SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Transnational crime
Charles “Lucky” Luciano


 Let me walk you through this concept…
•   Transnational organized crime involves the planning and execution of illicit business ventures by
    groups or networks of individuals working in more than one country. These criminal groups use
    systematic violence and corruption to achieve their goals. Crimes commonly include money
    laundering; human smuggling; cyber crime; and trafficking of humans, drugs, weapons, endangered
    species, body parts, or nuclear material.

•   Transnational crime ring activities weaken economies and financial systems and undermine
    democracy. These networks often prey on governments that are not powerful enough to oppose
    them, prospering on illegal activities, such as drug trafficking, that bring them immense profits. In
    carrying out illegal activities, they upset the peace and stability of nations worldwide, often using
    bribery, violence, or terror to achieve their goals.

•   The political turmoil of the 21st century and advances in technology make transnational crime a
    concern for the United States. Increased travel and trade and advances in telecommunications and
    computer technology have had the unintended effect of providing avenues for the rapid expansion
    of transnational organized crime activities. Policing objectives in the United States must extend
    beyond national borders to seek out and target this type of crime. Only through international
    collaboration and information exchange can the United States develop effective protocol and
    policies for countering these crimes and mount a serious opposition.


National Institute of Justice: www.nij.gov
Transnational crime
• Think of transnational crime like a kraken and
  the countries it attacks like “ships of state.”

• Krakens come from the deep to attack ships; if
  the kraken can get enough tentacles around
  the ship it can drag it to the bottom.
Transnational crime takes advantage of the fact that the
 illicit supply and demand for a product will be filled by
                      criminal groups.

    Once logistical commodity “tentacles” have been               Well
established it is no surprise that groups will often fight to    stated
                   solidify their position.                        Mr.
                                                                Luciano!
• When Transnational Organized Crime (TOC) networks
  emerge there is often a disruption of law
  enforcement activities due to the fact that the
  network may be working on strategies that can be
  executed by embedded personnel; this will often
  overwhelm the ability of different criminal justice
  systems to proactively address issues.
You want to take me on
  before your crew even
 knows who the captain
is…hey great! Good luck!
UNITED STATES: Weapon                      MEXICO: Drugs
                        "There's no such
                         thing as good
                         money or bad
                         money. There's
                          just money."
• All tentacles “feed” the
  same “mouth.”

• Tentacles can be cut off at
  the tip, but to stop it from
  feeding the mouth it must
  be severed.

• The dactylus (suckers) of
  the tentacles may continue
  to “mark” the economy.
• Think of the dactylus of the tentacle as the
  areas that are “gripped” by the tentacles…

• These areas provide “traction” which enables
  the tentacle to maintain cohesion over a given
  area.
Transnational crime
• “Cooked in ink” refers to a dish in which the ink of the squid is used to cook it. As criminal
  activities “blot” the area local, state and federal law enforcement must agree on the same
  “recipe” to “cook” the kraken.
•   Transnational crime is tentacular in mode of expansion.
•   Transnational Criminal Organizations (TOC) are like krakens; countries are “ships of state.”
•   The tentacles will try to drag the ships of state to the bottom.
•   Each tentacle may represent a distribution route used to feed the mouth.
•   Not all tentacles are viewed by “captains” (state governments) as dangerous.
•   The dactylus provide criminal cohesion over the length of the tentacle.
•   Tractional Cohesion Points (TCPs) are areas of control which allow the tentacle to “adhere.”
•   Corrupt officials may aid in smoothing out TCPs.
•   The more TCPs the stronger the hold on a given geographic area.
•   Using a “dot-to- dot” matrix TCPs will start to trace invisible tentacles.
•   TCPs are autogenic if adhesion is strong enough.
•   Cutting off the tip of a single tentacle will not address all TCPs.
•   En sue tinta is a strategy in which the “ink” (criminal activity) is used to cook the kraken.
•   En sue tinta must be a recipe followed by local, state and federal law enforcement.
•   En sue tinta is the dish that is served…will the captain and crew eat the dish?
THE END



  Bye!

Contenu connexe

Tendances (20)

Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
Criminal investigation presentation
Criminal investigation presentationCriminal investigation presentation
Criminal investigation presentation
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crime
 
Organised crime
Organised crimeOrganised crime
Organised crime
 
INTERPOL
INTERPOLINTERPOL
INTERPOL
 
Criminology ppt by_waseem_i._khan
Criminology ppt by_waseem_i._khanCriminology ppt by_waseem_i._khan
Criminology ppt by_waseem_i._khan
 
International Crime
International CrimeInternational Crime
International Crime
 
1.1 what is crime
1.1 what is crime1.1 what is crime
1.1 what is crime
 
INTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAWINTRODUCTION TO CRIMINAL LAW
INTRODUCTION TO CRIMINAL LAW
 
Victimology
VictimologyVictimology
Victimology
 
Criminology Theories
Criminology TheoriesCriminology Theories
Criminology Theories
 
Victimology.pptx
Victimology.pptxVictimology.pptx
Victimology.pptx
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
 
Crime Prevention Basics
Crime Prevention BasicsCrime Prevention Basics
Crime Prevention Basics
 
Biological Theory of Crime
Biological Theory of CrimeBiological Theory of Crime
Biological Theory of Crime
 
International criminal police organization
International criminal police organizationInternational criminal police organization
International criminal police organization
 
Interpol
InterpolInterpol
Interpol
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 

En vedette

Transnational crimes
Transnational crimesTransnational crimes
Transnational crimesMike Do-oma
 
Transnational Organized Crime
Transnational Organized CrimeTransnational Organized Crime
Transnational Organized CrimeWorldFuture2015
 
Transnational crimes and terrorism
Transnational crimes and terrorismTransnational crimes and terrorism
Transnational crimes and terrorismAl Rajiv Carim
 
AI 2014 Q1 Barometer
AI 2014 Q1 BarometerAI 2014 Q1 Barometer
AI 2014 Q1 BarometerQIMA
 
1920's terms through prohibition
1920's terms through prohibition1920's terms through prohibition
1920's terms through prohibitionTerryl Meador
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global CommunityMark Wojnarek
 
Paraguay Transnational Crime
Paraguay Transnational CrimeParaguay Transnational Crime
Paraguay Transnational CrimeMichael Scadden
 
Asymmetric warfare
Asymmetric warfareAsymmetric warfare
Asymmetric warfareTeeranan
 
Globalization and Organized Crime
Globalization and Organized CrimeGlobalization and Organized Crime
Globalization and Organized CrimeRodrigo R. Coutinho
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crimeTraciwm
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 

En vedette (20)

Transnational crimes
Transnational crimesTransnational crimes
Transnational crimes
 
Transnational Organized Crime
Transnational Organized CrimeTransnational Organized Crime
Transnational Organized Crime
 
Transnational crimes and terrorism
Transnational crimes and terrorismTransnational crimes and terrorism
Transnational crimes and terrorism
 
AI 2014 Q1 Barometer
AI 2014 Q1 BarometerAI 2014 Q1 Barometer
AI 2014 Q1 Barometer
 
1920's terms through prohibition
1920's terms through prohibition1920's terms through prohibition
1920's terms through prohibition
 
Indiaaaaaaa
IndiaaaaaaaIndiaaaaaaa
Indiaaaaaaa
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Transnational Crime and the Global Community
Transnational Crime and the Global CommunityTransnational Crime and the Global Community
Transnational Crime and the Global Community
 
Paraguay Transnational Crime
Paraguay Transnational CrimeParaguay Transnational Crime
Paraguay Transnational Crime
 
Socom indonesia scenario_jtrs
Socom indonesia scenario_jtrsSocom indonesia scenario_jtrs
Socom indonesia scenario_jtrs
 
Asymmetric warfare
Asymmetric warfareAsymmetric warfare
Asymmetric warfare
 
Globalization and Organized Crime
Globalization and Organized CrimeGlobalization and Organized Crime
Globalization and Organized Crime
 
Warfare
WarfareWarfare
Warfare
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Cj 3901 transnational crime
Cj 3901 transnational crimeCj 3901 transnational crime
Cj 3901 transnational crime
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Causes of war
Causes of warCauses of war
Causes of war
 
Terorismo
TerorismoTerorismo
Terorismo
 

Similaire à Transnational crime

The Benefits Of Border Patrol
The Benefits Of Border PatrolThe Benefits Of Border Patrol
The Benefits Of Border PatrolMonica Carter
 
Essay On We Must End Illegal Immigration In The United States
Essay On We Must End Illegal Immigration In The United StatesEssay On We Must End Illegal Immigration In The United States
Essay On We Must End Illegal Immigration In The United StatesJen Cloud
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era PaperTiffany Sandoval
 
Border Security In Law Enforcement
Border Security In Law EnforcementBorder Security In Law Enforcement
Border Security In Law EnforcementJacqueline Thomas
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptxRoleenPearlPanal
 
Bad Leadership And The Us Border Patrol
Bad Leadership And The Us Border PatrolBad Leadership And The Us Border Patrol
Bad Leadership And The Us Border PatrolTracy Aldridge
 
What Is The Fourth Amendment Exception As It Pertains To...
What Is The Fourth Amendment Exception As It Pertains To...What Is The Fourth Amendment Exception As It Pertains To...
What Is The Fourth Amendment Exception As It Pertains To...Rikki Wright
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15difordham
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docxjackiewalcutt
 
Racism In America Chapter 1 Summary
Racism In America Chapter 1 SummaryRacism In America Chapter 1 Summary
Racism In America Chapter 1 SummaryKatrina Green
 
Modern Day Slavery: Human Trafficking
Modern Day Slavery: Human TraffickingModern Day Slavery: Human Trafficking
Modern Day Slavery: Human Traffickingultrapoet5992
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015monde24836
 

Similaire à Transnational crime (20)

Globalization, Borders & Immigration
Globalization, Borders & ImmigrationGlobalization, Borders & Immigration
Globalization, Borders & Immigration
 
The Benefits Of Border Patrol
The Benefits Of Border PatrolThe Benefits Of Border Patrol
The Benefits Of Border Patrol
 
Term Paper
Term PaperTerm Paper
Term Paper
 
Essay On We Must End Illegal Immigration In The United States
Essay On We Must End Illegal Immigration In The United StatesEssay On We Must End Illegal Immigration In The United States
Essay On We Must End Illegal Immigration In The United States
 
Community Policing Era Paper
Community Policing Era PaperCommunity Policing Era Paper
Community Policing Era Paper
 
Border Security In Law Enforcement
Border Security In Law EnforcementBorder Security In Law Enforcement
Border Security In Law Enforcement
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
Bad Leadership And The Us Border Patrol
Bad Leadership And The Us Border PatrolBad Leadership And The Us Border Patrol
Bad Leadership And The Us Border Patrol
 
What Is The Fourth Amendment Exception As It Pertains To...
What Is The Fourth Amendment Exception As It Pertains To...What Is The Fourth Amendment Exception As It Pertains To...
What Is The Fourth Amendment Exception As It Pertains To...
 
Role Of Customs And Border Protection
Role Of Customs And Border ProtectionRole Of Customs And Border Protection
Role Of Customs And Border Protection
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 
1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx1. Compare the similarities and differences between the external b.docx
1. Compare the similarities and differences between the external b.docx
 
Racism In America Chapter 1 Summary
Racism In America Chapter 1 SummaryRacism In America Chapter 1 Summary
Racism In America Chapter 1 Summary
 
Chapter14
Chapter14Chapter14
Chapter14
 
Modern Day Slavery: Human Trafficking
Modern Day Slavery: Human TraffickingModern Day Slavery: Human Trafficking
Modern Day Slavery: Human Trafficking
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Russian Organized Crime Essay
Russian Organized Crime EssayRussian Organized Crime Essay
Russian Organized Crime Essay
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
Essay About Organized Crime
Essay About Organized CrimeEssay About Organized Crime
Essay About Organized Crime
 
Border Patrol Nation Essay
Border Patrol Nation EssayBorder Patrol Nation Essay
Border Patrol Nation Essay
 

Plus de Jon Nakapalau, CHSO, CPO

Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Jon Nakapalau, CHSO, CPO
 
Maslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismMaslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismJon Nakapalau, CHSO, CPO
 
Terrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationTerrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationJon Nakapalau, CHSO, CPO
 

Plus de Jon Nakapalau, CHSO, CPO (20)

Leadership
 Leadership Leadership
Leadership
 
The shepherds watch
The shepherds watchThe shepherds watch
The shepherds watch
 
how not to plan for an emergency
how not to plan for an emergencyhow not to plan for an emergency
how not to plan for an emergency
 
Access cards and physical security
Access cards and physical securityAccess cards and physical security
Access cards and physical security
 
The paradox of identity
The paradox of identityThe paradox of identity
The paradox of identity
 
Five things i really miss ii
Five things i really miss iiFive things i really miss ii
Five things i really miss ii
 
5 things i really miss
5 things i really miss5 things i really miss
5 things i really miss
 
Sustainability and National Stability
Sustainability and National StabilitySustainability and National Stability
Sustainability and National Stability
 
Kafkaesque security policy
Kafkaesque security policyKafkaesque security policy
Kafkaesque security policy
 
Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)Pp biopharmaceutical security operations (bs os)
Pp biopharmaceutical security operations (bs os)
 
Clausewitz and terrorism
Clausewitz and terrorismClausewitz and terrorism
Clausewitz and terrorism
 
Maslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorismMaslow’s hierarchy of needs and terrorism
Maslow’s hierarchy of needs and terrorism
 
Globalization and national security
Globalization and national securityGlobalization and national security
Globalization and national security
 
Lockout tagout
Lockout tagoutLockout tagout
Lockout tagout
 
Terrorist infiltration through conflict migration
Terrorist infiltration through conflict migrationTerrorist infiltration through conflict migration
Terrorist infiltration through conflict migration
 
Physical security integration
Physical security integrationPhysical security integration
Physical security integration
 
Physical security integration
Physical security integrationPhysical security integration
Physical security integration
 
Security Checklist
Security ChecklistSecurity Checklist
Security Checklist
 
Cpted And The Three Little Pigs
Cpted And The Three Little PigsCpted And The Three Little Pigs
Cpted And The Three Little Pigs
 
Common Physical Security Mistakes
Common Physical Security MistakesCommon Physical Security Mistakes
Common Physical Security Mistakes
 

Transnational crime

  • 2. Charles “Lucky” Luciano Let me walk you through this concept…
  • 3. Transnational organized crime involves the planning and execution of illicit business ventures by groups or networks of individuals working in more than one country. These criminal groups use systematic violence and corruption to achieve their goals. Crimes commonly include money laundering; human smuggling; cyber crime; and trafficking of humans, drugs, weapons, endangered species, body parts, or nuclear material. • Transnational crime ring activities weaken economies and financial systems and undermine democracy. These networks often prey on governments that are not powerful enough to oppose them, prospering on illegal activities, such as drug trafficking, that bring them immense profits. In carrying out illegal activities, they upset the peace and stability of nations worldwide, often using bribery, violence, or terror to achieve their goals. • The political turmoil of the 21st century and advances in technology make transnational crime a concern for the United States. Increased travel and trade and advances in telecommunications and computer technology have had the unintended effect of providing avenues for the rapid expansion of transnational organized crime activities. Policing objectives in the United States must extend beyond national borders to seek out and target this type of crime. Only through international collaboration and information exchange can the United States develop effective protocol and policies for countering these crimes and mount a serious opposition. National Institute of Justice: www.nij.gov
  • 5. • Think of transnational crime like a kraken and the countries it attacks like “ships of state.” • Krakens come from the deep to attack ships; if the kraken can get enough tentacles around the ship it can drag it to the bottom.
  • 6. Transnational crime takes advantage of the fact that the illicit supply and demand for a product will be filled by criminal groups. Once logistical commodity “tentacles” have been Well established it is no surprise that groups will often fight to stated solidify their position. Mr. Luciano!
  • 7. • When Transnational Organized Crime (TOC) networks emerge there is often a disruption of law enforcement activities due to the fact that the network may be working on strategies that can be executed by embedded personnel; this will often overwhelm the ability of different criminal justice systems to proactively address issues.
  • 8. You want to take me on before your crew even knows who the captain is…hey great! Good luck!
  • 9. UNITED STATES: Weapon MEXICO: Drugs "There's no such thing as good money or bad money. There's just money."
  • 10. • All tentacles “feed” the same “mouth.” • Tentacles can be cut off at the tip, but to stop it from feeding the mouth it must be severed. • The dactylus (suckers) of the tentacles may continue to “mark” the economy.
  • 11. • Think of the dactylus of the tentacle as the areas that are “gripped” by the tentacles… • These areas provide “traction” which enables the tentacle to maintain cohesion over a given area.
  • 13. • “Cooked in ink” refers to a dish in which the ink of the squid is used to cook it. As criminal activities “blot” the area local, state and federal law enforcement must agree on the same “recipe” to “cook” the kraken.
  • 14. Transnational crime is tentacular in mode of expansion. • Transnational Criminal Organizations (TOC) are like krakens; countries are “ships of state.” • The tentacles will try to drag the ships of state to the bottom. • Each tentacle may represent a distribution route used to feed the mouth. • Not all tentacles are viewed by “captains” (state governments) as dangerous. • The dactylus provide criminal cohesion over the length of the tentacle. • Tractional Cohesion Points (TCPs) are areas of control which allow the tentacle to “adhere.” • Corrupt officials may aid in smoothing out TCPs. • The more TCPs the stronger the hold on a given geographic area. • Using a “dot-to- dot” matrix TCPs will start to trace invisible tentacles. • TCPs are autogenic if adhesion is strong enough. • Cutting off the tip of a single tentacle will not address all TCPs. • En sue tinta is a strategy in which the “ink” (criminal activity) is used to cook the kraken. • En sue tinta must be a recipe followed by local, state and federal law enforcement. • En sue tinta is the dish that is served…will the captain and crew eat the dish?
  • 15. THE END Bye!