gang members committed home invasions and armed robberies. Many (46%) reported that there were gang members in their jurisdiction currently serving in the military, while 64% reported they had gang members who had served. Most of the respondents (66%) did not believe that military representatives advised their department when gang members were discharged from the military. More of the 2014 respondents than those in 2010 reported gang member use of military weapons, explosives, and equipment. More also reported gang members committed home invasions and armed robberies, and gang members currently in the military in their jurisdictions. Fewer thought their organization had a working relationship with military investigative authorities.
Insight intended to get students to think about what we teach what we teach at the University. The need to shift from High School, peer-infected decision making to stand-out-in-a-crowd, competitive workforce is the intended focus.
Communities everywhere have experienced the negative effects of street gangs. The presence of military-trained gang members (MTGMs) in the community increases the threat of violence to citizens. The problem addressed was the apparently growing presence of military-trained gang members in civilian communities in two southern states. The purpose was to determine the perceived presence of military-trained gang members and examine whether there was a relationship between the perceptions of gang investigators regarding the presence and the size of their jurisdictions, the proximity of their jurisdictions to a military installation, and the extent to which investigators participate in anti-gang activities. The Army, Army National Guard, and Army Reserve were identified as the largest sources of MTGMs and the Bloods, Crips, and Gangster Disciples were the gangs most represented. Military leaders should acknowledge the increase in gang-related crime and address the problems caused for both military and civilian communities without attempting to quantify the threat level. Military leadership should continuously examine activities of all suspected gang members for active gang affiliation for retention purposes while evaluating any gang affiliation for security clearances. Military Law Enforcement liaison for recruiters should develop effective communication with law enforcement agencies to assist with information sharing.
Technology advances have changed the way the average American communicates, plans his or her day, shops, drives, and does many other things. Technology has changed the way criminals, specifically gang members, live their lives as well. As gangs evolve, many adopt more of a business model. How does that affect the way law enforcement should investigate them?
You will get an overview of criminal communications options, actions, and interactions followed by a discussion of how law enforcement – mostly gang cops – can and do respond. Ideas on how to engage, assist, or even thwart the detection of such activity will be provided. The use of metaphors to explain how technology functions often helps the not-so-literate grasp the concepts we will discuss – an impromptu brainstorming session on how that works will likely occur.
An initial look at an alternative to internships that seeks to provide experience producing reports, networking opportunities, and exposure to the professions studied. This initiative was launched in response to new information regarding DHS employee education preparation, an increased interest in teaching to increase critical and creative thinking, and a limit on available internships. Students engage in individually-graded group assignments, submit and resubmit reviewed work, and selected reports and summaries are identified as able to be submitted to official agencies and organizations.
The identification process for Domestic Extremists requires considering many indicators. Recently released research indicates examining the mix of behavioral indicators such as personal connections, ideology, travel, and training may prove beneficial in determining the existence of an individual’s extremist views. The presentation suggests using these indicators not as a checklist but as a type of scale to help analysts determine priorities for research and investigation as resources become available.
The presentation will summarize some of the well-known issues with youth gang members, address challenges to the community when gang members stay in the gang into adulthood, examine some of the challenges with advanced, adult gang members, and recommend some community responses.
A tool to remind audience members that loud cell phones are annoying, disrespectful, and rude . . .
This one has a twist at the end - designed to ask for silence but allow for input via text-messaging like with polleverywhere.com
Gabbidon examined perceptions of criminal justice students in a security administration class, asking reasons for taking the course, knowledge regarding the security field, their career objective, and whether they considered working in the security field. He later asked whether their interest in working in the security field had decreased, increased, or remained the same, whether their respect for the field decreased, increased, or remained the same, and how they would rate the course in comparison to other criminal justice courses they had taken. This research was replicated to determine differences in perceptions of security administration by current criminal justice students.
Keywords: private security, security administration, homeland security education, criminal justice courses, teaching security
Abstract: With the growing presence of criminal street gang members in the United States, communities everywhere are experiencing the damaging impact of their criminal behavior. A 2011 report by the National Gang Intelligence Center reported the number of gang members in the United States was conservatively estimated at 1.4 million. As these gang members evolve, are they using our nation’s colleges and universities to educate themselves? How will that affect our communities? This paper reports results of a survey of college students and campus police regarding their perception of the presence of gang members on their campus. Less than one in four students agreed there was a gang problem in the community around their campus, while two of three of the police respondents agreed with the statement. Students and police agreed in similar percentages that there was a gang problem within the campus community. At least half of both students and police thought gang members were responsible for less than 10% of crime on campus. About two of three students and police reported less than 10% of the students were active gang members. The Bloods, Crips, and Gangster Disciples were the top three gangs in the campus community for both groups. Drugs crimes, Assaults, assorted Weapons crimes, Robberies and Sexual Assaults were reported as gang-related crimes.
Keywords: gang activity in college, street gangs in university, percent of students having gang association, gangs in college, gangs in universities, college gangs.
This research study was designed to describe characteristics and perceptions of members of two Gang Investigators' Associations and to examine whether a relationship existed between the perceptions of gang investigators regarding the presence of MTGMs in their jurisdictions and the size of the gang investigators’ jurisdiction (i.e., county size, number of officers employed), the extent to which the gang investigators participate in anti-gang activities, the proximity of the gang investigators’ jurisdiction to a military installation (from survey and computed), time spent in anti-gang activities, age of investigator, and military installation size. The Military Gang Perception Questionnaire (MGPQ) (Smith, 2010), was used to address the goals of the study. A few of the questions paralleled a prior survey by the Florida Department of Law Enforcement (FDLE) (2007). The data and results of this study will be published and discussed elsewhere for academic and training purposes without openly identifying the source of information per an agreement between the author and the association board of directors.
Presentation for 2011 Southern Criminal Justice Association Meeting, Nashville, TN
Distinguishing Gangs, OrganizedCrime, and TerrorismCarter F. Smith & Jeffrey P. Rush,Austin Peay State University
Presentation for 2011 Southern Criminal Justice Association Meeting, Nashville, TN
Flash Gang: a social media connection such as Twitter is used to invite participants to a time and location, they do something like robbery or assault, and they split up. George Knox, NGCRC, June 15, 2011
Presentation for 2011 Southern Criminal Justice Association Meeting, Nashville, TN
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. What do we know?
Young folks can’t remember life without cell
phones, CDs or an email address.
Many gang members are a part of this generation.
As gangs evolve, they take on more of a
business model than they had when they
started.
This affects the way we should investigate them.
2
4. Overview
Mobile telephone & text messaging
Traditional instant messaging
Web based sites & text/voice/video messaging
Open source intelligence
Convergence/virtual communication
Evidentiary considerations
Legal considerations
Future vision
4
5. Disclaimer 3G2
Based on the coining and development
of the phrase Third Generation Street Gangs by
John P. Sullivan and Dr. Robert Bunker
Compiled from the listed references by the Gangfighters Network – www.Gangfighters.net
The technology identified in this presentation may
not be used by all gang members in all locations. It
will be used by a few 1st Gen gangs, many 2nd Gen
gangs, and most 3rd Gen gangs.
None of the information presented herein should
be mistaken for an endorsement of methods,
applications, or techniques used.
5
8. flash banging
"smash and grab“
create diversion
smash window of
○ jewelry store
○ fur/leather store
take what they can grab
in seconds they are gone
8
9. In the News
Groups of youth using text messaging and
social media to gather at specified
locations
primarily on Chicago’s South Side
robbers attack people with pepper spray
also been reported in Los Angeles,
Philadelphia and Washington D.C.
9
10. May 12, 2004 Dallas
Almost 3 dozen people arrested for street fight.
Fight arranged via Internet chat room.
Two gangs arranged time to meet.
Gang members identified and arrested with aid
of digital video.
'Some of them actually signed in with their true
names, so that helped us identify people.'
10
11. April 19, 2011 – Los Angeles
Man shot in head after 'Gang inspired' flash mob trash Venice
Beach
Many involved dressed in gang attire and tattoos.
Victim shot in head and side.
Message on Twitter: ‘Venice beach bball ct going up tomorrow.’
LAPD called for reinforcements as crowd, clearly including gang
members, swelled.
Six to eight shots rang out at 6.30pm
Victim ran into alley before collapsing.
11
12. April 2011 - Washington, D.C.
20 youths outside G-Star Raw clothing store
filed in together, brushing past customers
marched directly to shelves of expensive designer
jeans and racks of high-end shirts
sorted through selections for their sizes and
tucked them under their arms, behaving like
customers
suddenly made for exit, before police
suspects stole estimated $20,000 in merchandise
12
13. June 4, 2011 - Chicago
Police arrested 7 of the 15-20 suspects
across the street from Northwestern
University on East Chicago Avenue.
One suspect hit male victim with baseball
bat. Several offenders punched and kicked
him.
Right after attack, 2d man robbed by 5-6
nearby.
13
14. Of 129 retailers, primarily national store
chains, 94.5 percent said they were
victimized by organized criminals in the
past year.
84.8 percent said the problem has only
worsened in the past three years.
High percentages aren't entirely due to
flash mob crime, but they are contributing.
14
15. Bureau of Justice Statistics – stalking
Technology (e-mail, IM, GPS & spyware)
used to harass 1 in 4 stalking victims.
about 1.2 million victims.
Law enforcement remains under-
equipped..
Victims have mixed feelings about police
response.
15
17. APP: Application Short for ‘application program’.
(Broadly, an app is often a self-contained environment for
performing some well-defined task such as ‘word processing’)
20. Sprint/Nextel
•1 to a group
at once
•all-digital,
secure
•U.S., Canada,
Mexico and
other
countries
20
21. AT&T Wireless (formerly Cingular Wireless)
Up to 2000
contacts can be
stored with up
to four numbers
within each
contact.
“VoiceClip,”
allows you to
record and
send a
message to up
to three people
without ringing
the telephone
21
22. Verizon Wireless
saves a copy of
the names,
phone
numbers, and
email
addresses
stored in your
phone.
view, print, add,
delete, and edit
your contacts
online.
22
23. Apple MobileMe
new email, contacts, and calendar
events over the air to all your devices
23
24. Should we be concerned?
Bulk purchases of cell phones
Sold at a loss to create a
market for real profit maker
more call time
Middlemen deactivates lock
so they can be used on other services
Recent court actions may change, but there is
still a degree of anonymity
24
30. Mobile Phone Text messaging
At the end of 2011, 6 billion mobile
subscriptions
Equivalent to 87 percent of the world
population
huge increase from 5.4 billion in 2010
○ and 4.7 billion in 2009.
30
31. Mobile Phone Text messaging
Text Messaging (aka SMS-Short Message
Service)
An alphanumeric message sent to
a mobile phone, typed using
○ Your phone keypad
○ Another form of interface (computer)
Allows short text messages to be
sent and received on a mobile phone
31
40. Twitter
Is a free website designed to provide the exchange of public
content in the form of 140 characters messages sent from the
web interface or from a user’s phone.
Users may have a public or private account, and choose to
view the 140 character messages of other Twitter users,
which range from businesses (such as Comcast, Whole
Foods, etc.) to political figures (BarackObama) to celebrities
or popular accounts (Oprah or Britney Spears) to normal
people.
Twitter conducts most correspondence via email, so PLEASE
INCLUDE A VALID EMAIL ADDRESS so we may contact you.
To contact us, email: lawenforcement@twitter.com
40
41. Twitbanging
A 15-year old member of The New Dons
claims that twitter is useful for coordinating
violent activities, and that they often use new
lingo that would be difficult for anyone but
insiders to understand.
Still, the NYPD has been successful in
stopping attacks before they happen by
keeping track of the online activities of gang
members.
http://help.twitter.com/entries/41949-guidelines-for-
law-enforcement
41
44. 04/14/2008 Gang threats go high-tech
YouTube.com videos threatening more than two
dozen Salinas youths
questions about free speech and authorities' responsibility to
protect potential victims.
Modern iteration of way gang members have been
threatening each other forever.
We have watched (threats) happen for years ... ever
since spray paint and walls were invented," Salinas
police Cmdr. Kelly McMillin said.
44
50. Anonymous Proxy Servers
Hide your IP address (think fake or alias ID)
Prevent unauthorized access to your computer
Effectively hide any information about you
Don’t let anyone know that you are surfing through a
proxy
Used for
Web searching
Web-Mail (MSN Hot Mail, Yahoo mail),
Web-chat rooms,
FTP archives, etc.
50
56. Profile on a social network site
75% of online adults 18-24
57% of online adults 25-34
30% of online adults 35-44
19% of online 45 to 54 year olds
10% of online 55 to 64 year olds
7% of online adults 65 and older
56
58. Portable Info/Commo
PDA
Personal digital assistants are handheld computers that were originally designed as
personal organizers, but became much more versatile over the years. (Wikipedia)
PPC
the Pocket PC is "a handheld device that enables users to store and retrieve e-mail,
contacts, appointments, tasks, play multimedia files, games, exchange text messages
(Microsoft, according to Wikipedia)
Smartphone
a full-featured mobile phone with personal computer like functionality. Most smartphones
are cellphones that support full featured email capabilities with the functionality of a
complete personal organizer. (Wikipedia)
iPhone/iPod
The iPhone is a multimedia and Internet-enabled quad-band GSM EDGE-supported
mobile phone designed and sold by Apple Inc. The iPhone's functions include those of a
camera phone and a multimedia player, in addition to text messaging and visual
voicemail. It also offers Internet services including e-mail, web browsing, and local Wi-Fi
connectivity. User input is accomplished via a multi-touch screen with virtual keyboard
and buttons. (Wikipedia)
59
59. Like a Dumb Terminal . . .
USB/iPod/SD Card used as hard-drive
Traceless on host comp
May not remember/know to include in
warrant
Major IT security breaches . . .
Web-based data storage
May not remember/know to include in
warrant
Major IT security breaches . . .
60
64. Private Browsing No pages will be added to the list
of sites in the History menu.
Nothing you enter into text boxes
on websites or the Search bar and
no Cookies will be saved.
No passwords will be automatically
filled in during Private Browsing
and no new passwords will be
saved.
No files you download will remain
in the list in the Downloads window
after you turn off Private Browsing..
The cache stores temporary files
such as web pages, images and
other online media. All of the items
that get added to the cache will be
deleted when you turn off Private
Browsing.
65
65. Augmented Reality
live direct or indirect view of a physical
real-world environment whose elements
are augmented by virtual computer-
generated imagery
66
67. Voice Over Internet Protocol
(VoIP)
Three main technologies used for mobile VoIP:
UMA - The Unlicensed Mobile Access, designed to allow VoIP to run
over the GSM cellular backbone
SIP - The standard used by most VoIP services, and now being
implemented on mobile handsets
Skype Protocol and Barablu - a proprietary modified version of Jabber
68
68. (partially) Concealing identity
1. Enter your mobile number
2. Enter your friend's mobile
number
3. Call the local jaxtr number
and talk
69
69. (partially) Concealing identity
Complete IP voice
and messaging
platform
Services allow calls
via mobile, landline,
computer or Wi-Fi
vice
70
70. Anonymize your phone call
Caller ID displays the number
you want them to see, change
the tone of your voice and
keep a backup
Unblocks blocked and
restricted calls with any cell
phone.
71
72. Google Voice
Call screening - Announce Forwarding phones - Add Conference calling - Join
and screen callers phones - decide which ring people into a single call
Listen in - before taking call Voicemail transcripts - Call record - Record calls
Block calls Read what your voicemail and store them online
SMS - Send, receive, store says Call switch - Switch phones
Place calls - Call US Listen to voicemail - Online during a call
numbers for free or from your phone Mobile site - View your
Taking calls - Answer on Notifications - Via email or inbox from your mobile
any of your phones SMS GOOG-411 - Check
Phone routing - Phones Personalize greeting - Vary directory assistance
ring based on who calls greetings by caller Manage groups - Set
Share voicemail - Forward preferences by group
or download voicemails
73
74. Telephone Number Identification with Caller ID
lookups.
You can also click on an area code and it will give
you a list of the cities and their exchange numbers.
http://tnid.us/
75
75. Mass-communication
Delivered anywhere within the CONUS.
NO long distance charges
Message can be up to 45 seconds
Delivered to people, voice mail, answering
machines
Import existing contact list or manually enter
Status reports and call histories available on line
76
78. Preparation
Plan (equipment, collection material, warrant,
etc.) to collect power source, peripheral
accessories
Document as-is, as able (fungible evidence)
Know who needs to be contacted to probe
further – don’t delay
79
79. Seizing Evidence
First Responder
Training
First Responder
Handling
Handheld Device
Evidence
80
80. Legal considerations
Compiled by the Gangfighters Network
– www.Gangfighters.net
81. Legal considerations
Locate/assemble available expertise
Include translation (geekspeak-English)
needs (prosecutor/judge/jury)
Coordination with forensics/lab in
advance – familiarity
Coordination with prosecutor in advance
– familiarity
82
82. i-Warrants
Include “uncommon” technical terms in
affidavit.
Describe role of the device/technology in
the offense
Justify your need to search off site
Treat contents as evidence AND
intelligence
83
83. i-Warrants
If you can logically tie potential
evidence to the crime, and can
articulate the need in the warrant, you
should be able to access more areas
where evidence exists.
(think passwords, cases, cables, synchronizing)
84
84. 5th Circuit's opinion - January
2007
"the permissible scope of a search incident
to a lawful arrest extends to containers
found on an arrestee's person."
A cell phone is an electronic "container," in
that it stores information that may have
great evidentiary value (and that might
easily be destroyed or corrupted).
85
85. Search of cell phones cannot be
justified as search incident to lawful
arrest.
The justification is the need for officer
safety and to preserve evidence...
A text message on a cell phone presents
no danger of physical harm to the
arresting officers or others.
86
86. Searching through information stored on a
cell phone is analogous to a search of a
sealed letter, which requires a warrant.
The search of text messages does not
constitute an inventory search.
The purpose of an inventory search is to document
property in an arrested person's possession to
protect property from theft and the police from
lawsuits for lost or stolen property.
87
87. the basic principle still applies:
incident to a person's arrest, a
mobile phone or beeper may be
briefly inspected to see if it
contains evidence relevant to the
charge for which the defendant
has been arrested.
88
89. Two ways to send money with PayPal Mobile:
By text message:
Text message to 729725 (or PAYPAL) with the amount and the phone
number to send it to. For example, to send $10.00 USD to the phone
number 4150001234, text:
Send 10 to 4150001234
By phone call:
Call 1-800-4PAYPAL to send money by voice or keypad. You’ll be asked
for your PIN to login, and then simply follow the prompts to send money.
90. boku
No registration.
Get goods faster.
No cards.
Just you and your phone.
No problem.
Safe and secure, always.
91