Recent Interesting Issues on Which Correspondence Has Been Received:
- “Cocaine Imports”. Which Anguillian businessmen are the principal financiers? Photographs welcome, particularly if receiving or delivering a package.
- “Cocaine Distribution”. Where are the major outlets? If they are so well known, why have they not been closed down? Photographs welcome.
- “Dog Fighting”. Where are the most popular pits where dogs fight to the death? How is protection provided for the participants? Who arranges training? Is the ante still US$5,000.00 to put your dog in? Photographs would be appreciated. They will add a little colour.
- “Prostitution”. Which are the houses that permit school girls to bring businessmen for paid sex? Which ones import girls from overseas? What keeps them from being closed down? Who controls immigration of the girls? There is only rumour, no evidence.
- “Human Trafficking”. Is Anguilla Involved in Human Trafficking at this time, as one correspondent suggests? One way to get at an answer is to study an official definition of the term. We can start by looking at the following page taken from the website of the United Nations Office on Drugs and Crime.
“From Himalayan villages to Eastern European cities, people - especially women and girls - are attracted by the prospect of a well-paid job as a domestic servant, waitress or factory worker. Traffickers recruit victims through fake advertisements, mail-order bride catalogues and casual acquaintances.
Upon arrival at their destination, victims are placed in conditions controlled by traffickers while they are exploited to earn illicit revenues. Many are physically confined, their travel or identity documents are taken away and they or their families are threatened if they do not cooperate. Women and girls forced to work as prostitutes are blackmailed by the threat that traffickers will tell their families. Trafficked children are dependent on their traffickers for food, shelter and other basic necessities. Traffickers also play on victims' fears that authorities in a strange country will prosecute or deport them if they ask for help.
Trafficking in human beings is a global issue, but a lack of systematic research means that reliable data on the trafficking of human beings that would allow comparative analyses and the design of countermeasures is scarce. There is a need to strengthen the criminal justice response to trafficking through legislative reform, awareness-raising and training, as well as through national and international cooperation. The support and protection of victims who give evidence is key to prosecuting the ringleaders behind the phenomenon.”
Another useful site is the web page taken from the website of the Administration for Children and Families
Trafficking in persons is to be distinguished from alien smuggling. See the very instructive web page on the website of the US Department of State.
From such study, we can conclude that if any Anguillian official received a financial reward to permit the Far East labour that has recently come to soujourn with us in the
- “How to Cover Your Tracks”. Two different correspondents point out that there are some additional precautions you should consider. They include:
(a) When retiring or resigning from a corrupt employer, photograph all the relevant documents relating to questionable transactions before you leave. It costs nothing, and you never know when you will need them! Make sure you do not get caught. Transfer any tape recordings to digital format, they are easier to store and last longer. Keep a back-up on a thumb drive in a secure location, like a safety deposit at your bank.
(b) “Recent File Lists” tell an employer what documents you have been recently working on.
(c) An employer can often tell when a “USB device” was connected to a computer by looking into the registry using forensic tools.
(d) Windows creates files called “prefetch” which can tell an employer when a programme was launched. This can include disk wiping tools. Tools like this are generally not installed as a matter of course. So, while he cannot ascertain what was deleted, he can know that someone was trying to hide something on the computer.