SlideShare a Scribd company logo
Charles “Lucky” Luciano


 Let me walk you through this concept…
•   Transnational organized crime involves the planning and execution of illicit business ventures by
    groups or networks of individuals working in more than one country. These criminal groups use
    systematic violence and corruption to achieve their goals. Crimes commonly include money
    laundering; human smuggling; cyber crime; and trafficking of humans, drugs, weapons, endangered
    species, body parts, or nuclear material.

•   Transnational crime ring activities weaken economies and financial systems and undermine
    democracy. These networks often prey on governments that are not powerful enough to oppose
    them, prospering on illegal activities, such as drug trafficking, that bring them immense profits. In
    carrying out illegal activities, they upset the peace and stability of nations worldwide, often using
    bribery, violence, or terror to achieve their goals.

•   The political turmoil of the 21st century and advances in technology make transnational crime a
    concern for the United States. Increased travel and trade and advances in telecommunications and
    computer technology have had the unintended effect of providing avenues for the rapid expansion
    of transnational organized crime activities. Policing objectives in the United States must extend
    beyond national borders to seek out and target this type of crime. Only through international
    collaboration and information exchange can the United States develop effective protocol and
    policies for countering these crimes and mount a serious opposition.


National Institute of Justice: www.nij.gov
• Think of transnational crime like a kraken and
  the countries it attacks like “ships of state.”

• Krakens come from the deep to attack ships; if
  the kraken can get enough tentacles around
  the ship it can drag it to the bottom.
Transnational crime takes advantage of the fact that the
 illicit supply and demand for a product will be filled by
                      criminal groups.

    Once logistical commodity “tentacles” have been               Well
established it is no surprise that groups will often fight to    stated
                   solidify their position.                        Mr.
                                                                Luciano!
• When Transnational Organized Crime (TOC) networks
  emerge there is often a disruption of law
  enforcement activities due to the fact that the
  network may be working on strategies that can be
  executed by embedded personnel; this will often
  overwhelm the ability of different criminal justice
  systems to proactively address issues.
You want to take me on
  before your crew even
 knows who the captain
is…hey great! Good luck!
UNITED STATES: Weapon                      MEXICO: Drugs
                        "There's no such
                         thing as good
                         money or bad
                         money. There's
                          just money."
• All tentacles “feed” the
  same “mouth.”

• Tentacles can be cut off at
  the tip, but to stop it from
  feeding the mouth it must
  be severed.

• The dactylus (suckers) of
  the tentacles may continue
  to “mark” the economy.
• Think of the dactylus of the tentacle as the
  areas that are “gripped” by the tentacles…

• These areas provide “traction” which enables
  the tentacle to maintain cohesion over a given
  area.
• “Cooked in ink” refers to a dish in which the ink of the squid is used to cook it. As criminal
  activities “blot” the area local, state and federal law enforcement must agree on the same
  “recipe” to “cook” the kraken.
•   Transnational crime is tentacular in mode of expansion.
•   Transnational Criminal Organizations (TOC) are like krakens; countries are “ships of state.”
•   The tentacles will try to drag the ships of state to the bottom.
•   Each tentacle may represent a distribution route used to feed the mouth.
•   Not all tentacles are viewed by “captains” (state governments) as dangerous.
•   The dactylus provide criminal cohesion over the length of the tentacle.
•   Tractional Cohesion Points (TCPs) are areas of control which allow the tentacle to “adhere.”
•   Corrupt officials may aid in smoothing out TCPs.
•   The more TCPs the stronger the hold on a given geographic area.
•   Using a “dot-to- dot” matrix TCPs will start to trace invisible tentacles.
•   TCPs are autogenic if adhesion is strong enough.
•   Cutting off the tip of a single tentacle will not address all TCPs.
•   En sue tinta is a strategy in which the “ink” (criminal activity) is used to cook the kraken.
•   En sue tinta must be a recipe followed by local, state and federal law enforcement.
•   En sue tinta is the dish that is served…will the captain and crew eat the dish?
THE END



  Bye!

More Related Content

What's hot

Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
monde24836
 
Economic Crimes
Economic CrimesEconomic Crimes
Economic Crimes
Sarrah Kaviwala
 
Interpol
InterpolInterpol
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
University of Dhaka
 
Cartographic school
Cartographic schoolCartographic school
Cartographic school
sebis1
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
Francis Postrado
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualHarve Abella
 
Prelim_CLJ2_Human_Rights_Education.ppt
Prelim_CLJ2_Human_Rights_Education.pptPrelim_CLJ2_Human_Rights_Education.ppt
Prelim_CLJ2_Human_Rights_Education.ppt
Darwin11
 
Theories of crimes
Theories of crimesTheories of crimes
Theories of crimes
jovi saquido
 
2. criminal justice system 2.ppt
2. criminal justice system 2.ppt2. criminal justice system 2.ppt
2. criminal justice system 2.ppt
renjomarbaltazar1
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
Kethgay Otanio
 
Organize Crime Groups
Organize Crime GroupsOrganize Crime Groups
Organize Crime Groups
Charlie Agravante Jr.
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
guest278081
 
Crime detection
Crime detectionCrime detection
Crime detection
MuhammadMobeen18
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - CriminologyDiana Dianot
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
jaredplata
 
Crime against property
Crime against propertyCrime against property
Crime against property
Cheldy S, Elumba-Pableo
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crimeAndrew Novak
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
PatrickMarzAvelin
 

What's hot (20)

Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Economic Crimes
Economic CrimesEconomic Crimes
Economic Crimes
 
Interpol
InterpolInterpol
Interpol
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
Cartographic school
Cartographic schoolCartographic school
Cartographic school
 
CRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and OverviewCRIMINOLOGY: An Introduction and Overview
CRIMINOLOGY: An Introduction and Overview
 
Philippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation ManualPhilippine National Police Criminal Investigation Manual
Philippine National Police Criminal Investigation Manual
 
Prelim_CLJ2_Human_Rights_Education.ppt
Prelim_CLJ2_Human_Rights_Education.pptPrelim_CLJ2_Human_Rights_Education.ppt
Prelim_CLJ2_Human_Rights_Education.ppt
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Theories of crimes
Theories of crimesTheories of crimes
Theories of crimes
 
2. criminal justice system 2.ppt
2. criminal justice system 2.ppt2. criminal justice system 2.ppt
2. criminal justice system 2.ppt
 
brief information about International criminal police organization
 brief information about International criminal police organization brief information about International criminal police organization
brief information about International criminal police organization
 
Organize Crime Groups
Organize Crime GroupsOrganize Crime Groups
Organize Crime Groups
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Crime detection
Crime detectionCrime detection
Crime detection
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Fundamentals of investigation
Fundamentals of investigationFundamentals of investigation
Fundamentals of investigation
 
Crime against property
Crime against propertyCrime against property
Crime against property
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crime
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 

Viewers also liked

Transnational crimes
Transnational crimesTransnational crimes
Transnational crimesMike Do-oma
 
Transnational Organized Crime
Transnational Organized CrimeTransnational Organized Crime
Transnational Organized Crime
WorldFuture2015
 
AI 2014 Q1 Barometer
AI 2014 Q1 BarometerAI 2014 Q1 Barometer
AI 2014 Q1 Barometer
QIMA
 
1920's terms through prohibition
1920's terms through prohibition1920's terms through prohibition
1920's terms through prohibitionTerryl Meador
 
Organized crime
Organized crimeOrganized crime
Organized crime
katyemerson4
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global CommunityMark Wojnarek
 
Paraguay Transnational Crime
Paraguay Transnational CrimeParaguay Transnational Crime
Paraguay Transnational CrimeMichael Scadden
 
Socom indonesia scenario_jtrs
Socom indonesia scenario_jtrsSocom indonesia scenario_jtrs
Socom indonesia scenario_jtrs
Flavio Bernardotti
 
Asymmetric warfare
Asymmetric warfareAsymmetric warfare
Asymmetric warfare
Teeranan
 
Globalization and Organized Crime
Globalization and Organized CrimeGlobalization and Organized Crime
Globalization and Organized Crime
Rodrigo R. Coutinho
 
Warfare
WarfareWarfare
Warfare
Usman Arshad
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crimeTraciwm
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
Lex Pit
 
Causes of war
Causes of warCauses of war
Causes of war
andeedalal
 
Indonesia presentation (English)
Indonesia presentation (English)Indonesia presentation (English)
Indonesia presentation (English)guest4adb25
 

Viewers also liked (20)

Transnational crimes
Transnational crimesTransnational crimes
Transnational crimes
 
Transnational Organized Crime
Transnational Organized CrimeTransnational Organized Crime
Transnational Organized Crime
 
AI 2014 Q1 Barometer
AI 2014 Q1 BarometerAI 2014 Q1 Barometer
AI 2014 Q1 Barometer
 
1920's terms through prohibition
1920's terms through prohibition1920's terms through prohibition
1920's terms through prohibition
 
Indiaaaaaaa
IndiaaaaaaaIndiaaaaaaa
Indiaaaaaaa
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global Community
 
Paraguay Transnational Crime
Paraguay Transnational CrimeParaguay Transnational Crime
Paraguay Transnational Crime
 
Socom indonesia scenario_jtrs
Socom indonesia scenario_jtrsSocom indonesia scenario_jtrs
Socom indonesia scenario_jtrs
 
Asymmetric warfare
Asymmetric warfareAsymmetric warfare
Asymmetric warfare
 
Globalization and Organized Crime
Globalization and Organized CrimeGlobalization and Organized Crime
Globalization and Organized Crime
 
Warfare
WarfareWarfare
Warfare
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crime
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Causes of war
Causes of warCauses of war
Causes of war
 
Terorismo
TerorismoTerorismo
Terorismo
 
Indonesia presentation (English)
Indonesia presentation (English)Indonesia presentation (English)
Indonesia presentation (English)
 

Similar to Transnational crime

Globalization, Borders & Immigration
Globalization, Borders & ImmigrationGlobalization, Borders & Immigration
Globalization, Borders & Immigration
Burma Democratic Concern (BDC)
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era Paper
Tiffany Sandoval
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
RoleenPearlPanal
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15difordham
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
jackiewalcutt
 
Modern Day Slavery: Human Trafficking
Modern Day Slavery: Human TraffickingModern Day Slavery: Human Trafficking
Modern Day Slavery: Human Trafficking
ultrapoet5992
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
Felipe Prado
 
report in economic Global Governance .pptx
report in economic Global Governance .pptxreport in economic Global Governance .pptx
report in economic Global Governance .pptx
JhobieGajana
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
Peter Ludlow
 
On Human Trafficking, Migration, and Sex Work
On Human Trafficking, Migration, and Sex WorkOn Human Trafficking, Migration, and Sex Work
On Human Trafficking, Migration, and Sex Work
immigrantdoll
 

Similar to Transnational crime (12)

Globalization, Borders & Immigration
Globalization, Borders & ImmigrationGlobalization, Borders & Immigration
Globalization, Borders & Immigration
 
Term Paper
Term PaperTerm Paper
Term Paper
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era Paper
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
 
Chapter14
Chapter14Chapter14
Chapter14
 
Modern Day Slavery: Human Trafficking
Modern Day Slavery: Human TraffickingModern Day Slavery: Human Trafficking
Modern Day Slavery: Human Trafficking
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
report in economic Global Governance .pptx
report in economic Global Governance .pptxreport in economic Global Governance .pptx
report in economic Global Governance .pptx
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
On Human Trafficking, Migration, and Sex Work
On Human Trafficking, Migration, and Sex WorkOn Human Trafficking, Migration, and Sex Work
On Human Trafficking, Migration, and Sex Work
 

More from Jon Nakapalau, CHSO, CPO

The shepherds watch
The shepherds watchThe shepherds watch
The shepherds watch
Jon Nakapalau, CHSO, CPO
 
Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Jon Nakapalau, CHSO, CPO
 
Maslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismMaslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismJon Nakapalau, CHSO, CPO
 
Terrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationTerrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationJon Nakapalau, CHSO, CPO
 

More from Jon Nakapalau, CHSO, CPO (20)

Leadership
 Leadership Leadership
Leadership
 
The shepherds watch
The shepherds watchThe shepherds watch
The shepherds watch
 
how not to plan for an emergency
how not to plan for an emergencyhow not to plan for an emergency
how not to plan for an emergency
 
Access cards and physical security
Access cards and physical securityAccess cards and physical security
Access cards and physical security
 
The paradox of identity
The paradox of identityThe paradox of identity
The paradox of identity
 
Five things i really miss ii
Five things i really miss iiFive things i really miss ii
Five things i really miss ii
 
5 things i really miss
5 things i really miss5 things i really miss
5 things i really miss
 
Sustainability and National Stability
Sustainability and National StabilitySustainability and National Stability
Sustainability and National Stability
 
Kafkaesque security policy
Kafkaesque security policyKafkaesque security policy
Kafkaesque security policy
 
Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)
 
Clausewitz and terrorism
Clausewitz and terrorismClausewitz and terrorism
Clausewitz and terrorism
 
Maslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismMaslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorism
 
Globalization and national security
Globalization and national securityGlobalization and national security
Globalization and national security
 
Lockout tagout
Lockout tagoutLockout tagout
Lockout tagout
 
Terrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationTerrorist infiltration through conflict migration
Terrorist infiltration through conflict migration
 
Physical security integration
Physical security integrationPhysical security integration
Physical security integration
 
Physical security integration
Physical security integrationPhysical security integration
Physical security integration
 
Security Checklist
Security ChecklistSecurity Checklist
Security Checklist
 
Cpted And The Three Little Pigs
Cpted And The Three Little PigsCpted And The Three Little Pigs
Cpted And The Three Little Pigs
 
Common Physical Security Mistakes
Common Physical Security MistakesCommon Physical Security Mistakes
Common Physical Security Mistakes
 

Transnational crime

  • 1.
  • 2. Charles “Lucky” Luciano Let me walk you through this concept…
  • 3. Transnational organized crime involves the planning and execution of illicit business ventures by groups or networks of individuals working in more than one country. These criminal groups use systematic violence and corruption to achieve their goals. Crimes commonly include money laundering; human smuggling; cyber crime; and trafficking of humans, drugs, weapons, endangered species, body parts, or nuclear material. • Transnational crime ring activities weaken economies and financial systems and undermine democracy. These networks often prey on governments that are not powerful enough to oppose them, prospering on illegal activities, such as drug trafficking, that bring them immense profits. In carrying out illegal activities, they upset the peace and stability of nations worldwide, often using bribery, violence, or terror to achieve their goals. • The political turmoil of the 21st century and advances in technology make transnational crime a concern for the United States. Increased travel and trade and advances in telecommunications and computer technology have had the unintended effect of providing avenues for the rapid expansion of transnational organized crime activities. Policing objectives in the United States must extend beyond national borders to seek out and target this type of crime. Only through international collaboration and information exchange can the United States develop effective protocol and policies for countering these crimes and mount a serious opposition. National Institute of Justice: www.nij.gov
  • 4.
  • 5. • Think of transnational crime like a kraken and the countries it attacks like “ships of state.” • Krakens come from the deep to attack ships; if the kraken can get enough tentacles around the ship it can drag it to the bottom.
  • 6. Transnational crime takes advantage of the fact that the illicit supply and demand for a product will be filled by criminal groups. Once logistical commodity “tentacles” have been Well established it is no surprise that groups will often fight to stated solidify their position. Mr. Luciano!
  • 7. • When Transnational Organized Crime (TOC) networks emerge there is often a disruption of law enforcement activities due to the fact that the network may be working on strategies that can be executed by embedded personnel; this will often overwhelm the ability of different criminal justice systems to proactively address issues.
  • 8. You want to take me on before your crew even knows who the captain is…hey great! Good luck!
  • 9. UNITED STATES: Weapon MEXICO: Drugs "There's no such thing as good money or bad money. There's just money."
  • 10. • All tentacles “feed” the same “mouth.” • Tentacles can be cut off at the tip, but to stop it from feeding the mouth it must be severed. • The dactylus (suckers) of the tentacles may continue to “mark” the economy.
  • 11. • Think of the dactylus of the tentacle as the areas that are “gripped” by the tentacles… • These areas provide “traction” which enables the tentacle to maintain cohesion over a given area.
  • 12.
  • 13. • “Cooked in ink” refers to a dish in which the ink of the squid is used to cook it. As criminal activities “blot” the area local, state and federal law enforcement must agree on the same “recipe” to “cook” the kraken.
  • 14. Transnational crime is tentacular in mode of expansion. • Transnational Criminal Organizations (TOC) are like krakens; countries are “ships of state.” • The tentacles will try to drag the ships of state to the bottom. • Each tentacle may represent a distribution route used to feed the mouth. • Not all tentacles are viewed by “captains” (state governments) as dangerous. • The dactylus provide criminal cohesion over the length of the tentacle. • Tractional Cohesion Points (TCPs) are areas of control which allow the tentacle to “adhere.” • Corrupt officials may aid in smoothing out TCPs. • The more TCPs the stronger the hold on a given geographic area. • Using a “dot-to- dot” matrix TCPs will start to trace invisible tentacles. • TCPs are autogenic if adhesion is strong enough. • Cutting off the tip of a single tentacle will not address all TCPs. • En sue tinta is a strategy in which the “ink” (criminal activity) is used to cook the kraken. • En sue tinta must be a recipe followed by local, state and federal law enforcement. • En sue tinta is the dish that is served…will the captain and crew eat the dish?
  • 15. THE END Bye!