Earlier this month, Interpol publicized the results of a first-of-its-kind operation in West Africa aimed at freeing children trafficked to cocoa- and palm-plantation owners. The operation resulted in the arrests of eight people on charges of illegal recruitment of minors and the rescue of 54 children — aged 11-16 — from seven countries. “With Ghana and Côte d’Ivoire producing around three-quarters of the world’s cocoa, it is believed that hundreds of thousands of children are working illegally in the plantations across these two countries alone. The trafficking of children is often camouflaged by the cultural practice of placing young children […]
Crime Archive
Free Newsletter
The U.S. Cyber-Consequences Unit has recently issued a report documenting how Russia supplemented its conventional war against Georgia last August with a massive, well-integrated and pre-planned information warfare campaign against Georgia’s Internet structure. The techniques were so successful that the unit has restricted distribution of the full report to U.S. government and certain other Internet security professionals. Only the executive summary (pdf) has been made available to the public. The U.S. Cyber-Consequences Unit is independent, non-profit research institute affiliated with the Fletcher School of Law and Diplomacy at Tufts University. The report’s main author, John Bumgarner, directs research at the […]
MEXICO CITY — Francisco Morelos Borja, the Michoacan president of the governing National Action Party (PAN) shifted from side to side, nervously looking at his aides and then the door of the nondescript restaurant in the town of Quiroga. “If you don’t open the door to [the drug traffickers], no problem. The difficulty comes when you open the door and have relations with them,” he said during our interview back in November 2007. “I can only make sure [members of the PAN] don’t open the door. . . . Sometimes it works, sometimes it doesn’t.” Nearly two years on, and […]
For a variety of reasons, over the last several months the issue of cyber security has been prominently covered in the U.S. news media. But for more than a decade, the vulnerability of networked computer systems has been considered by policymakers, with worst-case scenarios running from “Electronic Pearl Harbor” to the more recent rhetorical refresh of “Cyber Katrina.” The Obama Administration and a number of congressional leaders have made preliminary moves to craft a strategy for defending the country’s computer networks, but policymaking interest may outpace technical reality. As a nation, we want to be prepared for cyberwar, but we […]