Affiliation:
1. Fakultet bezbednosti, Univerzitet u Beogradu
2. Fakultet za diplomatiju i bezbednost
Abstract
Organized crime represents a serious threat to the security, economy, and
sometimes for the legal order of the country. Criminal groups not only use
the achievements of information and communication technologies (iCT) for the
expansion of the organization, communication and management of activities
and resources, but also invest, through secret and illegal channels, to
develop their own applications of their own applications that they will use
for their activities. Organized criminal groups themselves, the most
powerful ones, have their iCT experts whose goal is not only to protect
communication channels, but also to devise new ways of ?circumventing? and
neutralizing police measures and techniques for detecting and monitoring
their activities. Members of organized criminal groups to use those
communication applications that enable encrypted transmission to electronic
devices using the necessary operating system, enabling the installation of
the application and the establishment of a connection to the internet in
order to enable the necessary protected communication. There are also
applications that allow the entire device to be encrypted, making it
difficult to find its contents or discover the necessary information and
evidence. This paper presents the characteristics of organized crime and
their operating modes, with an emphasis on the use of cryptographic
techniques. Case studies are illustrating the size and scope of abuse of
encryption by organized criminal groups, by data on cases which were
processed, as well as challenges in opposing the abuse of cryptography from
a technical-technological and legal aspect, after that we provided guideline
for improving the mechanisms for reduction of organized crime.
Publisher
National Library of Serbia
Subject
General Engineering,Energy Engineering and Power Technology
Reference36 articles.
1. Bajović, Vanja. 2022. „Encrochat i Sky ECC komunikacija kao dokaz u krivičnom postupku“. Crimen 13: 154-179.
2. Bequai, August. 1997. “Organized Crime: Manipulating Cyber-Space”. in: A Transatlantic Agenda - final report, edited by Ernesto U. Savona, Shawna Gibson and Daria Angelini, 25-29. Trento: European Commission.
3. Berinato, Scott. 2007. “The Rise of Anti Forensics”. Jun 08. https://www.csoonline.com/article/521254/investigations-forensics-the-rise-of-anti-forensics.html.
4. Bird, Lucia, Hoang Thi, Stanyard Julia, Walker Summer, and Haysom Simone. 2020. Transformative Technologies - How digital is changing the landscape of organized crime. Geneva: Global initiative Against Transnational Organized Crime.
5. Boskovic, Milica and Jankovic Brankica. 2023. “Forced Migrations and the Risk of Human Trafficking”. in: Handbook of Research on the Regulation of the Modern Global Migration and Economic Crisis, edited by Emilia Alaverdov and Muhammad Waseem Bari, 18-36. Hershey, PA: iGi Global. https://doi.org/10.4018/978-1-6684-6334-5.ch002.