SlideShare uma empresa Scribd logo
1 de 94
Baixar para ler offline
Carter F. Smith
carterfsmith@gmail.com
     615-656-3505
What do we know?
   Young folks can’t remember life without cell
    phones, CDs or an email address.
     Many gang members are a part of this generation.
   As gangs evolve, they take on more of a
    business model than they had when they
    started.
     This affects the way we should investigate them.


                                                         2
Focus on issues
from these perspectives
Information
Intelligence
Evidence
                          3
Overview
   Mobile telephone & text messaging
   Traditional instant messaging
   Web based sites & text/voice/video messaging
   Open source intelligence
   Convergence/virtual communication
   Evidentiary considerations
   Legal considerations
   Future vision
                                                   4
Disclaimer                                                           3G2
                                                  Based on the coining and development
                                             of the phrase Third Generation Street Gangs by
                                                 John P. Sullivan and Dr. Robert Bunker



                                          Compiled from the listed references by the Gangfighters Network – www.Gangfighters.net




   The technology identified in this presentation may
    not be used by all gang members in all locations. It
    will be used by a few 1st Gen gangs, many 2nd Gen
    gangs, and most 3rd Gen gangs.
   None of the information presented herein should
    be mistaken for an endorsement of methods,
    applications, or techniques used.
                                                                                                                      5
Flash Mob + Gang activity
  = Flash gangbanging
George Knox, NGCRC, June 15, 2011
flash banging
"smash    and grab“
  create diversion
  smash window of
   ○ jewelry store
   ○ fur/leather store
  take what they can grab
  in seconds they are gone
                              8
In the News
 Groups of youth using text messaging and
  social media to gather at specified
  locations
 primarily on Chicago’s South Side
 robbers attack people with pepper spray
 also been reported in Los Angeles,
  Philadelphia and Washington D.C.
                                             9
May 12, 2004 Dallas
   Almost 3 dozen people arrested for street fight.
   Fight arranged via Internet chat room.
   Two gangs arranged time to meet.
   Gang members identified and arrested with aid
    of digital video.
   'Some of them actually signed in with their true
    names, so that helped us identify people.'

                                                       10
April 19, 2011 – Los Angeles
   Man shot in head after 'Gang inspired' flash mob trash Venice
    Beach
   Many involved dressed in gang attire and tattoos.
   Victim shot in head and side.
   Message on Twitter: ‘Venice beach bball ct going up tomorrow.’
   LAPD called for reinforcements as crowd, clearly including gang
    members, swelled.
   Six to eight shots rang out at 6.30pm
   Victim ran into alley before collapsing.


                                                                      11
April 2011 - Washington, D.C.
   20 youths outside G-Star Raw clothing store
   filed in together, brushing past customers
   marched directly to shelves of expensive designer
    jeans and racks of high-end shirts
   sorted through selections for their sizes and
    tucked them under their arms, behaving like
    customers
   suddenly made for exit, before police
   suspects stole estimated $20,000 in merchandise
                                                        12
June 4, 2011 - Chicago
 Police arrested 7 of the 15-20 suspects
  across the street from Northwestern
  University on East Chicago Avenue.
 One suspect hit male victim with baseball
  bat. Several offenders punched and kicked
  him.
 Right after attack, 2d man robbed by 5-6
  nearby.
                                              13
 Of  129 retailers, primarily national store
  chains, 94.5 percent said they were
  victimized by organized criminals in the
  past year.
 84.8 percent said the problem has only
  worsened in the past three years.
 High percentages aren't entirely due to
  flash mob crime, but they are contributing.
                                            14
Bureau of Justice Statistics – stalking
  Technology  (e-mail, IM, GPS & spyware)
   used to harass 1 in 4 stalking victims.
    about 1.2 million victims.

  Law  enforcement remains under-
   equipped..
  Victims have mixed feelings about police
   response.
                                              15
16
APP: Application Short for ‘application program’.

(Broadly, an app is often a self-contained environment for
performing some well-defined task such as ‘word processing’)
Evidence considerations with
Mobile (Wireless) Telephones
Sprint/Nextel




                19
Sprint/Nextel

                •1 to a group
                at once
                •all-digital,
                secure
                •U.S., Canada,
                Mexico and
                other
                countries



                          20
AT&T Wireless (formerly Cingular Wireless)
                                        Up to 2000
                                         contacts can be
                                         stored with up
                                         to four numbers
                                         within each
                                         contact.
                                        “VoiceClip,”
                                         allows you to
                                         record and
                                         send a
                                         message to up
                                         to three people
                                         without ringing
                                         the telephone

                                                   21
Verizon Wireless
                    saves a copy of
                     the names,
                     phone
                     numbers, and
                     email
                     addresses
                     stored in your
                     phone.
                    view, print, add,
                     delete, and edit
                     your contacts
                     online.

                                  22
Apple MobileMe
   new email, contacts, and calendar
    events over the air to all your devices




                                              23
Should we be concerned?
   Bulk purchases of cell phones
   Sold at a loss to create a
    market for real profit maker
     more call time
 Middlemen deactivates lock
  so they can be used on other services
 Recent court actions may change, but there is
  still a degree of anonymity

                                                  24
boost




        25
Jump Mobile

              no monthly
              commitments,
              no long-term
              contracts,
              and no
              hidden fees


                       26
Evidence considerations with
Mobile (Phone) Text Messaging
28
29
Mobile Phone Text messaging
 At the end of 2011, 6 billion mobile
  subscriptions
 Equivalent to 87 percent of the world
  population
   huge increase from 5.4 billion in 2010
    ○ and 4.7 billion in 2009.
                                             30
Mobile Phone Text messaging
   Text Messaging (aka SMS-Short Message
    Service)
     An alphanumeric message sent to
     a mobile phone, typed using
     ○ Your phone keypad
     ○ Another form of interface (computer)
     Allows short text messages to be
     sent and received on a mobile phone
                                              31
Mobile Phone Text Messaging (w/o phone)




                                      32
Mobile Phone Text Messaging


                        Hey!
     Hey!




                               33
   http://www.webopedia.com/quick_ref/textmessageabbreviations.asp

                                                                      34
Web-based technology
Traditional instant messaging
(chat)
   AIM
   Yahoo
   MSN
   ICQ
   Google Talk
   Trillian
   Skype
                                36
Web-based Communications
Technology




                           37
one billion users by end of summer




                               38
39
Twitter
 Is a free website designed to provide the exchange of public
  content in the form of 140 characters messages sent from the
  web interface or from a user’s phone.
 Users may have a public or private account, and choose to
  view the 140 character messages of other Twitter users,
  which range from businesses (such as Comcast, Whole
  Foods, etc.) to political figures (BarackObama) to celebrities
  or popular accounts (Oprah or Britney Spears) to normal
  people.
 Twitter conducts most correspondence via email, so PLEASE
  INCLUDE A VALID EMAIL ADDRESS so we may contact you.
  To contact us, email: lawenforcement@twitter.com
                                                             40
Twitbanging
 A 15-year old member of The New Dons
  claims that twitter is useful for coordinating
  violent activities, and that they often use new
  lingo that would be difficult for anyone but
  insiders to understand.
 Still, the NYPD has been successful in
  stopping attacks before they happen by
  keeping track of the online activities of gang
  members.
   http://help.twitter.com/entries/41949-guidelines-for-
    law-enforcement


                                                            41
42
Mocospace




gangsta-colb


               43
04/14/2008 Gang threats go high-tech
 YouTube.com videos threatening more than two
   dozen Salinas youths
     questions about free speech and authorities' responsibility to
      protect potential victims.
   Modern iteration of way gang members have been
    threatening each other forever.
   We have watched (threats) happen for years ... ever
    since spray paint and walls were invented," Salinas
    police Cmdr. Kelly McMillin said.
                                                                       44
YouTube




          45
YouTube




          46
YouTube




          47
More video




             48
Gaming conversations




                       49
Anonymous Proxy Servers
   Hide your IP address (think fake or alias ID)
   Prevent unauthorized access to your computer
   Effectively hide any information about you
   Don’t let anyone know that you are surfing through a
    proxy
   Used for
       Web searching
       Web-Mail (MSN Hot Mail, Yahoo mail),
       Web-chat rooms,
       FTP archives, etc.
                                                           50
Stealth Surfing (anonymous proxy
servers/software)




                                   51
Open Source Intelligence
53
http://www.spy.appspot.com/


                              54
55
Profile on a social network site

 75% of online adults 18-24
 57% of online adults 25-34
 30% of online adults 35-44
 19% of online 45 to 54 year olds
 10% of online 55 to 64 year olds
 7% of online adults 65 and older


                                       56
Portable Technology
Portable Info/Commo
   PDA
     Personal digital assistants are handheld computers that were originally designed as
       personal organizers, but became much more versatile over the years. (Wikipedia)
   PPC
     the Pocket PC is "a handheld device that enables users to store and retrieve e-mail,
       contacts, appointments, tasks, play multimedia files, games, exchange text messages
       (Microsoft, according to Wikipedia)
   Smartphone
     a full-featured mobile phone with personal computer like functionality. Most smartphones
       are cellphones that support full featured email capabilities with the functionality of a
       complete personal organizer. (Wikipedia)
   iPhone/iPod
     The iPhone is a multimedia and Internet-enabled quad-band GSM EDGE-supported
       mobile phone designed and sold by Apple Inc. The iPhone's functions include those of a
       camera phone and a multimedia player, in addition to text messaging and visual
       voicemail. It also offers Internet services including e-mail, web browsing, and local Wi-Fi
       connectivity. User input is accomplished via a multi-touch screen with virtual keyboard
       and buttons. (Wikipedia)
                                                                                                  59
Like a Dumb Terminal . . .
   USB/iPod/SD Card used as hard-drive
     Traceless on host comp
     May not remember/know to include in
      warrant
     Major IT security breaches . . .
   Web-based data storage
     May not remember/know to include in
      warrant
     Major IT security breaches . . .
                                            60
www.mojopac.com




                  61
Mini-data storage
   iPod/MP3 players
   SD data cards
     Message typed/recorded/embedded
   SIM cards




                                        62
Remote monitoring




                    63
Web-based storage




                    64
Private Browsing      No pages will be added to the list
                       of sites in the History menu.
                      Nothing you enter into text boxes
                       on websites or the Search bar and
                       no Cookies will be saved.
                      No passwords will be automatically
                       filled in during Private Browsing
                       and no new passwords will be
                       saved.
                      No files you download will remain
                       in the list in the Downloads window
                       after you turn off Private Browsing..
                      The cache stores temporary files
                       such as web pages, images and
                       other online media. All of the items
                       that get added to the cache will be
                       deleted when you turn off Private
                       Browsing.

                                                          65
Augmented Reality
   live direct or indirect view of a physical
    real-world environment whose elements
    are augmented by virtual computer-
    generated imagery




                                                 66
Convergence/Virtual technology
Voice Over Internet Protocol
(VoIP)
Three main technologies used for mobile VoIP:
 UMA - The Unlicensed Mobile Access, designed to allow VoIP to run
  over the GSM cellular backbone
 SIP - The standard used by most VoIP services, and now being
  implemented on mobile handsets
 Skype Protocol and Barablu - a proprietary modified version of Jabber




                                                                    68
(partially) Concealing identity
 1. Enter your mobile number
 2. Enter your friend's mobile
    number
 3. Call the local jaxtr number
    and talk


                                  69
(partially) Concealing identity
    Complete IP voice
     and messaging
     platform
    Services allow calls
     via mobile, landline,
     computer or Wi-Fi
     vice

                                  70
Anonymize your phone call
 Caller ID displays the number
  you want them to see, change
  the tone of your voice and
  keep a backup
 Unblocks blocked and
  restricted calls with any cell
  phone.

                                   71
72
Google Voice
   Call screening - Announce           Forwarding phones - Add         Conference calling - Join
    and screen callers                   phones - decide which ring       people into a single call
   Listen in - before taking call      Voicemail transcripts -         Call record - Record calls
   Block calls                          Read what your voicemail         and store them online
   SMS - Send, receive, store           says                            Call switch - Switch phones
   Place calls - Call US               Listen to voicemail - Online     during a call
    numbers for free                     or from your phone              Mobile site - View your
   Taking calls - Answer on            Notifications - Via email or     inbox from your mobile
    any of your phones                   SMS                             GOOG-411 - Check
   Phone routing - Phones              Personalize greeting - Vary      directory assistance
    ring based on who calls              greetings by caller             Manage groups - Set
                                        Share voicemail - Forward        preferences by group
                                         or download voicemails

                                                                                               73
Phonebooth.com




                 74
   Telephone Number Identification with Caller ID
    lookups.
   You can also click on an area code and it will give
    you a list of the cities and their exchange numbers.




   http://tnid.us/
                                                      75
Mass-communication
   Delivered anywhere within the CONUS.
   NO long distance charges
   Message can be up to 45 seconds
   Delivered to people, voice mail, answering
    machines
   Import existing contact list or manually enter
   Status reports and call histories available on line

                                                          76
Mass-communication




                     77
Evidentiary considerations
Preparation
 Plan (equipment, collection material, warrant,
  etc.) to collect power source, peripheral
  accessories
 Document as-is, as able (fungible evidence)
 Know who needs to be contacted to probe
  further – don’t delay

                                              79
Seizing Evidence
    First Responder
     Training
                       First Responder
                          Handling
                       Handheld Device
                           Evidence



                                         80
Legal considerations
      Compiled by the Gangfighters Network
            – www.Gangfighters.net
Legal considerations
   Locate/assemble available expertise
     Include translation (geekspeak-English)
     needs (prosecutor/judge/jury)
 Coordination with forensics/lab in
  advance – familiarity
 Coordination with prosecutor in advance
  – familiarity

                                                82
i-Warrants
  Include “uncommon” technical terms in
   affidavit.
  Describe role of the device/technology in
   the offense
  Justify your need to search off site
  Treat contents as evidence AND
   intelligence

                                               83
i-Warrants
 If you can logically tie potential
 evidence to the crime, and can
 articulate the need in the warrant, you
 should be able to access more areas
 where evidence exists.
  (think passwords, cases, cables, synchronizing)


                                                     84
5th Circuit's opinion - January
2007
    "the permissible scope of a search incident
     to a lawful arrest extends to containers
     found on an arrestee's person."
    A cell phone is an electronic "container," in
     that it stores information that may have
     great evidentiary value (and that might
     easily be destroyed or corrupted).

                                                     85
Search of cell phones cannot be
justified as search incident to lawful
arrest.
 The justification is the need for officer
  safety and to preserve evidence...
 A text message on a cell phone presents
  no danger of physical harm to the
  arresting officers or others.
                                              86
 Searching  through information stored on a
  cell phone is analogous to a search of a
  sealed letter, which requires a warrant.
 The search of text messages does not
  constitute an inventory search.
   The purpose of an inventory search is to document
   property in an arrested person's possession to
   protect property from theft and the police from
   lawsuits for lost or stolen property.
                                                     87
the basic principle still applies:
 incident  to a person's arrest, a
  mobile phone or beeper may be
  briefly inspected to see if it
  contains evidence relevant to the
  charge for which the defendant
  has been arrested.
                                      88
Future vision
Two ways to send money with PayPal Mobile:

                                                    By text message:
  Text message to 729725 (or PAYPAL) with the amount and the phone
   number to send it to. For example, to send $10.00 USD to the phone
                                             number 4150001234, text:
                       Send 10 to 4150001234
                                                          By phone call:
Call 1-800-4PAYPAL to send money by voice or keypad. You’ll be asked
for your PIN to login, and then simply follow the prompts to send money.
boku
   No registration.
     Get goods faster.
   No cards.
     Just you and your phone.
   No problem.
     Safe and secure, always.


                                 91
Facebook Credits: The World's First Global Currency?




                                                  93
Future vision
    Application               Technology
        Identity theft          Wifi/WiMax
        Bank fraud              Bluetooth & Mobile
        Money laundering         developments
        Drug Trafficking        Anonymous
                                  interaction
                                 Steganography

                                                       94
Carter F. Smith
carterfsmith@gmail.com
     615-656-3505

Mais conteúdo relacionado

Mais procurados

2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)Felipe Prado
 
2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)Felipe Prado
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting ExperienceGeoff Peterson
 
Digital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary AnalysisDigital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary AnalysisJames Allen-Robertson
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of AuthenticityFuture Agenda
 

Mais procurados (9)

2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)2600 v14 n2 (summer 1997)
2600 v14 n2 (summer 1997)
 
Mobile input lukew
Mobile input lukewMobile input lukew
Mobile input lukew
 
2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)2600 v13 n1 (spring 1996)
2600 v13 n1 (spring 1996)
 
The Mobile Recruiting Experience
The Mobile Recruiting ExperienceThe Mobile Recruiting Experience
The Mobile Recruiting Experience
 
Mobile Marketing Slides
Mobile Marketing SlidesMobile Marketing Slides
Mobile Marketing Slides
 
The Mobile Revolution
The Mobile RevolutionThe Mobile Revolution
The Mobile Revolution
 
Digital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary AnalysisDigital Culture Industry: Digital Documentary Analysis
Digital Culture Industry: Digital Documentary Analysis
 
Future Agenda Future Of Authenticity
Future Agenda   Future Of AuthenticityFuture Agenda   Future Of Authenticity
Future Agenda Future Of Authenticity
 
Berkley Law Writing Competition
Berkley Law Writing CompetitionBerkley Law Writing Competition
Berkley Law Writing Competition
 

Semelhante a Mobile Phone Evidence in Gang Investigations

Caller Anonymity Frustrates Subscribers
Caller Anonymity Frustrates SubscribersCaller Anonymity Frustrates Subscribers
Caller Anonymity Frustrates SubscribersTNSIMarketing
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Calvin And Hobbes College Essay
Calvin And Hobbes College EssayCalvin And Hobbes College Essay
Calvin And Hobbes College EssayDawn Romero
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)Felipe Prado
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
(c) BedfordSt. Martins bedfordstmartins.com 1-457-62096-0 .docx
(c) BedfordSt. Martins  bedfordstmartins.com 1-457-62096-0 .docx(c) BedfordSt. Martins  bedfordstmartins.com 1-457-62096-0 .docx
(c) BedfordSt. Martins bedfordstmartins.com 1-457-62096-0 .docxkatherncarlyle
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Mass communication and technology
Mass communication and technologyMass communication and technology
Mass communication and technologyRohit Choudhary
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)AnnualMeeting09_Pittis, Carolyn ( Harpercollins)
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)bisg
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
History of new media - Imran Farooq
History of new media - Imran FarooqHistory of new media - Imran Farooq
History of new media - Imran FarooqImran Farooq
 
Media Literacy (Information Era)
Media Literacy (Information Era)Media Literacy (Information Era)
Media Literacy (Information Era)Pauline Sharry
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 

Semelhante a Mobile Phone Evidence in Gang Investigations (20)

Caller Anonymity Frustrates Subscribers
Caller Anonymity Frustrates SubscribersCaller Anonymity Frustrates Subscribers
Caller Anonymity Frustrates Subscribers
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Calvin And Hobbes College Essay
Calvin And Hobbes College EssayCalvin And Hobbes College Essay
Calvin And Hobbes College Essay
 
2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)2600 v12 n4 (winter 1995)
2600 v12 n4 (winter 1995)
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
(c) BedfordSt. Martins bedfordstmartins.com 1-457-62096-0 .docx
(c) BedfordSt. Martins  bedfordstmartins.com 1-457-62096-0 .docx(c) BedfordSt. Martins  bedfordstmartins.com 1-457-62096-0 .docx
(c) BedfordSt. Martins bedfordstmartins.com 1-457-62096-0 .docx
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Mass communication and technology
Mass communication and technologyMass communication and technology
Mass communication and technology
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)AnnualMeeting09_Pittis, Carolyn ( Harpercollins)
AnnualMeeting09_Pittis, Carolyn ( Harpercollins)
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
History of new media - Imran Farooq
History of new media - Imran FarooqHistory of new media - Imran Farooq
History of new media - Imran Farooq
 
Evolution of recruiting
Evolution of recruitingEvolution of recruiting
Evolution of recruiting
 
Evolution of recruiting
Evolution of recruitingEvolution of recruiting
Evolution of recruiting
 
Media Literacy (Information Era)
Media Literacy (Information Era)Media Literacy (Information Era)
Media Literacy (Information Era)
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 

Mais de Carter F. Smith, J.D., Ph.D.

Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperCarter F. Smith, J.D., Ph.D.
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...Carter F. Smith, J.D., Ph.D.
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Carter F. Smith, J.D., Ph.D.
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Carter F. Smith, J.D., Ph.D.
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Carter F. Smith, J.D., Ph.D.
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...Carter F. Smith, J.D., Ph.D.
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Carter F. Smith, J.D., Ph.D.
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Carter F. Smith, J.D., Ph.D.
 

Mais de Carter F. Smith, J.D., Ph.D. (20)

APA Manual 7th Edition - prerelease essentials
APA Manual 7th Edition -  prerelease essentialsAPA Manual 7th Edition -  prerelease essentials
APA Manual 7th Edition - prerelease essentials
 
The Hounds
The HoundsThe Hounds
The Hounds
 
Street gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaperStreet gangs terrorists and outlaw bikers smith-harms withpaper
Street gangs terrorists and outlaw bikers smith-harms withpaper
 
Military trained gang members in the volunteer state- four year follow-up wi...
Military trained gang members in the volunteer state-  four year follow-up wi...Military trained gang members in the volunteer state-  four year follow-up wi...
Military trained gang members in the volunteer state- four year follow-up wi...
 
Success tips for (my) classes
Success tips for (my) classesSuccess tips for (my) classes
Success tips for (my) classes
 
James Earl Hitchcox
James Earl HitchcoxJames Earl Hitchcox
James Earl Hitchcox
 
Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...Current and emerging trends in the private security industry and the need for...
Current and emerging trends in the private security industry and the need for...
 
Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...Gang investigators' perceptions of military trained gang members in the south...
Gang investigators' perceptions of military trained gang members in the south...
 
Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!Forget Internships - Bring Employers and Their Work into the Classroom!
Forget Internships - Bring Employers and Their Work into the Classroom!
 
Domestic Terrorism in the Next Eleven
Domestic Terrorism in the Next ElevenDomestic Terrorism in the Next Eleven
Domestic Terrorism in the Next Eleven
 
12 steps to_id-dt
12 steps to_id-dt12 steps to_id-dt
12 steps to_id-dt
 
Gangs and the military
Gangs and the military Gangs and the military
Gangs and the military
 
All grown up handouts
All grown up   handoutsAll grown up   handouts
All grown up handouts
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Security administration in the classroom more challenging when it’s not as ...
Security administration in the classroom   more challenging when it’s not as ...Security administration in the classroom   more challenging when it’s not as ...
Security administration in the classroom more challenging when it’s not as ...
 
Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...Gang member undergrads what are gang members doing in our colleges and univer...
Gang member undergrads what are gang members doing in our colleges and univer...
 
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
Gang Investigators' Perceptions of Military-Trained Gang Members in the Sout...
 
Gang terroroc scja2011
Gang terroroc scja2011Gang terroroc scja2011
Gang terroroc scja2011
 
Flash gangs scja2011
Flash gangs scja2011Flash gangs scja2011
Flash gangs scja2011
 

Último

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Último (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Mobile Phone Evidence in Gang Investigations

  • 2. What do we know?  Young folks can’t remember life without cell phones, CDs or an email address.  Many gang members are a part of this generation.  As gangs evolve, they take on more of a business model than they had when they started.  This affects the way we should investigate them. 2
  • 3. Focus on issues from these perspectives Information Intelligence Evidence 3
  • 4. Overview  Mobile telephone & text messaging  Traditional instant messaging  Web based sites & text/voice/video messaging  Open source intelligence  Convergence/virtual communication  Evidentiary considerations  Legal considerations  Future vision 4
  • 5. Disclaimer 3G2 Based on the coining and development of the phrase Third Generation Street Gangs by John P. Sullivan and Dr. Robert Bunker Compiled from the listed references by the Gangfighters Network – www.Gangfighters.net  The technology identified in this presentation may not be used by all gang members in all locations. It will be used by a few 1st Gen gangs, many 2nd Gen gangs, and most 3rd Gen gangs.  None of the information presented herein should be mistaken for an endorsement of methods, applications, or techniques used. 5
  • 6. Flash Mob + Gang activity = Flash gangbanging
  • 7. George Knox, NGCRC, June 15, 2011
  • 8. flash banging "smash and grab“  create diversion  smash window of ○ jewelry store ○ fur/leather store  take what they can grab  in seconds they are gone 8
  • 9. In the News  Groups of youth using text messaging and social media to gather at specified locations  primarily on Chicago’s South Side  robbers attack people with pepper spray  also been reported in Los Angeles, Philadelphia and Washington D.C. 9
  • 10. May 12, 2004 Dallas  Almost 3 dozen people arrested for street fight.  Fight arranged via Internet chat room.  Two gangs arranged time to meet.  Gang members identified and arrested with aid of digital video.  'Some of them actually signed in with their true names, so that helped us identify people.' 10
  • 11. April 19, 2011 – Los Angeles  Man shot in head after 'Gang inspired' flash mob trash Venice Beach  Many involved dressed in gang attire and tattoos.  Victim shot in head and side.  Message on Twitter: ‘Venice beach bball ct going up tomorrow.’  LAPD called for reinforcements as crowd, clearly including gang members, swelled.  Six to eight shots rang out at 6.30pm  Victim ran into alley before collapsing. 11
  • 12. April 2011 - Washington, D.C.  20 youths outside G-Star Raw clothing store  filed in together, brushing past customers  marched directly to shelves of expensive designer jeans and racks of high-end shirts  sorted through selections for their sizes and tucked them under their arms, behaving like customers  suddenly made for exit, before police  suspects stole estimated $20,000 in merchandise 12
  • 13. June 4, 2011 - Chicago  Police arrested 7 of the 15-20 suspects across the street from Northwestern University on East Chicago Avenue.  One suspect hit male victim with baseball bat. Several offenders punched and kicked him.  Right after attack, 2d man robbed by 5-6 nearby. 13
  • 14.  Of 129 retailers, primarily national store chains, 94.5 percent said they were victimized by organized criminals in the past year.  84.8 percent said the problem has only worsened in the past three years.  High percentages aren't entirely due to flash mob crime, but they are contributing. 14
  • 15. Bureau of Justice Statistics – stalking  Technology (e-mail, IM, GPS & spyware) used to harass 1 in 4 stalking victims.  about 1.2 million victims.  Law enforcement remains under- equipped..  Victims have mixed feelings about police response. 15
  • 16. 16
  • 17. APP: Application Short for ‘application program’. (Broadly, an app is often a self-contained environment for performing some well-defined task such as ‘word processing’)
  • 18. Evidence considerations with Mobile (Wireless) Telephones
  • 20. Sprint/Nextel •1 to a group at once •all-digital, secure •U.S., Canada, Mexico and other countries 20
  • 21. AT&T Wireless (formerly Cingular Wireless)  Up to 2000 contacts can be stored with up to four numbers within each contact.  “VoiceClip,” allows you to record and send a message to up to three people without ringing the telephone 21
  • 22. Verizon Wireless  saves a copy of the names, phone numbers, and email addresses stored in your phone.  view, print, add, delete, and edit your contacts online. 22
  • 23. Apple MobileMe  new email, contacts, and calendar events over the air to all your devices 23
  • 24. Should we be concerned?  Bulk purchases of cell phones  Sold at a loss to create a market for real profit maker  more call time  Middlemen deactivates lock so they can be used on other services  Recent court actions may change, but there is still a degree of anonymity 24
  • 25. boost 25
  • 26. Jump Mobile no monthly commitments, no long-term contracts, and no hidden fees 26
  • 27. Evidence considerations with Mobile (Phone) Text Messaging
  • 28. 28
  • 29. 29
  • 30. Mobile Phone Text messaging  At the end of 2011, 6 billion mobile subscriptions  Equivalent to 87 percent of the world population  huge increase from 5.4 billion in 2010 ○ and 4.7 billion in 2009. 30
  • 31. Mobile Phone Text messaging  Text Messaging (aka SMS-Short Message Service)  An alphanumeric message sent to a mobile phone, typed using ○ Your phone keypad ○ Another form of interface (computer)  Allows short text messages to be sent and received on a mobile phone 31
  • 32. Mobile Phone Text Messaging (w/o phone) 32
  • 33. Mobile Phone Text Messaging Hey! Hey! 33
  • 34. http://www.webopedia.com/quick_ref/textmessageabbreviations.asp 34
  • 36. Traditional instant messaging (chat)  AIM  Yahoo  MSN  ICQ  Google Talk  Trillian  Skype 36
  • 38. one billion users by end of summer 38
  • 39. 39
  • 40. Twitter  Is a free website designed to provide the exchange of public content in the form of 140 characters messages sent from the web interface or from a user’s phone.  Users may have a public or private account, and choose to view the 140 character messages of other Twitter users, which range from businesses (such as Comcast, Whole Foods, etc.) to political figures (BarackObama) to celebrities or popular accounts (Oprah or Britney Spears) to normal people.  Twitter conducts most correspondence via email, so PLEASE INCLUDE A VALID EMAIL ADDRESS so we may contact you. To contact us, email: lawenforcement@twitter.com 40
  • 41. Twitbanging  A 15-year old member of The New Dons claims that twitter is useful for coordinating violent activities, and that they often use new lingo that would be difficult for anyone but insiders to understand.  Still, the NYPD has been successful in stopping attacks before they happen by keeping track of the online activities of gang members.  http://help.twitter.com/entries/41949-guidelines-for- law-enforcement 41
  • 42. 42
  • 44. 04/14/2008 Gang threats go high-tech  YouTube.com videos threatening more than two dozen Salinas youths  questions about free speech and authorities' responsibility to protect potential victims.  Modern iteration of way gang members have been threatening each other forever.  We have watched (threats) happen for years ... ever since spray paint and walls were invented," Salinas police Cmdr. Kelly McMillin said. 44
  • 45. YouTube 45
  • 46. YouTube 46
  • 47. YouTube 47
  • 50. Anonymous Proxy Servers  Hide your IP address (think fake or alias ID)  Prevent unauthorized access to your computer  Effectively hide any information about you  Don’t let anyone know that you are surfing through a proxy  Used for  Web searching  Web-Mail (MSN Hot Mail, Yahoo mail),  Web-chat rooms,  FTP archives, etc. 50
  • 51. Stealth Surfing (anonymous proxy servers/software) 51
  • 53. 53
  • 55. 55
  • 56. Profile on a social network site  75% of online adults 18-24  57% of online adults 25-34  30% of online adults 35-44  19% of online 45 to 54 year olds  10% of online 55 to 64 year olds  7% of online adults 65 and older 56
  • 58. Portable Info/Commo  PDA  Personal digital assistants are handheld computers that were originally designed as personal organizers, but became much more versatile over the years. (Wikipedia)  PPC  the Pocket PC is "a handheld device that enables users to store and retrieve e-mail, contacts, appointments, tasks, play multimedia files, games, exchange text messages (Microsoft, according to Wikipedia)  Smartphone  a full-featured mobile phone with personal computer like functionality. Most smartphones are cellphones that support full featured email capabilities with the functionality of a complete personal organizer. (Wikipedia)  iPhone/iPod  The iPhone is a multimedia and Internet-enabled quad-band GSM EDGE-supported mobile phone designed and sold by Apple Inc. The iPhone's functions include those of a camera phone and a multimedia player, in addition to text messaging and visual voicemail. It also offers Internet services including e-mail, web browsing, and local Wi-Fi connectivity. User input is accomplished via a multi-touch screen with virtual keyboard and buttons. (Wikipedia) 59
  • 59. Like a Dumb Terminal . . .  USB/iPod/SD Card used as hard-drive  Traceless on host comp  May not remember/know to include in warrant  Major IT security breaches . . .  Web-based data storage  May not remember/know to include in warrant  Major IT security breaches . . . 60
  • 61. Mini-data storage  iPod/MP3 players  SD data cards  Message typed/recorded/embedded  SIM cards 62
  • 64. Private Browsing  No pages will be added to the list of sites in the History menu.  Nothing you enter into text boxes on websites or the Search bar and no Cookies will be saved.  No passwords will be automatically filled in during Private Browsing and no new passwords will be saved.  No files you download will remain in the list in the Downloads window after you turn off Private Browsing..  The cache stores temporary files such as web pages, images and other online media. All of the items that get added to the cache will be deleted when you turn off Private Browsing.
 65
  • 65. Augmented Reality  live direct or indirect view of a physical real-world environment whose elements are augmented by virtual computer- generated imagery 66
  • 67. Voice Over Internet Protocol (VoIP) Three main technologies used for mobile VoIP:  UMA - The Unlicensed Mobile Access, designed to allow VoIP to run over the GSM cellular backbone  SIP - The standard used by most VoIP services, and now being implemented on mobile handsets  Skype Protocol and Barablu - a proprietary modified version of Jabber 68
  • 68. (partially) Concealing identity 1. Enter your mobile number 2. Enter your friend's mobile number 3. Call the local jaxtr number and talk 69
  • 69. (partially) Concealing identity  Complete IP voice and messaging platform  Services allow calls via mobile, landline, computer or Wi-Fi vice 70
  • 70. Anonymize your phone call  Caller ID displays the number you want them to see, change the tone of your voice and keep a backup  Unblocks blocked and restricted calls with any cell phone. 71
  • 71. 72
  • 72. Google Voice  Call screening - Announce  Forwarding phones - Add  Conference calling - Join and screen callers phones - decide which ring people into a single call  Listen in - before taking call  Voicemail transcripts -  Call record - Record calls  Block calls Read what your voicemail and store them online  SMS - Send, receive, store says  Call switch - Switch phones  Place calls - Call US  Listen to voicemail - Online during a call numbers for free or from your phone  Mobile site - View your  Taking calls - Answer on  Notifications - Via email or inbox from your mobile any of your phones SMS  GOOG-411 - Check  Phone routing - Phones  Personalize greeting - Vary directory assistance ring based on who calls greetings by caller  Manage groups - Set  Share voicemail - Forward preferences by group or download voicemails 73
  • 74. Telephone Number Identification with Caller ID lookups.  You can also click on an area code and it will give you a list of the cities and their exchange numbers.  http://tnid.us/ 75
  • 75. Mass-communication  Delivered anywhere within the CONUS.  NO long distance charges  Message can be up to 45 seconds  Delivered to people, voice mail, answering machines  Import existing contact list or manually enter  Status reports and call histories available on line 76
  • 78. Preparation  Plan (equipment, collection material, warrant, etc.) to collect power source, peripheral accessories  Document as-is, as able (fungible evidence)  Know who needs to be contacted to probe further – don’t delay 79
  • 79. Seizing Evidence  First Responder Training First Responder Handling Handheld Device Evidence 80
  • 80. Legal considerations Compiled by the Gangfighters Network – www.Gangfighters.net
  • 81. Legal considerations  Locate/assemble available expertise  Include translation (geekspeak-English) needs (prosecutor/judge/jury)  Coordination with forensics/lab in advance – familiarity  Coordination with prosecutor in advance – familiarity 82
  • 82. i-Warrants  Include “uncommon” technical terms in affidavit.  Describe role of the device/technology in the offense  Justify your need to search off site  Treat contents as evidence AND intelligence 83
  • 83. i-Warrants If you can logically tie potential evidence to the crime, and can articulate the need in the warrant, you should be able to access more areas where evidence exists.  (think passwords, cases, cables, synchronizing) 84
  • 84. 5th Circuit's opinion - January 2007  "the permissible scope of a search incident to a lawful arrest extends to containers found on an arrestee's person."  A cell phone is an electronic "container," in that it stores information that may have great evidentiary value (and that might easily be destroyed or corrupted). 85
  • 85. Search of cell phones cannot be justified as search incident to lawful arrest.  The justification is the need for officer safety and to preserve evidence...  A text message on a cell phone presents no danger of physical harm to the arresting officers or others. 86
  • 86.  Searching through information stored on a cell phone is analogous to a search of a sealed letter, which requires a warrant.  The search of text messages does not constitute an inventory search.  The purpose of an inventory search is to document property in an arrested person's possession to protect property from theft and the police from lawsuits for lost or stolen property. 87
  • 87. the basic principle still applies:  incident to a person's arrest, a mobile phone or beeper may be briefly inspected to see if it contains evidence relevant to the charge for which the defendant has been arrested. 88
  • 89. Two ways to send money with PayPal Mobile: By text message: Text message to 729725 (or PAYPAL) with the amount and the phone number to send it to. For example, to send $10.00 USD to the phone number 4150001234, text: Send 10 to 4150001234 By phone call: Call 1-800-4PAYPAL to send money by voice or keypad. You’ll be asked for your PIN to login, and then simply follow the prompts to send money.
  • 90. boku  No registration.  Get goods faster.  No cards.  Just you and your phone.  No problem.  Safe and secure, always. 91
  • 91.
  • 92. Facebook Credits: The World's First Global Currency? 93
  • 93. Future vision  Application  Technology  Identity theft  Wifi/WiMax  Bank fraud  Bluetooth & Mobile  Money laundering developments  Drug Trafficking  Anonymous interaction  Steganography 94