CARTELS SECTION 1 Overview 2 Various Gangs o 2a La Familia- Zetas o 2b FARC 3 How to Stop 4 Female Gangs 5 Native Amer. & Hawaiian Gangs 6 Pot Farms/houses 7 Pot Farms/houses o 7a General o 7b N. CA/S. OR 8 Psyops, Calculating 9 Cybercrime 10 New Mexico o 10a Introduction 12 Books 13 Links List See also o Borders/Tunnels
Cybercrime and Dark or Deep Web (CARTELS-9)
Cybercrime Networks Taylor and Francis online: Understanding How the Internet Facilitates Crime and Deviance. By Loretta J. Stalans and Mary A. Finn. Vol. 11 29 Jul 2016 https://www.tandfonline.com/doi/full/10.1080/15564886.2016.1211404 From: Journal Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance Excerpt: Cybercrime is crime that is mediated by networked technology (Wall, 2007 Wall, D. S. (2007). Cybercrime: ). Old crimes such as theft, fraud, and harassment find new forms in cyberspace and information technologies…. Unlawful behavior in some countries is tolerated and legal behavior in other countries, allowing offenders to choose jurisdictions for their websites that have the least harsh legal consequences. Moreover, maintaining anonymity or bogus identities during the commission of crimes is easier in virtual spaces than in real physical space. Apps, avatars, disposable devices, and the deep web—where search engines cannot detect websites due to an added layer of security—facilitate a concealment of criminal transactions, socialization into subcultures, and networking of those involved in illicit or nonconventional behavior. Specialized forums and chat rooms in cyberspace have created virtual spaces to network and to form trustworthy underground markets for illicit drugs, prostitution, and child pornography (e.g., Beech, Elliot, Birgden, & Findlater, 2008 Resources Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13, 216–228. doi:10.1016/j.avb.2008.03.007 [Crossref], [Web of Science ®], [Google Scholar] ; Lavorgna, 2014 Lavorgna, A. (2014). Internet-mediated drug trafficking: Towards a better understanding of new criminal dynamics. Trends in Organized Crime, 27, 250–270. doi:10.1007/s12117- 014-9226-8 [Crossref], [Google Scholar] ; Stalans & Finn, 2016 Stalans, L. J. & Finn, M. A. (2016). Consulting legal experts in the real and virtual world: Pimps’ and johns’ cultural schemas about strategies to avoid arrest and conviction. Deviant Behavior, 37(6), 644–664. doi:10.1080/01639625.2015.1060810 [Taylor & Francis Online], [Google Scholar] ) and ideological deviant groups to incite terrorism, engage in espionage, or engage in harmful health risks such as The transformation of crime in the information age. Malden, MA: Polity Press. [Google Scholar] Article: Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet David C. Pyrooz et al. Justice Quarterly Volume 32, 2015 - Issue 3 Published online: 18 Mar 2013 Article: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis Eric Rutger Leukfeldt et al. Deviant Behavior Volume 37, 2016 - Issue 3 Published online: 19 Jan 2016 Article: SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD Thomas J. Holt et al. Journal of Crime and Justice Volume 33, 2010 - Issue 2 Journal: Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Dark WEB: START HERE Wikipedia: Dark Web https://en.wikipedia.org/wiki/Dark_web Excerpt: The dark web is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web may be referred to as onionland, a reference to the network's top-level domain suffix .onion and the traffic anonymization technique of onion routing. https://en.wikipedia.org/wiki/Dark_web ARTICLES - LINKS AARP (2018/09/04) Is My Identity on the Dark Web? Deep within the internet is a secretive place where criminals buy and sell your private data. By Doug Shadel with Neil Wertheimer, AARP Bulletin, September 4, 2018 https://www.aarp.org/money/scams-fraud/info-2018/what-is-the-dark-web.html Durango Colorado Investigators Into Dark Web (2018) [article also in Police Abuse/Info-Colorado] https://durangoherald.com/articles/219599 Excerpt: Detective Josh Newman of Durango PD looks over dark web. Identity theft, child pornography among top targets for detectives. Forbes: (2016/06/28) The Dark Web is still a huge difficult problem https://www.forbes.com/sites/timsparapani/2016/06/28/the-dark-web-is-still-a- huge-difficult-problem/#3816568b65b1 Deep Web Sites dot com: (2017/06/19) Careless hack in Mexico reveals customers of NSO Group; A 1$ Billion Dollar Spyware Company https: //www dot deepweb-sites dot com/careless-hack-mexico-reveals- customers-nso-group-1-billion-dollar-spyware-company/ Have you ever heard about the NSO Group? The famous professional spyware maker group based in Israeli who sells them to government organizations around the globe. Lately they were been on the news due to the sophisticated iphone hacking tool which hacked the iphone with a single text message. But today the name came up when one of its customers in Mexico did the absolute sloppy way of hacking the phones of 15 journalists, human rights activists and few scientists. Updates: 2020/05/07 Cybercrime section moved from River Gold and added to Dark/Deep Web section; Page started 10/21/2018 possible repeat Taylor and Francis online: Understanding How the Internet Facilitates Crime and Deviance. By Loretta J. Stalans and Mary A. Finn. Vol. 11 29 Jul 2016 https://www.tandfonline.com/doi/full/10.1080/15564886.2016.1211404 From: Journal Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Volume 11, 2016 - Issue 4: How the Internet Facilitates Deviance Excerpt: Cybercrime is crime that is mediated by networked technology (Wall, 2007 Wall, D. S. (2007). Cybercrime: ). Old crimes such as theft, fraud, and harassment find new forms in cyberspace and information technologies…. Unlawful behavior in some countries is tolerated and legal behavior in other countries, allowing offenders to choose jurisdictions for their websites that have the least harsh legal consequences. Moreover, maintaining anonymity or bogus identities during the commission of crimes is easier in virtual spaces than in real physical space. Apps, avatars, disposable devices, and the deep web—where search engines cannot detect websites due to an added layer of security—facilitate a concealment of criminal transactions, socialization into subcultures, and networking of those involved in illicit or nonconventional behavior. Specialized forums and chat rooms in cyberspace have created virtual spaces to network and to form trustworthy underground markets for illicit drugs, prostitution, and child pornography (e.g., Beech, Elliot, Birgden, & Findlater, 2008 Resources Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The Internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13, 216–228. doi:10.1016/j.avb.2008.03.007 [Crossref], [Web of Science ®], [Google Scholar] ; Lavorgna, 2014 Lavorgna, A. (2014). Internet-mediated drug trafficking: Towards a better understanding of new criminal dynamics. Trends in Organized Crime, 27, 250–270. doi:10.1007/s12117- 014-9226-8 [Crossref], [Google Scholar] ; Stalans & Finn, 2016 Stalans, L. J. & Finn, M. A. (2016). Consulting legal experts in the real and virtual world: Pimps’ and johns’ cultural schemas about strategies to avoid arrest and conviction. Deviant Behavior, 37(6), 644–664. doi:10.1080/01639625.2015.1060810 [Taylor & Francis Online], [Google Scholar] ) and ideological deviant groups to incite terrorism, engage in espionage, or engage in harmful health risks such as The transformation of crime in the information age. Malden, MA: Polity Press. [Google Scholar] Article: Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet David C. Pyrooz et al. Justice Quarterly Volume 32, 2015 - Issue 3 Published online: 18 Mar 2013 Article: Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis Eric Rutger Leukfeldt et al. Deviant Behavior Volume 37, 2016 - Issue 3 Published online: 19 Jan 2016 Article: SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD Thomas J. Holt et al. Journal of Crime and Justice Volume 33, 2010 - Issue 2 Journal: Victims & Offenders An International Journal of Evidence-based Research, Policy, and Practice Updates: Page started 10/21/2018
Resources and Input Policing, Borders, Drugs, Cartels and System Corruption
Topics Topics