Page 39 - Cyber Warnings - November 2015
P. 39
Good strategies in combating an organized crime
Milica Djekic
A modern organized crime appears as vitally dependent on cyber technologies. Today’s criminals
as many others worldwide use their computers, networks, mobile and landline phones to maintain
their communications. A good military practice suggests that in combating your enemy, you should
try to break down the entire connection between them. So, could we apply this approach in fighting
an organized crime or some other threats in our world? Through this article, we would discuss how
these strategies could be used in real-case scenarios.
An organized crime would include many individuals correlated with each other in committing a
criminal offence. These people operate as a well-managed group which would use emerging
technologies to maintain their communications. The information about their criminal network is
normally available after a careful investigation. The purpose of the entire investigation is to collect
the evidence as well as some intelligence on how criminals deal for real. These findings are
consequently used as clues during the court process.
Every investigation would lead to an arrest once all members of the organized crime group got
identified and the evidence about their criminal offences got collected. Sometimes it’s not that easy
to smash their group, because of many obstacles which could be correlated to them. For instance,
there could be many security concerns which could make difficulties to an arrest such as skillful
people with the firearms. The security requirements would seek an arrest to be obtained with the
minimum of risk to security officers.
In a reality, an organized crime group got vitally dependent on its communication lines. They could
be computers with the internet connections, mobile and landline phones. The possible real-case
scenario would suggest that the entire network can collapse if the connection between criminals got
smashed. In such a case, the entire group would be paralyzed and the future criminal offences
would get disabled. This can make an arrest somehow easier to security professionals. This idea
could be possibly used in combating terrorism, but we believe it should get examined by terrorism
experts.
About The Author
Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher from
Subotica, Serbia. She also serves as a Reviewer at the Journal of Computer
Sciences and Applications. She writes for Australian and American security
magazines. She is a volunteer with the American corner of Subotica as well as
a lecturer with the local engineering society.
39 Cyber Warnings E-Magazine – November 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide