Convergence of Wildlife Crime with Other Forms of Organised Crime May 2021 3

Total Page:16

File Type:pdf, Size:1020Kb

Convergence of Wildlife Crime with Other Forms of Organised Crime May 2021 3 Convergence of wildlife crime with other forms of organised crime May 2021 www.wildlifejustice.org 3 Table of contents Acronyms ............................................................................................................. 4 Executive Summary ............................................................................................ 7 Introduction ....................................................................................................... 10 Brief review of wildlife crime convergence ................................................. 12 Illustrative case studies of convergence ...................................................... 15 Wildlife crime ............................................................................................. 16 Case study 1 ....................................................................................... 16 Case study 2 ....................................................................................... 20 Case study 3 ....................................................................................... 22 Case study 4 ....................................................................................... 24 Case study 5 ....................................................................................... 26 Case study 6 ....................................................................................... 28 Fisheries crime .......................................................................................... 30 Case study 7 ....................................................................................... 30 Case study 8 ....................................................................................... 32 Case study 9 ....................................................................................... 34 Timber crime ............................................................................................. 37 Case study10 ..................................................................................... 37 Case study 11 ..................................................................................... 39 Case study 12 ..................................................................................... 41 Analysis and discussion ................................................................................... 43 Common facilitating factors: Bribery and corruption ...................... 44 Common resulting crime: Money laundering .................................... 44 Opportunities for law enforcement agencies .................................... 45 The role of intelligence analysis ............................................................ 47 Conclusion and recommendations ............................................................... 50 © All photos are property of the Wildlife Justice Commission, unless otherwise indicated. Not for reproduction. 4 www.wildlifejustice.org 5 We have been able to complete this report with the generous support of the Adessium Foundation, Dr. Boy van Droffelaar, the Dutch Postcode Lottery, the Whitehead Foundation, WWF and several donors Acronyms who wish to remain anonymous. BMF Bruno Manser Fund NRCN Natural Resources Conservation Network CITES Convention on the International Trade in PERHILITAN Department of Wildlife Endangered Species of and National Parks Wild Fauna and Flora Peninsular Malaysia CoP Conference of the Parties RFD Royal Forest Department (Thailand) DEA United States Drug Enforcement Agency UNEP United Nations Environment Programme DSI Department of Special Investigation (Thailand) UNODC United Nations Office on Drugs and Crime Hong Kong SAR Hong Kong Special Administrative Region of UNTOC United Nations Convention the People’s Republic of against Transnational China Organised Crime IUU fishing Illegal, Unreported and USFWS United States Fish and Unregulated fishing Wildlife Service MACC Malaysia Anti-Corruption UWA Uganda Wildlife Authority Commission NGO Non-governmental organisation © Wildlife Justice Commission 2021 AUTHOR Jenny Feltham CONTRIBUTIONS Sarah Stoner Olivia Swaak-Goldman Stephen Carmody PRODUCTION Isabel Leal Carina Mensching DESIGN batweb.es Acknowledgement 6 www.wildlifejustice.org 7 Executive Summary Over the past two decades, wildlife crime has be- Convergence can occur opportunistically on an ad- come a form of transnational organised crime, gen- hoc basis, as a complete “career shift” in response erating billions of dollars annually and affecting al- to changing conditions, or as part of a diversifica- most every country. As wildlife crime has increased tion strategy to increase profits across a range of in seriousness and profitability as a crime type, illicit commodities. It can also occur transaction- so too have reports of its convergence with other ally when criminal groups in different markets ex- forms of organised crime. However, these reports change goods or services with each other or could have been mostly anecdotal, and the nature of this be embedded to such an extent that the crimes are relationship is still largely undocumented. inextricably linked. Through its own investigations and intelligence Intelligence analysis is an essential tool to identify analysis, the Wildlife Justice Commission has also cases where convergence exists and to manage the collected evidence of criminal networks that are highest threat from organised crime. Yet there is a dealing in wildlife alongside other illicit commodi- lack of focus on the collection and analysis of wild- ties. This report aims to present some of these ex- life crime data and information. Few governments amples, along with information collected from open hold their own comprehensive datasets, and unlike sources, to contribute to the knowledge base on other illicit commodities, there is no standardised this issue. It sets out 12 case studies that illustrate data collection for wildlife. Furthermore, there is in- a range of converging crime types and typologies adequate sharing of the information that does ex- that have transpired in different regions of the world ist, meaning that opportunities to fully understand to increase the understanding of how these inter- the threat posed by convergence are being missed sections can occur on the ground. The case stud- and resources are not being allocated appropriately ies include six cases involving the trafficking of ter- in response to the problem. restrial wild animals, three cases involving fisheries crimes, and three cases involving timber crimes (al- Several commonalities can be observed in the case though they are collectively referred to as wildlife crime studies, particularly elements of bribery and corrup- throughout the report). tion that are an underlying factor present in almost every case, and money laundering as a converging The cases demonstrate that criminal groups may crime linked to the proceeds generated from wild- have a range of motivations to diversify their activi- life crime. The clear and frequent intersection of ties and engage in wildlife or other types of crime. these crimes highlights the need for financial and @WildlifeJusticeCommission Wildlife Justice Commission Wildlife Justice Commission @WJCommission www.wildlifejustice.org 8 www.wildlifejustice.org 9 corruption investigations that run in parallel or in re- Wildlife crime is a i More consideration should iv Consideration should be sponse to wildlife crime cases; however, few coun- be given to intelligence collection given to using alternative tries are currently undertaking these types of inves- cross-cutting criminal tigations. Financial investigations in particular are an activity which cannot be and sharing in a timely and secure legislation relating to the important but under-utilised technique to identify manner, and for governments to convergent or ancillary offences and trace the proceeds of crime, with the aim of ulti- tackled in isolation from mately seizing or confiscating funds or property de- other crimes. develop their own comprehensive where relevant and appropriate. rived from crime and removing the financial incen- wildlife crime information systems. tive and expected reward for criminals. v Financial and corruption The cases also demonstrate that wildlife crime is Crime convergence should be ii Organised crime group investigations should be conducted a cross-cutting criminal activity which cannot be further studied and integrated as mapping should be an essential tool in parallel or in response to wildlife tackled in isolation from other crimes. Multi-agen- cy investigations and task forces can be an effective part of the approach to tackle to identify how and where crime cases to identify any associated strategy to address convergence, offering alterna- wildlife crime and organised crime convergence may be occurring, and money laundering or corruption tive legislation, powers, and expertise of other law enforcement agencies to enable the application of more broadly, as improved to tackle wildlife crime as an offences, payment methods, and the full force of the law to the crime. The Wildlife understanding of this intersection organised crime threat. to identify the proceeds of crime Justice Commission’s investigations have frequent- ly shown that high-level wildlife criminals can also can help to identify more strategic to facilitate asset recovery. be less operationally savvy compared to top-lev- iii Multi-agency cooperation, policy and law enforcement el criminals in other crime types, which can some- joint investigations and task forces
Recommended publications
  • Grado En Comercio
    GRADO EN COMERCIO TRABAJO FIN DE GRADO ANÁLISIS DE LAS PRÁCTICAS FRAUDULENTAS EN LAS REDES VÍCTOR GALLEGO MORO VALLADOLID, SEPTIEMBRE 2020 UNIVERSIDAD DE VALLADOLID GRADO EN COMERCIO CURSO ACADÉMICO 2019/2020 TRABAJO FIN DE GRADO ANÁLISIS DE LAS PRÁCTICAS FRAUDULENTAS EN LAS REDES Trabajo presentado por: VÍCTOR GALLEGO MORO Firma: Tutor: OSCAR M. GONZÁLEZ RODRÍGUEZ Firma: Valladolid, septiembre 2020 ÍNDICE 1 Introducción. ...................................................................................................5 2 Marco teórico ..................................................................................................7 2.1 Scam. Concepto, medios y clasificación ...........................................................7 2.1.1 Medios utilizados por Scammers ................................................................................ 7 2.1.2 Tipos de Scam más frecuentes ................................................................................... 8 2.1.3 Formas de cobrar una estafa .................................................................................... 10 3 Funcionamiento de las organizaciones de Scam ...........................................12 3.1 Formando una organización criminal de estafas online ................................. 12 3.2 Estructura organizativa .................................................................................. 14 3.2.1 Organigrama ............................................................................................................ 14 3.2.2 Horarios..................................................................................................................
    [Show full text]
  • Presroent for STRICT STOCK MARKET CURB
    A.'vmuea otAiLT oibcvxatium tar tki Moirth of April. 1M4 5,453 FOL. IfSL, NO. 198. (ClaMtiled O B PBfO lAX MANCHESTER, CONN., WEDNESDAY, MAY 16, 1934. (SIXTEEN PAGES) PRICE THREE SEEK CHANGES QUICK JUSTICE Lightship Sunk In Fog By Liner Olympic- FLIERS BAREY IN LAYOUT OF FOR KIDNAPERS; Seven Killed CROSS SEA, HIT PRESroENT FOR STRICT DEPOnOUARE THEYJETLIFE I R E L ^ R M STOCK MARKET CURB Hfeold Cat Down Corner at Gettle Captors WiD Be m Sabelli and Pond Miss Doath Chief Execatire Dechret Intersection and Also Re* San Qoentin Before Night­ by hches, Plane Cracking Sen. Reed Victorious a Emphatically for Regula­ moye Hedge on North fall to Start Senring Sen­ Dp I t Lahinch, Seashore In Pennsy Primaries tion of Exchange hy d » Main Street tences— Plead Gnilty. Town of Clare. Philadelphia, May 16.—(A P I- After Senator David A. Reed bad Federal Trade Commia- rolled up a majority of more than Plans for a radical change in the Los Angeles, May 16.—(A P I- Lahlnch, Irish Free State, May 16. 100,000 in two-thirds of the state. Depot square area to lessen the Three kidnapers of the wealthy —(AP)— ’The story of “missing Governor Gifford Plnchot today sion as Proposed by the lection of Main and North Main William (Settle will begin serving death by Inches” as they flew over conceded defeat in his effort to win the Republican nomination for Sen­ kraffie danger existing at the inter* life sentences for that crime before the Atlantic, fighting leaking gaso­ Senate. street were viewed by the Select­ nightfall.
    [Show full text]
  • Board of County Commissioners Agenda Thursday, February 13, 2020, 9:00Am Commission Chambers, Room B-11
    BOARD OF COUNTY COMMISSIONERS AGENDA THURSDAY, FEBRUARY 13, 2020, 9:00AM COMMISSION CHAMBERS, ROOM B-11 I. PROCLAMATIONSIPRESENTA TIONS II. UNFINISHED BUSINESS Ill. CONSENT AGENDA l. Acknowledge receipt of Summons in Case No. 2020CV000080 Equity Bank vs. Hoard of Commissioners of Shawnee County. Kansas et. al.--County Clerk. 2. Con:-.idcr emergency vehicle pennit for Kyle Soldani for emergency fire and rescue response for Shawnee County / Dover Fire District #4-Emergem:y Management. 1 3. Consider acceptance of one permanent and two temporary easements for the SE 45 h Street- SE Berryton/ West Edge Road to SE East Edge Road project and authorization to pay property owners the agreed settlement amounts Public Works. 4. Consider <~uthorization and execution of the following contracts for treatment of noxious weeds with a recovery rate of 100 pcrccnl: (a) Contract C39-2020 with Aubum Tovmship (b) Contract C40-2020 with Kansas Dept. of Transportation (c) Contract C41-2020 with \tlission Township (d) Contract C42-2020 with Tecumseh Township (e) Contract C43-2020 with the Wakarusa Watershed Joint District #35 5. Consider approval of the following regarding the previously approved hiring of John Landon as the Noxious Weed Director: (a) Approval of the excerpt of minutes from the February 3, 2020 Board of County Commission Meeting as required by the Kansas Department of Agriculture-County Clerk. (h) E:o:ecuting the Kans<ts Dep<trtment of Agriculture's "Nomination fur County Weed Supervisor"-Public Works. IV. NEW BUSINESS A. COUNTY CLERK- Cynthia Beck I. Consider all voucher payments. 2. Consider correction orders. B. PUBLIC WORKS- Curt Niehaus I.
    [Show full text]
  • Virtual Meeting “Active Shooter Prevention and Active Threat Prevention” Speakers: Chris Grollnek, Active Shooter Expert & Rick Shaw, Prevention Expert
    Chapter Website: Greater Pittsburgh Area Chapter September 2021 www.acfe-pgh.org Newsletter September 20, 2021 – In Conjunction with the Monday, September 13th and ACFE Lehigh Valley Chapter – Virtual Meeting Tuesday, September 14th “Active Shooter Prevention and FRAUD AND CORRUPTION Active Threat Prevention” AWARENESS VIRTUAL SEMINAR Speakers: Chris Grollnek, Active Shooter Expert CO-SPONSORED WITH THE IIA AND Rick Shaw, Prevention Expert SCHNEIDER DOWNS Location: Virtual Event This year’s topics include ethical decision- 11:50 am – 2:00 pm: Presentation making and leadership, cryptocurrencies, Please register here. Registration administered by ACFE Lehigh the Internet of Things and managing Valley Chapter. emerging risks, the landscape of fraud in Registration deadline: September 13th Cost: Members & Associates of the Greater Pittsburgh Area Chapter: 2021, top 10 cybersecurity strategy $20 mistakes of 2021, and where real risk All others: $25 looms. The line-up of expert speakers will CPE: Qualifies for 2 credit hours of continuing professional share their real-world and personal education. Attendance certificates will be emailed after the experiences with fraud. event. CPE certificates administered by ACFE Lehigh Valley Chapter. Register here. See the attached flyer for Continued on page 2 further details. Our Sponsors: September 20, 2021 – In Conjunction with the ACFE Lehigh Valley Chapter – Virtual Meeting “Active Shooter Prevention and Active Threat Prevention” Speakers: Chris Grollnek, Active Shooter Expert & Rick Shaw, Prevention Expert The Active Shooter Prevention presentation will discuss the timing of events including duration and first responders arrival, definitions of event types, causality event types, past events from 2000 through 2018, and motives and profiles of active shooters.
    [Show full text]
  • Community Matters.” Doggie Dive-In (9/7) – $ the 2019 Swimming Season at Mingo Park Is Over, and It’S Again Time for the Annual Doggie Dive-In
    has received several awards for her outstanding art work. The show, which features several majestic race horses, is in conjunction with the All Horse Parade and Delaware’s Little Brown Jug and runs through Oct. 26. Gallery 22 is open every Fri. & Sat., 6-8:30 pm. Free & open Community to the public. Bioblitz at Gallant Woods Park (9/7) Preservation Parks of Delaware County has organized a Bioblitz within Gallant Woods Park, located at 2151 Buttermilk Hill Matters Rd., on Sat., Sept. 7 (7 am – 11 pm). During bioblitzes, scientists and community members come together to identify and record all types of animal and plant species that live in a designated area within a certain period of time – often 24 hours. Sometimes rocks and other A Voice of, by, and for the People natural features are also included in the count. Gallant Woods has a variety of habitats to explore, incl. woodlands, prairies, and wetlands. of Delaware, Ohio The community is invited to participate; registration is not required. For related preparatory and educational activities, visit the Sept. 7 event on PPDC’s webpage (www.preservationparks.com) for programs and times. September 2019 Scioto River Sweep (9/7) Vol. 5, no. 3 The annual Scioto River-Sweep will take place Sat., Sept. 7 (8:30 am – noon). Volunteers meet at the Bellpoint Community, 4771 Send info, articles, questions & comments to State Rt. 37 W. and will clean up the riverbanks on foot & in canoes. Equipment, transportation to and from launch & pick-up sites, and a [email protected] free picnic lunch are provided.
    [Show full text]
  • Protecting Aging Americans: Searching for Tools to Fight Elder Financial Exploitation
    Protecting Aging Americans: Searching for Tools to Fight Elder Financial Exploitation April 7, 2021 Aging Client Services Anne Wilson Larkin Lauree Peterson-Sakai © 2021 Wells Fargo & Co. All rights reserved. Why Talk about this Topic? https://www.ksl.com/article/46695914/utah-lawmaker-seeks- to-combat-scammers-after-family-loses-150k-in-scheme © 2021 Wells Fargo & Co. All rights reserved. 2 Increasing Longevity and Elder Population Average lifespan doubled Number of Americans 65 and over over the last two centuries (1900 to 2050) 120 100 100+? 78 years 80 60 38 years 40 47 years 20 0 1800 1900 2000 2100 Last 200 Years 3 Sources : 1900 to 1940, and 1960 to 1980, U.S. Bureau of the Census, 1983; 1950, U.S. Bureau of the Census, 1953; 1990, U.S. Bureau of the Census, 1992; Source: U.S. Census Bureau, 2010 2000, U.S. Census Bureau, 2001; 2010, U.S. Census Bureau, 2011; 2020 to 2050, U.S. Census Bureau, 2012a; 1900 to 2010, decennial census; 2020 to 2050, 2012 © 2021 Wells Fargo & Co. All rights reserved. National Population Projections, Middle series. States with the Oldest Populations National average is 16% over 65 with 6.7% over age 75 Regional ranges: Northeast at 17.8% Southern 16.1% Western 15.8% Midwest 14.9% Source: U.S. Census Bureau 2020 © 2021 Wells Fargo & Co. All rights reserved. 4 Which Means for Americans 1 in 5 Americans will be 65 or older by 2030 • In 2034, people over 65 will outnumber those under age 18. • Projected population in 2060 of people age 65 and older is 98.2 million – with 19.7 million being age 85+ • Half of women over 75 live alone (8.1 million) • Pandemic brought increases in multi-generational housing and grandparents providing care for their grandchildren Retirement at 65 requires financial assets to last 25-30+ years • One-half of Boomers are now retired yet 48% of Americans ages 60 to 80 have less than $50,000 in savings • Americans 65 and older were 1/4th of unemployed due to the pandemic, the 2nd largest group behind 16-24 year olds • Millennials may report fraud more often but elders lose more.
    [Show full text]
  • In Congo Plot;
    ...... ■ \- •.■ ■ ■-: '\ WEDNESbAY» SErtEMBER H WO PAGE TWENTY-POtJR Avenge Dally Net Preaa Run The WeathM jianrlr^Btfr lEtt^tthts f|mUt fdrtfeeWMkIMM raneeet ef V, B. SNeMP a M n Mki ISM OlM ey. M t -M «M l SapIptS Seer 13,125 IB OSe. Mday elee^* ■ ••len’ ebaeoa aC fale.ll0e\lB Sari: eeStfeeAMtS e f ( “ ■ ‘ Manchester'— A CUy of Village Charm T f HU' It:::: VOL. LXXDC. NO. 295 (TWENTY-FOUR PAGES— IN TWQ SECTIONS) MANCHESTER, CONN^ THURSDAY, SEPTEMBER 15, 1960 AMeHtatag rage SB) PRICE nVE CENTS ■''n' :.A Nixon Declares ^oleSf Czechs Join He’s Not 100 % i i Soviet in Political For Any Group in Congo Plot; St. Louis, Sept. 15 (IP)— I ‘‘.'"Vi'-'V'-jj Vice President Richard M, Nixon told the International Association of Machinists he Berlin, Sept. 15 (yp)— In-< pleasure there wUl'be on the other Would never, as president, be creased activity by Red jet side." . “iOO per cent” for the pro­ The Polish snd Csechoslovak gram of any group in Amer- fighters w as reported today as missions announced their goyim:^ Poland and Czechoslovakia ments have joined Bkist Germany iQa. YOU In denouncing as ill^ a l docu­ TTie,^ Republican presidential joined the Communist politi­ ments the West German passports candldttte^eclared It is the obli­ C o n g o le s e U.S. Claims cal squeeze on Berlin.' gation of the president to work ior Wastem pllota Mid there la a carried by West Berliners. They said any who travel across the Interest " o f all the people of eonsiderable Increaae In patrol the United Sttltes 'in d not to set work by Soviet MIG’a In the air their frontlirs must have their T roops for visas stamped on separate pieces one group against another^’ Red Smear -f- f corridors to Berlin.
    [Show full text]
  • Case Study 4
    www.wildlifejustice.org CASE STUDY Workers from the call centres would contact the customers and use a variety of false pretences to attempt to extract money from them. Victims were COMMODITIES INVOLVED 4 requested to send money to a local bank account, Live reptiles and fraud where it was remitted to Thailand. The money was then sent either to Bangladesh or India via hawala CONVERGENCE TYPOLOGY transactions.23 Unconfirmed – possibly complete “career shift” It is believed the scam call centre business is cur- rently more profitable than previous turtle and tor- GEOGRAPHIC REGION toise trafficking activities, although it requires a South Asia considerably larger network of operations and ini- tial cost outlay. While the method by which money is transferred back to the principles is similar to the During its previous multi-year investigation into method used to transfer money between countries the illegal trade in live turtles and tortoises within for transactions involving illegal wildlife, it is unlike- Asia, the Wildlife Justice Commission had identi- ly to account for the convergence in this case. fied a Bangladeshi national who was part of a rep- tile smuggling network operating between India, Information on the identity of members of this Bangladesh, and Thailand. network and evidence in relation to the illegally obtained company data was provided to the re- In May 2019, Wildlife Justice Commission opera- spective government authorities. tives received new intelligence indicating that this individual was now involved in setting up and op- Every year millions of people worldwide collec- erating “scam call centres” that were illegally obtain- tively lose billions of dollars to scam callers of- ing personal information of customers from vari- fering wide-ranging fraudulent “services” and ous companies located in the United States, United schemes to gain money.
    [Show full text]
  • Everything Epping Forest 01/03/2017
    Everything Epping Forest everythingeppingforest.co.uk covers the Epping Forest district in Essex and features regularly updated news - in words and pictures - has a what's on listings section to highlight local events, a Local Business Directory and a section which allows clubs and organisations to publicise their activities free of charge Home | News | Sport | Your News Views | Events - What's On Diary | Clubs - Organisations | Local Business Directory | Jobs | Food & Drink Wednesday, 1 March, 2017 News Archive click here Sport Archive click here Tell us your news... Publicise your event... Promote your business... Have your say... Buy copies of photos that appear here... email: [email protected] tel: David Jackman on 07710 447868 01/03/2017 Everything Epping Forest NORTH WEALD: Register for Race for Life 9.49am - 31st January 2017 REGISTRATION is open for Cancer Research UK's Race for Life at North Weald Airfield on Wednesday, July 12. The charity is urging women to enter either the 5k or 10k event. Event manager Courtney Culverhouse said: “Signing up to take part in Race for Life is a great way for women to set themselves a new and exciting challenge for 2017. “Race for Life events are non-competitive and participants can choose to walk, jog or run around the course. Whether they plan to amble with friends or sprint to the finish line, every step they take will help to bring forward the day when all cancers are cured. “Every day 90 people are diagnosed with cancer in the East of England. That’s why we’re calling on women in Epping to make 2017 a year to remember.
    [Show full text]
  • The American
    Anthrax Vaccine n Water Wars n Debating the Draft THE AMERICAN $2.50 June 2003 The magazine for a strong America MILITARY “For God and Country since 1919 !! Light , 99 Blue YYESES,Any shirts 99 for compare only at up to 429$ 42934 each ! Grey Heather Tan NO PRICE INCREASE! All NEW Colors for 2006! White • Hefty knit of soft combed Teal cotton & no iron polyester. • Deep 3-button placket for easy on/easy off. • Neatly taped collar seam. • 100% Wash and Wear! • Button thru chest pocket. • Rib knit collar and cuffs. • Straight bottom with side vents to wear in or out. Get a summer’s supply Lavender for less than the cost of One shirt elsewhere! That’s Haband’s buying power: Orange 4 shirts for 29.99. Stripe Maize In stock & ready to ship direct to And your doorstep. we’ve Order kept our Superb Today! LOWEST Collar PRICE detail, 100% EVER: woven NO IRON right in! Under WaWashsh && $7.50 Wear! Wear! a Shirt! shirts 99* for 5 for 36.30 French 4 only 29 6 for 42.85 Blue 7 for 49.30 Haband Men’s Sizes: 1600 Pennsylvania Ave., Peckville, PA 18452 S(34-36) M(38-40) L(42-44) XL(46-48) Send ____ shirts. I enclose $________ purchase *Big Men’s Sizes ($2 more each): ( ) ( ) ( ) price plus $5.99 toward postage & handling. 2XL 50-52 3XL 54-56 4XL 58-60 In GA add 7TE–1HX41 WHAT HOW sales tax. SIZE? MANY? 02 Tan ® DISC VER NETWORK Check 17 Teal ® HR Lavender Card # _______________________Exp.: ______/_____ MP Maize Mr.
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 107 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 107 CONGRESS, SECOND SESSION Vol. 148 WASHINGTON, TUESDAY, MARCH 19, 2002 No. 32 House of Representatives The House met at 12:30 p.m. and was going to begin or end in Afghanistan. fought month after month, October, called to order by the Speaker pro tem- The war against terrorism could last November, December, January, and pore (Mr. CULBERSON). years, not just months. But also, if we just a few weeks ago we passed for the f are going to win the war against ter- fourth time legislation to give Ameri- rorism, we have to recognize that we cans help, as well as the opportunity to DESIGNATION OF SPEAKER PRO must get our economy moving again. go back to work. Our Democratic TEMPORE As we look back, over 1 year ago friends relented and worked with us in The SPEAKER pro tempore laid be- when President Bush became Presi- a bipartisan way, and we were able to fore the House the following commu- dent, he inherited a weakening econ- put on the President’s desk legislation nication from the Speaker: omy, an economy that was getting to help American workers, and the weaker by the day; and the President President signed it into law. WASHINGTON, DC, said that we need to give Americans March 19, 2002. With the economic stimulus and se- I hereby appoint the Honorable JOHN more spending money, we need to cut curity package we have helped Amer- ABNEY CULBERSON to act as Speaker pro tem- taxes, we need to take 20 cents out of ican workers who have been laid off pore on this day.
    [Show full text]
  • Phishing-Awareness Specialists: Stewarding Trust in a Digital World
    Phishing-Awareness Specialists: Stewarding Trust in a Digital World Written by Joshua Bucheli, AI Ethics Researcher and Fellow at the ForHumanity Center, in Collaboration with IT Security Manager Kai Dorner and Peter Kosel, Founder of cyberunity Illustration from Insta: the_doodling_crow Over the past couple of years, YouTubers like kitboga and Jim Browning have pioneered an online fascination with exposing call-center scams, a pastime that has become known as ‘scambaiting’. Posing as vulnerable IT users, these cyber-vigilantes lure in bad-actors who masquerade as IT support, turning the tables on their phishing scams, exposing them and garnering millions of views in the process. While comical, what these viral videos highlight is no laughing matter – they show just how easy it is to fall prey to phishing scams, and they demonstrate the crucial need for increased awareness of how to identify trustworthy parties. Trust is the keystone upon which all of our social, and indeed digital, interactions are based. We trust E-banking with our finances, apps with our passwords, systems with our infrastructures, and clouds with our data. ‘Phishing’ attacks are a form of social engineering that preys on this trust, therefore posing one of the greatest threats to data security. Where Does Phishing Stand Today? Unlike cyberattacks that take a brute force approach to cracking encryptions, phishing is a more subtle affair operating on much the same principles as literal angling: you throw out some bait and wait to see who bites. The object is to ‘phish’ for user data or for access to systems by mimicking a legitimate site.
    [Show full text]