15.02.2015 Views

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

criminal organisations that are capable of finding solutions to many<br />

technological developments.<br />

Security techniques<br />

In the past decade banks and other financial institutions have invested a lot<br />

of money to reduce the number of robberies. This was a success, but it also<br />

resulted in displacement. The number of robberies in retail, catering businesses<br />

has grown as a result of increased security at banks. For shopkeepers and<br />

owners of catering businesses there is a limit to the use of security technology,<br />

as these businesses benefit from customer-friendliness and accessibility;<br />

extensive security measures do not improve customer-friendliness.<br />

Bluetooth and infrared technology<br />

Criminal organisations that are involved in skimming use bluetooth and infrared<br />

technology. A wireless camera is installed above a cash machine to remotely<br />

record the pin numbers entered into the machine. Advanced skimmers use a<br />

built-in mobile telephone. This telephone sends the magnetic strip data to a<br />

receiver in real time. Thanks to email and text messages (SMS), the bank account<br />

is emptied in another country far away within a matter of minutes.<br />

Biometrics<br />

Unique biometric characteristics, such as fingerprints and iris patterns are used<br />

for identification purposes. This makes the transfer of access cards, for example,<br />

less effective. On the other hand, it makes it more attractive to use the owners<br />

of this type of card for criminal purposes (possibly by forcing them to participate<br />

in criminal acts).<br />

Internet<br />

The Internet, as an example of digital technology, is used in various criminal<br />

activities. Phishing, advance fee fraud, distribution of child pornography and<br />

handling of stolen goods are well known examples, but there are also many<br />

opportunities for money laundering using the Internet (see chapter 6).<br />

Nanotechnology<br />

In the not-too-distant future, nanotechnology will be introduced on a large<br />

scale. On 29 January 2008 the Volkskrant newspaper wrote that in 2004<br />

nanoproducts worth a total of 25 billion euros were sold worldwide; this figure<br />

is expected to rise to 450 billion euros by 2010. This could make it possible to<br />

gain a definitive technological lead over criminal organisations. But these and<br />

similar developments also have a downside. The main downside in this regard is<br />

the increasing vulnerability of individuals. Car owners, bank managers, cleaners<br />

chapter 7 - reflections<br />

237

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!