----

l?l g3TI September 1989 Law Enforcement Bulletin

The Enrique Camarena Case

Also In This Issue: Operational Streamlining The Computer Criminal Operation Freezer Burn

Traffic Stops

." ((

.. 4""""

I

If you have issues viewing or accessing this file, please contact us at NCJRS.gov.

September 1989, Volume 58, Number 9

Features I

C 12/533 I 2/.5..3 (I r7 12-/sS5 ~4 f 2-/ S3~ e

Departments

The Enrique Camarena Case- A Forensic Nightmare By Michael P. Malone

Operational Streamlining By Hillary M. Robinette

Operation Freezer Burn By P.R. Beseler

The Computer Criminal: An Investigative Assessment By Larry Coutourie

Traffic StopS: Police Powers Under the Fourth Amendment By John Gales Sauls 121533-

121538

12 The Bulletin Reports

23 Book Review

U.S. Department of Justice National Institute of Justice

This document has been reproduced exactly as received from the pers~n or organization originating it. Points of view or opinions stated In this document. ~re tho.~e of the authors and do not necessarily repr~sent the official PO~ltlon or policies of the National Institute of Justice.

! 2- / S .'5 7 ~4 Focus 32 VICAP Alert

to the National Criminal Justice Reference Service (NCJRS).

~urther reproduction outside of the NCJRS system requires permis- sion of the ~owner.

l?l21J Law Enforcement Bulletin United States Department of Justice Published by the Office of Public Affairs, Federal Bureau of Investigation Milt Ahlerich, Assistant Director Washington, DC 20535

William S. Sessions, Director

The Attorney General has determined that the publication of this periodical is necessary in the transaction of the public business required by law of the Department of Justice. Use of funds for printing this periodical has been approved by the Director of :he Office of Management and Budget.

ISSN 0014-5688

Editor-Stephen D. Gladis Managing Editor-Kathryn E. Sulewski Art Director-John E. Ott Assistant Editor-Alice S. Cole Production Manager-Joseph Andrew DiRosa

The Cover: The abduction and subsequent murder of DEA Special Agent Enrique Camarena initiated one of the most extensive forensic investigations ever conducted by the FBI Laboratory. See article p. 1.

The FBI Law Enforcement Bulletin (ISSN-0014-5688) is published monthly by the Federal Bureau of Investigation, 10th and Pennsylvania Ave., N.W., Washington, DC 20535. Second-Class postage paid at Washington, DC. Postmaster: Send address changes to Federal Bureau of Investigation, FBI Law Enforcement Bul- letin, Washington, DC 20535.

USPS 383-310

j.; ,

, f

!.

\ \

\

\.

. \ ~ \ '. .

\

I 2.1 S 3...J

The Enrique Camarena Case A Forensic Nightmare

By MICHAEL P. MALONE

Special Agent Laboratory Division

Federal Bureau of Investigation Washington, DC

.. ' - "

,j

... ..' '~ '~" ~''''. ~~

______ September 1989 I 1

O n February 7, 1985, U.S. Drug Enforcement Agency (DEA) Special

Agent (SA) Enrique Camarena was abducted near the U.S. Con- sulate in Guadalajara, Mexico. A short time later, Capt. Alfredo Zavala, a DEA source, was also abducted from a car near the Guadalajara Airport. These two abductions would trigger a series of events leading to one of the largest investigations ever con- ducted by the DEA and would result in one of the most extensive cases ever received by the FBI Laboratory.

Throughout this lengthy in- vestigation, unusual forensic prob- lems arose that required unusual solutions. Eventually, numerous suspects were arrested, both in the United States and Mexico, which culminated in an 8-week trial held in U. S. District Court in Los Angeles, CA.

The Abduction On February 7, 1985, SA

Camarena left the DEA Resident Office to meet his wife for lunch.

"

On this day, a witness observed a man being forced into the rear seat of a light-colored, compact car in front of the Camelot Restaurant and provided descriptions of sev- eral of the assailants. After some initial reluctance, Primer Coman- dante Pavon-Reyes of the Mexican Federal Judicial Police (MFJP) was put in charge of the investiga- tion, and Mexican investigators were assigned to the case. Two known drug traffickers, Rafael Caro-Quintero and Ernesto Fon- seca, were quickly developed as suspects. A short time later at the Guadalajara Airport, as· Caro- Quintero and his men attempted to flee by private jet, a confrontation developed between Caro-Quin- tero's men, the MFJP and DEA Agents. After some discussion, Caro-Quintero and his' men were permitted to board and leave. It was later learned that a 6-figure bribe had been paid to Pavon- Reyes to allow this departure.

The Investigation During February 1985,

searches of several residences and

ThrQughout this lengthy investigation, unusual

forensic problems arose that required unusual solutions.

" Special Agent Malone

ranches throughout Mexico proved fruitless, despite the efforts of the DEA task force assigned to inves- tigate this matter and the tremen- dous pressure being applied by the U.S. Government to accelerate the investigation. High-level,. U.S. Government officials, as well as their Mexican counterparts, were becoming directly involved in the case. It is believed that because of this "heat," the Mexican drug traffickers and certain Mexican law enforcement officials fab- ricated a plan. According to the plan, the MFJP would receive an anonymous letter indicating that SA Camarena. and Captain Zavala were being held at the Bravo drug gang's ranch in La Angostura, Michoacan, approximately 60 miles southeast of Guadalaj ara. The MFJP was supposed to raid the ranc~, eliminate the drug gang and eventually discover the bodies of SA Camarena and Captain Zavala buried on the ranch. The DEA would then be notified and the case would be closed. Thus, the Bravo gang would provide an easy scapegoat.

During early March, MFJP officers raided the Bravo ranch before the DEA Agents alTived. In the resulting shootout, all of the gang members, as well as one MFJP officer, were killed. How- ever, due to a mix-up, the bodies of SA Camarena and Captain Zavala were not buried on the Bravo ranch in time to be dis- covered as planned. The individ- uals paid to do this job simply left them by the side of a road near the ranch. It was later learned that cer- tain Mexican law enforcement officials were paid a large sum of money to formulat\~ and carryout this plan in order to obstruct and prematurely conclude the inves- tigation.

2 i FBI Law Enforcement Bulletin ______________________________ _

Shortly after this shootout, a passer-by found two partially decomposed bodies, wrapped in plastic bags, along a road near the Bravo ranch. The bodies were removed and transported to a local morgue where they were autop- sied. The DEA was then advised of the discovery of the bodies and their subsequent removal to an- other morgue in Guadalajara, where a second autopsy was per- formed.

On March 7, 1985, the FBI dispatched a forensic team to Guadalajara. They immediately proceeded to the morgue to iden- tify the bodies and to process any evidence which might be present. After much bureaucratic delay from the local officials, they were finally allowed to proceed. The bodies were identified only as cadavers number I and number 2. It was apparent that each body had been autopsied and that both were in an advanced state of decom- position. Cadaver number I was quickly identified by the fin- gerprint expert as that of SA Camarena. Mexican officials would not allow the second body to be identified at this time; however, it was later identified through dental records as Captain Zavala.

The FBI forensic team requested permission to process the clothing, cordage and burial sheet found ~with the bodies but the request was denied. However, they were allowed to cut small, "known" samples from these items and obtain hair samples from both bodies. Soil samples were also removed from the bodies and the clothing items.

A forensic pathologist from the Armed Forces Institute of Pathology was allowed to examine

the body of SA Camarena. He concluded that SA Camarena's death was caused by blunt-force injuries. In addition, SA Cama- rena had a hole in his skull caused by a rod-like instrument. SA

"

ing State Judicial Police Officers, were arrested and interrogated concerning the kidnaping of SA Camarena. Primer Comandante Pavon-Reyes was fired, and arrest warrants were issued for a number

... certain Mexican law enforcement officials were paid a large sum of money ... to. obs.truct

and prematurely concludt:: the inVestigation.

Camarena's body was then released to the American officials and immediately flown to the United States.

The next day, both FBI and DEA personnel proceeded to the Bravo ranch where the bodies were initially found. Because this site had been a completely uncon- trolled crime scene, contaminated by both police personnel and onlookers, only a limited crime scene search was conducted. It was immediately noted that there was no grave site in the area, and that the ~olor of the soil where the bodies had been deposited differed from the soil that had been re- moved from the bodies. There- fore, "known" soil samples from the drop site were taken to com- pare with soil removed from the victims. It was also noted that there were no significant body flu- ids at the "burial" site. This led the forensic team to conclude that the bodies had been buried else- where, exhumed and transported to this site.

The MFJP officials were later confronted with the evidence that the bodies had been relocated to the Michoacan area. This was one of the factors which led to a new, unilateral MFJP investigation. As a result, several suspects, includ-

" of international drug traffickers, including Rafael Caro-Quintero and Ernesto Fonseca.

In late March 1985, DEA Agents located a black Mercury. Gran Marquis which they believed was used in the kidnaping or trans- portation of SA Camarena. The vehicle had been stored in a garage in Guadalajara, and a brick wall had been constructed at the entrance to conceal it. The vehicle was traced to a Ford dealership owned by Caro-Quintero. Under the watchful eye of the MFJP at the Guadalajara Airport, the FBI forensic team processed the vehi- cle for any hair, fiber, blood and/ or fingerprint evidence it might contain.

During April 1985, the MFJP informed the DEA that they be- lieved they had located the residence where SA Camarena and Captain Zavala had been held. The FBI forensic team was imme- diately dispatched to Guadalajara; however, they were not allowed to proceed to the residence, located at 881 Lope De Vega, until an MFJP forensic team had processed the residence and had removed all of the obvious evidence. The DEA was also informed that since the abduction of SA Camarena, all of the interior walls had been

----------------------____________ September 1989/3

painted, the entire residence had recently been cleaned, and that a group of MFJP officers were pres- ently occupying, and thereby con- taminating, the residence.

On the first day after the arrival of the FBI forensic team, they surveyed and began a crime scene search of the residence and surrounding grounds. The residence consists of a large, two- story structure with a swimming pool, covered patio, aviary and tennis court surrounded by a com- mon wall. The most logical place to hold a prisoner at this location would be in the small out-building located to the rear of the main residence. This out-building, des- ignated as the "guest house," consisted of a small room, car- peted by a beige rug, wi th an adjoining bathroom. The entire room and bathroom were 'proc- essed for hairs, fibers and latent fingerprints. The single door into this room was made of steel and reinforced by iron bars. It was ultimately determined by means of

testimony and forensic evidence that several individuals interro- gated and tortured SA Camarena in this room. In addition, a locked bedroom, located on the second floor of the main house, was also

" The forensic pitfalls and problems of this case

. .. were eventually resolved.

" processed, and the bed linens were removed from a single bed. Known carpet samples were taken from every room in the residerice.

A beige VW Atlantic, which fit the general description of the smaller vehicle noted by the per- son who witnessed SA Cama- rena's abduction, was parked under a carport at the rear of the residence. The VW Atlantic was also processed for hairs, fibers and fingerprints.

On the second day, a thor- ough grounds search was con- ducted. As FBI forensic team members were walking around the tennis court, they caught a glimpse of something blue in one of the drains. Upon closer inspection, it appeared to be a folded license plate, at the bottom of the drain. However, a heavy, iron grate cov- ered the drain and prevented the plate's immediate retrieval.

When one of the FBI Agents returned to the main house to ask the MFJP officers for a crowbar, they became extremely curious and followed the Agent as he returned, empty handed, to the tennis court. By this ,time, a sec- ond Agent had managed to remove the grate by using a heavy-wire coat hanger. The license plate was retrieved, unfolded and pho- tographed. The MFJP officers, all of whom were now at the tennis court, became upset at this discov- ery, and one of them immediately contacted his superior at MFJP headquarters, who ordered them to

DEA Agents remove the brick wall concealing the black Mercury Gran Marquis believed to have been used in the kidnaping and transportation of SA Camarena.

4 I FBI Law Enforcement Bulletin _______________________________ _

..

- secure the license plate until the Assistant Primer Comandante arrived on the scene. After his arrival approximately 20 minutes later, he seized the license pI ate and would not allow the Ameri- cans to conduct any further searches.

However, by this time, five very large plastic bags of evidence had been recovered and were placed in the rear of a DEA truck. The evidence was quickly trans- ported to the DEA vault in the U.S. Consulate.

After negotiations between the United States and Mexico, the MFJP did allow a second, final search of the residence. On June 24, 1985, a forensic team returned and processed the four remaining rooms on the first floor of the main house.

By this point in the investiga- tion, an associate of Rafael Caro- Quintero had been arrested and interrogated by the MFJP. He stated that the bl.'Jies of two Americans, Albert Radelat and John Walker, who had been ab- ducted and killed by Mexican drug traffickers, were buried on the south side of La Primavera Park, a large, primitive park west of Guadalajara. The bodies of Radelat and Walker were located and recovered. Soil samples taken from the surface of an area near their graves were similar in most respects to the soil recovered earlier from the bodies of SA Camarena and Captain Zavala.

In September 1985, DEA personnel went to La Primavera park and sampled an area approx- imately 2 feet below the surface near the same site. This sample matched the soil samples from SA Camarena and Captain Zavala

almost grain for grain, indicating that this site was almost certainly their burial site before they were relocated to the Bravo ranch.

Later that fall, after further negotiations between the U.S. and the Mexican governments, pelmis- sion was finally granted for an FBI forensic team to process the evi- dence seized by the MFJP forensic team from 881 Lope De Vega the previous April. The evidence con- sisted of small samples the MFJP had taken of SA Camarena's bur- ial sheet, a piece of rope used to bind SA Camarena, a portion of a pillowcase removed from bedroom number 3, a piece of unsoiled rope removed from the covered patio and a laboratory report prepared by the MFJP Crime Laboratory. The remainder of the evidence had been destroyed for "health rea- sons."

"

interrogator during his ordeal at 881 Lope De Vega.

The Trial In July 1988, the main trial of

the murder, interrogation and abduction of SA Camarena began in U.S. District Court in Los Angeles, CA. The forensic evi- dence presented in this trial identi- fied 881 Lope De Vega as the site where SA Camarena had been held. The evidence also strongly associated two Mexican citizens, Rene Verdugo and Sergio Espino- Verdin, with the "guest house" at 881 Lope De Vega. Several types of forensic evidence were used to associate SA Camarena with 881 Lope De Vega: Forcibly removed head hairs, founeI in the "guest house" and bedroom number 4, in the VW Atlantic and in the Mer- cury Gran Marquis, and two types

... almost all of the evidence introduced at the trial made a tremendous impact on the

outcome of this proceeding.

In January 1986, a drug traf- ficker named Rene Verdugo, who was considered to be a high-rank- ing member of the Caro-Quintero gang, was apprehended and taken to San Diego, where he was aITested by the DEA. He was then transported to Washington, DC, where hair samples were taken. He refused to testify before a Fed- eral grand jury investigating the Camarena case. Later that year, DEA personnel obtained hair sam- ples in Mexico City from Sergio Espino- Verdin, a former federal comandante, who is believed to have been SA Camarena's primary

" of polyester rug fibers, a dark, rose-colored fiber and a light-col- ored fiber. Fabric evidence was also presented, which demon- strated the similarities of color, composition, Gonstruction and design between SA Camarena's burial sheet and the two pil- lowcases recovered from bed- rooms number 3 and 5.

Based on this evidence asso- ciating SA Camarena and 881 Lope De Vega, the FBI Labora- tory examiner was able to testify that SA Camarena was at this residence, as well as in the VW

----------------------------------- Septernber 1989 I 5

II I ----

cense Tennis lates

Li P F ound Court PRIVATE

BUSINESS ~.

BATHHOUSE & SPA I WALL

~ VW ~

ATLANTIC -"

GROUNDS Covered

- Porch I

(/) 0

WALL AND ARCHWAYS F~

0.. I GUEST ~J "0 IL ROOM Q) I. MAIDS a; ~ > Siorage .. 0

Swimming () 0;001 LIBRARY - l(!l ·z i~::;: , CO I, 0 en I ~ a: ::!E 0

0 I Storage 1 ..J a: 0 -< w

CD KITCHEN MAIN HOUSE

GARAGE Area

FRONT PORCH l

SIDE ENTRANCE

SIDE ENTRANCE

Shdlng Gale Left: Diagram of the 881 Lope De Vega grounds.

Atlantic and the Mercury Gran Marquis, and that he had been in a position such that his head hairs were forcibly removed. Captain Alfredo Zavala was also found to be associated with the "guest house" at 881 Lope De Vega. Light-colored nylon rug fibers, found on samples of his clothing taken at the second autopsy, matched the fibers from the "guest house" carpet.

A detailed model of the residence at 881 Lope De Vega was prepared by the Special Proj-

Top right: The beige VW Atlantic Which was found parked under a carport at the rear of the residence. Bottom right: The "guest house" in which Camarena was interrogated and tortured.

ects Section of the FBI Laboratory for the trial. Over 20 trial charts were also prepared to explain the various types of forensic evidence. These charts proved invaluable in clarifying the complicated tech- niques and characteristics used in the examination of the hair, fiber, fabric and cordage evidence.

Conclusion The forensic pitfalls and

problems in this case (i.e. destruc- tion of evidence, contamination of crime scenes) were eventually resolved. In some cases, certain

routine procedures had to be ig- nored or unconventional methods employed. However, in many instances, detailed trial testimony overcame the limitations of certain evidence, and eventually, almost all of the evidence introduced at the trial made a tremendous im- pact on the outcome of this pro- ceeding. After an 8-week trial, conducted under tight security af!d involving hundreds of witnesses, all of the defendants were found guilty, convicted on all counts and are currently serving lengthy sen- tences. lF~~

6 i FBI Law Enforcement Bulletin _________________________________ _

Chapter: Chapter 1 - Defining Terrorism Article Title: “Terrorism” Chapter 1 of the text goes into much detail about defining terrorism and the types of terrorism. What exactly constitutes terrorism and why does it seem so complicated to define? This article from the Federal Bureau of Investigation (FBI, 2021) defines terrorism as a "contested term, with no set definition for the concept or broad agreement among academic experts on its usage " (para. 1). Is it really that difficult to define? It’s a word and as such it should just be in any old dictionary or textbook glossary and boom there's the definition. Is it more complicated than that? To answer my own question, yes, it is very complicated. But at least I’m not alone in the complicatedness of defining terrorism as it seems like the FBI is having problems too. The article notes that “the recent spate of extremist attacks in the United States and Europe have highlighted the difficulty of defining what constitutes ‘terrorism’” (FBI, 2021, para. 2). Here, The FBI focuses on recent examples extremism to attempt to answer the question, even giving the readers an account of some of the recent terroristic attacks and how the relate to terrorism and extremism. By the end of the article the question remains unclear and unanswered, making this task of defining terrorism that much more confusing. The pro of this article is that there were some real-world examples. These help show the complicated nature of defining terrorism. The article would have been more interesting if there were some frontline details, like the definition from the FBI’s perspective, especially given it’s the leading legal enforcement mechanism in the country. Words: 270

Reference

Federal Bureau of Investigation. (2021). What We Investigate: Terrorism. Retrieved from

https://www.fbi.gov/investigate/terrorism

Commented [JW1]: When citing from a webpage, you must count the paragraphs and include a para. citation.

Commented [JW2]: Note how the quote within a quote appears: " ' ' " And note the citation here follows the quote since the source was not mentioned before the quote.

Homeland Security and Terrorism

Second Edition

Chapter 09

Homeland Security and Weapons of Mass Destruction

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

1

Learning Objectives

1. Define weapons of mass destruction (WMD).

2. Explain the history of the use of various weapons of mass destruction.

3. Distinguish between types of nuclear threats.

4. Explain how biological agents can be used as WMDs.

5. Describe the nature of chemicals and their use as WMDs.

6. Discuss how the various weapons of mass destruction can be delivered and their limitations

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Defining Weapons of Mass Destruction

Any explosive, incendiary, poison gas, bomb, grenade, or rocket having a propellant charge of more than four ounces, missile having an explosive or incendiary charge of more than one-quarter ounce, or mine or device similar to the above.

Poison gas.

Any weapon involving a disease organism.

Any weapon that is designed to release radiation at a level dangerous to human life.

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

History of the Deployment of Weapons of Mass Destruction

Historical Precedent for Biological WMDS

Historical Precedent for Chemical WMDS

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Historical Precedents for Biological WMDS

History of Use in United States

Individuals Rather Than International Groups Have Committed Terrorist Attacks Using Biological Weaponst

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Historical Precedents for Chemical WMDS

As Early as 1000 B.C. the Chinese Used Arsenic Smoke

Used Extensively in World War I

Used During World War II

Used in 1995 to Attack Subway Trains in Tokyo

Ricin Used in Las Vegas in 2008

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

The Threat of Nuclear Weapons of Mass Destruction: Destructiveness, Potential for Use, and Availability

WMDS Present a Vexing Problem for Homeland Security

Three General Types of WMDS:

Nuclear

Biological

Chemical

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Nuclear or Radiological Attack Can Be Mounted in Several Ways:

Obtain a Nuclear Weapon, Smuggle into the U.S., and Detonate It

Combine Radiological Materials With a Conventional Explosive Device Across a Wide Area

Use Conventional Explosives or Attacks or Nuclear Facilities or Materials in the U.S.,

Many Chemicals Could be Weaponized and Deployed Against a Population

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Nuclear and Radiological WMDS

Nuclear Bombs or Weapons

The Spread of Nuclear Material and Information

Smuggling Nuclear Weapons and Materials

Terrorist Attacks Using Dirty Bombs and Attacks on Nuclear Facilities

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Biological Weapons of Mass Destruction

Types of Biological Weapons

How Biological Weapons Work

Creating Biological Weapons

Threat Assessment and Biological Weaponst

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Chemical Weapons of Mass Destruction

Blister and Blood Agents

Choking and Nerve Agents

Creating Chemical Weapons

Advantages of Chemical Weapons

Weaponizing Chemicals

Means of Delivery

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Factors Constraining Terrorists From Using WMDS

Organizational Capabilities

Financial Resources

Logistical Resource

Knowledge/Skill/Acquisition

Materials and Technology Acquisition

Production

Weaponization and Delivery

State Sponsorship

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Examining Which Groups Might Use WMDs

Salience of Identity

Collective Incentives

Groups’ Cohesion and Ability to Mobilize

Opportunity to Acquire and Use It

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

image1.emf

image2.jpeg

image3.png

Homeland Security and Terrorism

Second Edition

Chapter 10

Cybercrime and Terrorism

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

1

Learning Objectives

1. Identify the methods of attacking cyber infrastructure.

2. Distinguish between cyber crime and cyber terrorism.

3. Discuss the various sectors within America that are vulnerable to cyber attacks.

4. Identify the types of information that terrorist groups post on their Internet home pages.

5. Examine how terrorists use the Internet.

6. Describe the federal cyber counterintelligence agencies and their operations  I chnaged the Verb to a berb that is measurable.

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Methods of Attacking Cyber Infrastructure

Physical or Conventional Attack

Electronic Attack or Electromagnetic Pulse

Malicious Code

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Distinguishing Hacking, Cyber Crime, Cyber Terrorism, and Cyber Warfare

Hacking

Cybercrime

Cyber Terrorism

Cyber Warfare

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Hacking

Persons Who Deliberately Gain (or Attempt to Gain) Unauthorized Access to Computer Systems

Three Categories of Hackers

Nation States

Criminals looking for financial gain

Terrorists, Anarchists Gaining Access to Disrupt

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Cyber Crime

Attacks on financial institutions, businesses, and industries, including military installations

Cyber stalking

Obscenity, including child pornography

Child molestation (obtaining contacts)

Sex tourism, in which pedophiles seek underage victims

Distribution of digital hate

Communications among criminal and terrorist groups

Gathering of intelligence information on potential targets

Identity theft

Money laundering

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Cyber Warfare

Gain economic or military intelligence

Test another country’s defenses

Cripple another country’s weapons systems

Cripple another country’s military communications systems

Cause economic chaos

Military posturing or political bargaining

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Cyber Terrorism

The Use of Computer Network Tools to Harm or Shut Down Critical National Infrastructures

Many Avenues for Disruption and Numerous Targets

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Physical Attacks on Communications Infrastructure

Stealing Information or Disabling With Viruses and Worms

Nation is Not Prepared to Constitute the Internet After a Massive Disruption

Nation is Not Prepared to Enact a Coordinated, Comprehensive Response to a Significant Breach in the Internet

Breach Could Have Significant Long-Lasting, Detrimental Effects on Our Economy, Defense, and Society in General

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Significant Cyber Gaps

Lack of Formal Trip Wires to Indicate an Attack is Underway

Lack of Accountability and Clarity on Which Institutions Provide Reconstitution

Lack of Resources For Institutions to Reconstitute the Internet Infrastructure Should a Breach Occur

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Deterring Cyber Intrusions and Attacks

Remove Cyber Anonymity

Mandate That Institutions Use and Constantly Update Security Software

Minimize the Amount of Time That Computers are Online

Periodically Check Computers For Worms and Other Malicious Code

Centralize Reporting of Computer Breaches and Intrusions

Need Better Mechanisms For Reporting Hacking

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Reasons Why Terrorists Use the Internet

Easy Access

Little or No Regulation, Censorship or Other Government Control

Potentially Large Audiences Spread Throughout the World

Anonymity of Communication

Fast Flow of Information

Inexpensive Development and Maintenance of a Web Presence

Multimedia Environment

The Ability to Shape Coverage in the Traditional Mass Media

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

How Terrorists Use the Internet

Psychological Warfare

Publicity and Propaganda

Data Mining

Fund-Raising

Recruitment and Mobilization

Networking

Sharing Information

Planning and Coordination

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Agencies Charges With Combating Cyber Terrorism

FBI’s Cyber Crime Division

Department of Homeland Securities’ National Cyber Security Division

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

image1.emf

image2.jpeg

image3.png

Homeland Security and Terrorism

Second Edition

Chapter 11

Terrorist Financing

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

1

Learning Objectives

1. Explain how the terrorists financed the 911 attacks.

2. Explain the difference between money laundering and terrorist financing.

3. Discuss how the United States is attempting to reduce terrorist financing.

4. Describe how terrorist organizations raise money.

5. Describe how terrorist groups move money.

6. Discuss identity fraud and identity theft.

7. Explain how breeder documents work

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Terrorist Financing of the 9/11 Attacks

$300,000 Was Deposited in Bank

Moved to U.S. by Bank Transfer

Hijackers Carrying Traveler’s Checks to US

Credit or Debit Cards Used to Access Foreign Bank Account

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Distinguishing Terrorist Financing and Money Laundering

Money Laundering – Three Step Process:

Illegally Derived Money is Placed Into the Financial System

It is Layered or Moved Through the Financial System, Usually Internationally, and Intermingled With Legitimate Profits and Monies to Hide Its Provenance

It is Returned and Reintegrated Into the Legitimate Economy

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering (1 of 2)

The Central Intelligence Agency

Bureau of Customs and Border Protection and Bureau of Immigration and Customs

U.S. Secret Service

The Bureau of Alcohol, Tobacco, Firearms, and Explosives

Drug Enforcement Agency

Federal Bureau of Investigations

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering (2 of 2)

Bureau of Economic and Business Affairs

Office of the Coordinator for Counterterrorism

Executive Office for Terrorist Financing and Financial Crime

Financial Crimes Enforcement Network

Internal Revenue Service

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Means and Methods of Terrorist Financial Transactions

Earning or Acquiring Resources

Moving or Laundering the Money

Storing or Banking the Money Until It is Needed

Black Market Oil and Gas

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Earning and Acquiring Resources

Donor Support of Terrorism

Criminal Activity

Charities

Legitimate Businesses

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Moving or Laundering Money

Precious Commodities

Banking and Wire Transfers

Money Brokers or Hawaladars

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Storing or Banking Money

Terrorist Organizations Acquire Agriculture Goods, Precious Gems and Metals, and Disposable Goods

Terrorist Organizations Develop a Business Model Whereby they Estimate their Cash Flow Needs and Develop a Timely Process or Method to Convert these Goods into Cash

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Black Market Oil and Gas

Unique to ISIS

ISIS Received About $2–4 Million in Daily Profits

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Saudi Arabia’s Financing of Terrorism

America’s Closest Ally in the Middle East

Wahhabism

Saudi Arabian Charities Support Terrorists

Saudi Government Supports Sunny and Other Terrorist Groups

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Identity Fraud or Theft

Avoid Watch List

Obscure Their Whereabouts

Gain Unauthorized Access

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Real ID Act

A Photo Identity Document

Documentation Showing The Person’s Date of Birth

Proof of Person’s Social Security Account Number (SSN) or Verification That the Person is Not Eligible for a SSN

Documentation Showing the Person’s Name and Address of Principal Residence

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

Copyright

Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved

image1.emf

image2.jpeg

image3.png

Criteria No Submission: O Points

Emerging (F through D range) 12 points

Satisfactory (C Range) 14 points

Proficient (B Range) 16 points

Exemplary (A Range) 20 points

Criterion score 20/20

Thesis and Ideas: Explores the appropriate topic based on chapters read in the week and displays college level thinking Submits the correct number of Journal articles.

Student did not submit the assignment

Work does not meet assignment expectations; shows little or no understanding of assignment concepts

Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts

Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments

Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts

20/20

Criteria

No Submission: O Points

Emerging (F through D range) 12 points

Satisfactory (C Range) 14 points

Proficient B Range 16 points

Exemplary (A Range 20 points

Criterion score 20/20

Comprehension: Synthesizes information and communicates it through student’s own thoughts and words.

Student did not submit the assignment

Work does not meet assignment expectations; shows little or no understanding of assignment concepts

Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts

Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments

Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts

20/20

Criteria No Submission: O Points

Emerging (F through D range) 12 points

Satisfactory (C Range) 14 points

Proficient (B Range) 16 points

Exemplary (A Range) 20 points

20/20

Evidence critical and analytical skills

Student did not submit the assignment

Work does not meet assignment expectations; shows little or no understanding of assignment concepts

Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts

Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments

Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts

20/20

Criteria No Submission: 0 Points

Emerging (F through D range) 12 points

Satisfactory (C Range) 14 points

Proficient B Range 16 points

Exemplary (A Range) 20 points

20/20

Research: Appropriate use of scholarly sources

Student did not submit the assignment

Work does not meet assignment expectations; shows little or no understanding of assignment concepts

Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts

Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments

Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key

20/20

Criteria No Submission: 0 Points

Emerging (F through D range) 6 points

Satisfactory (C Range) 7 points

Proficient B Range 8 points

Exemplary (A Range) 10 points

10/10

Organization: Writing demonstrates well- developed body that evidences each element from the thesis in succinct paragraphs and each

Student did not submit the assignment

Work does not meet assignment expectations; shows little or no understanding of assignment concepts

Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of

Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate

Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the

10/10

paragraph supports the thesis.

the assignment concepts

and apply key assignments

ability to evaluate, apply and synthesize key

Criteria No Submission 0 Points

Emerging (F through D range) 6 points

Satisfactory (C Range) 7 points

Proficient (B Range) 8 points

Exemplary (A Range) 10 points

10/10

Used APA formatted citations and references and used correct structural formatting

Student did not submit the assignment

No attempt at APA formatting when using references

APA is attempted with numerous errors

Using APA format accurately; errors are noticeable

Using APA format proficiently, text is basically error free

Overall Score

Emerging (F-D) Satisfactory (C Range)

Proficient (B range)

Exemplary (A range)

Research & Report

For your Week 3 Journal Assignment, you should find two articles that relates to the material covered in your reading this week:

· Chapter 9: Homeland Security and Weapons of Mass Destruction

· Chapter 10: Cyber Crime and Terrorism

· Chapter 11: Terrorist Financing

Use any peer reviewed resources (Keiser University Library sources or government websites ( .GOV better) to find an article that discusses the same topic. Then write in an APA review of the article. You should submit two of these. Submit them in the same document.

Requirements:

· Complete two article reviews.

· Each review should have a minimum of 250-350 words.

· Each review should explain the significance of the article and relate it to your reading this week.

· Each review should end with your opinion on the pros or cons of the article being reviewed.

· Note: Do NOT use any articels older than 5 years. This field is always changing, so you should be using current information (no older than five years).

· Note: Do NOT simply cut-and-paste from a website or from an article. Yes, you should be sources to find the information for this journal assignment, but do not simply cut-and-paste someone else's words. As you review the article, put it in your own words. Be sure to cite in APA. If you copy and paste, you will NOT get credit for doing this. Your reviews must be your own words, thoughts, and analysis.

Resources:

· Homeland Security Journal Rubric Homeland Security Journal Rubric - Alternative Formats

· Example Student Journals:

· Example 1 - “Florida Officials Seek Tourism Boost after Alberto Blows Through” - Alternative Formats

· Example 2 - "What We Investigate: Terrorism" Example 2 - "What We Investigate: Terrorism" - Alternative Formats

image.gif

image2.gif

Chapter 12: Structure for Managing Emergency Response

Article Name:

“Florida officials seek tourism boost after Alberto blows through”

Article Review:

The Emergency Operations Center should be the most important building of any community.

This is where all the knowledge and nuts and bolts to keep the safety, economy, and welfare of

all the citizens and dynamics of a city or county, flowing. Every part of our country has its own

hazards, from California and earthquakes, wildfires and tsunami threats, to hurricanes, tornadoes,

and floods in the South and Midwest. Every EOC has its own set of emergency plans based on

the threat assessment.

I bring up economy because you see it every storm season, disasters blow in and everyone flees,

including the tourists which would have spurred the economy but now are gone, and so is the

economy. Disasters not only pull down the economy, and the lack of needed tourism, but then is

the increased cost of preparing, mitigating, and recovery of disasters and emergencies. Hurricane

season started in the south, and now Florida is trying to pull back in tourists in between storms. I

understand that, but I also see a risk involved. According to one source, “As winds and rains let

up from Subtropical Storm Alberto, Florida officials Tuesday were quickly spinning ways to

draw tourists to areas that may have missed out on Memorial Day crowds” (Turner, 2018, para.

1). The Governor of Florida visited an EOC to thank them for a job well done for this first storm

as he was questioned about tourism efforts. He said, “The Legislature gave us $76 million again

this year (for visit Florida), and part of that money is to work on when we have something like

this, to let people know we’re back open for business” (Turner, 2018, para. 5). The EOC is the

hub and is excellent at tracking emergency and disaster situations before they happen, when

possible, and that success is shown by minimal loss of life and property.

When greed steps in, that is when you see tourism take a back seat, but most who have been

through the big storms know those risks, and you see a good attitude with the Governor of

Florida in this article who knows what his State is facing. It shows a good leader also who shows

appreciation to those he knows keeps the public safe.

WC 375

Turner, J. (2018, May 30). Florida officials seek tourism boost after Alberto blows through.

Florida Division of Emergency Management. Retrieved from

http://www.floridadisaster.gov/FloridaofficialsseektourismboostafterAlbertoblows

through

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com