----
l?l g3TI September 1989 Law Enforcement Bulletin
The Enrique Camarena Case
Also In This Issue: Operational Streamlining The Computer Criminal Operation Freezer Burn
Traffic Stops
." ((
.. 4""""
I
If you have issues viewing or accessing this file, please contact us at NCJRS.gov.
September 1989, Volume 58, Number 9
Features I
C 12/533 I 2/.5..3 (I r7 12-/sS5 ~4 f 2-/ S3~ e
Departments
The Enrique Camarena Case- A Forensic Nightmare By Michael P. Malone
Operational Streamlining By Hillary M. Robinette
Operation Freezer Burn By P.R. Beseler
The Computer Criminal: An Investigative Assessment By Larry Coutourie
Traffic StopS: Police Powers Under the Fourth Amendment By John Gales Sauls 121533-
121538
12 The Bulletin Reports
23 Book Review
U.S. Department of Justice National Institute of Justice
This document has been reproduced exactly as received from the pers~n or organization originating it. Points of view or opinions stated In this document. ~re tho.~e of the authors and do not necessarily repr~sent the official PO~ltlon or policies of the National Institute of Justice.
! 2- / S .'5 7 ~4 Focus 32 VICAP Alert
to the National Criminal Justice Reference Service (NCJRS).
~urther reproduction outside of the NCJRS system requires permis- sion of the ~owner.
l?l21J Law Enforcement Bulletin United States Department of Justice Published by the Office of Public Affairs, Federal Bureau of Investigation Milt Ahlerich, Assistant Director Washington, DC 20535
William S. Sessions, Director
The Attorney General has determined that the publication of this periodical is necessary in the transaction of the public business required by law of the Department of Justice. Use of funds for printing this periodical has been approved by the Director of :he Office of Management and Budget.
ISSN 0014-5688
Editor-Stephen D. Gladis Managing Editor-Kathryn E. Sulewski Art Director-John E. Ott Assistant Editor-Alice S. Cole Production Manager-Joseph Andrew DiRosa
The Cover: The abduction and subsequent murder of DEA Special Agent Enrique Camarena initiated one of the most extensive forensic investigations ever conducted by the FBI Laboratory. See article p. 1.
The FBI Law Enforcement Bulletin (ISSN-0014-5688) is published monthly by the Federal Bureau of Investigation, 10th and Pennsylvania Ave., N.W., Washington, DC 20535. Second-Class postage paid at Washington, DC. Postmaster: Send address changes to Federal Bureau of Investigation, FBI Law Enforcement Bul- letin, Washington, DC 20535.
USPS 383-310
j.; ,
, f
!.
\ \
\
\.
. \ ~ \ '. .
\
I 2.1 S 3...J
The Enrique Camarena Case A Forensic Nightmare
By MICHAEL P. MALONE
Special Agent Laboratory Division
Federal Bureau of Investigation Washington, DC
.. ' - "
,j
... ..' '~ '~" ~''''. ~~
______ September 1989 I 1
O n February 7, 1985, U.S. Drug Enforcement Agency (DEA) Special
Agent (SA) Enrique Camarena was abducted near the U.S. Con- sulate in Guadalajara, Mexico. A short time later, Capt. Alfredo Zavala, a DEA source, was also abducted from a car near the Guadalajara Airport. These two abductions would trigger a series of events leading to one of the largest investigations ever con- ducted by the DEA and would result in one of the most extensive cases ever received by the FBI Laboratory.
Throughout this lengthy in- vestigation, unusual forensic prob- lems arose that required unusual solutions. Eventually, numerous suspects were arrested, both in the United States and Mexico, which culminated in an 8-week trial held in U. S. District Court in Los Angeles, CA.
The Abduction On February 7, 1985, SA
Camarena left the DEA Resident Office to meet his wife for lunch.
"
On this day, a witness observed a man being forced into the rear seat of a light-colored, compact car in front of the Camelot Restaurant and provided descriptions of sev- eral of the assailants. After some initial reluctance, Primer Coman- dante Pavon-Reyes of the Mexican Federal Judicial Police (MFJP) was put in charge of the investiga- tion, and Mexican investigators were assigned to the case. Two known drug traffickers, Rafael Caro-Quintero and Ernesto Fon- seca, were quickly developed as suspects. A short time later at the Guadalajara Airport, as· Caro- Quintero and his men attempted to flee by private jet, a confrontation developed between Caro-Quin- tero's men, the MFJP and DEA Agents. After some discussion, Caro-Quintero and his' men were permitted to board and leave. It was later learned that a 6-figure bribe had been paid to Pavon- Reyes to allow this departure.
The Investigation During February 1985,
searches of several residences and
ThrQughout this lengthy investigation, unusual
forensic problems arose that required unusual solutions.
" Special Agent Malone
ranches throughout Mexico proved fruitless, despite the efforts of the DEA task force assigned to inves- tigate this matter and the tremen- dous pressure being applied by the U.S. Government to accelerate the investigation. High-level,. U.S. Government officials, as well as their Mexican counterparts, were becoming directly involved in the case. It is believed that because of this "heat," the Mexican drug traffickers and certain Mexican law enforcement officials fab- ricated a plan. According to the plan, the MFJP would receive an anonymous letter indicating that SA Camarena. and Captain Zavala were being held at the Bravo drug gang's ranch in La Angostura, Michoacan, approximately 60 miles southeast of Guadalaj ara. The MFJP was supposed to raid the ranc~, eliminate the drug gang and eventually discover the bodies of SA Camarena and Captain Zavala buried on the ranch. The DEA would then be notified and the case would be closed. Thus, the Bravo gang would provide an easy scapegoat.
During early March, MFJP officers raided the Bravo ranch before the DEA Agents alTived. In the resulting shootout, all of the gang members, as well as one MFJP officer, were killed. How- ever, due to a mix-up, the bodies of SA Camarena and Captain Zavala were not buried on the Bravo ranch in time to be dis- covered as planned. The individ- uals paid to do this job simply left them by the side of a road near the ranch. It was later learned that cer- tain Mexican law enforcement officials were paid a large sum of money to formulat\~ and carryout this plan in order to obstruct and prematurely conclude the inves- tigation.
2 i FBI Law Enforcement Bulletin ______________________________ _
•
Shortly after this shootout, a passer-by found two partially decomposed bodies, wrapped in plastic bags, along a road near the Bravo ranch. The bodies were removed and transported to a local morgue where they were autop- sied. The DEA was then advised of the discovery of the bodies and their subsequent removal to an- other morgue in Guadalajara, where a second autopsy was per- formed.
On March 7, 1985, the FBI dispatched a forensic team to Guadalajara. They immediately proceeded to the morgue to iden- tify the bodies and to process any evidence which might be present. After much bureaucratic delay from the local officials, they were finally allowed to proceed. The bodies were identified only as cadavers number I and number 2. It was apparent that each body had been autopsied and that both were in an advanced state of decom- position. Cadaver number I was quickly identified by the fin- gerprint expert as that of SA Camarena. Mexican officials would not allow the second body to be identified at this time; however, it was later identified through dental records as Captain Zavala.
The FBI forensic team requested permission to process the clothing, cordage and burial sheet found ~with the bodies but the request was denied. However, they were allowed to cut small, "known" samples from these items and obtain hair samples from both bodies. Soil samples were also removed from the bodies and the clothing items.
A forensic pathologist from the Armed Forces Institute of Pathology was allowed to examine
the body of SA Camarena. He concluded that SA Camarena's death was caused by blunt-force injuries. In addition, SA Cama- rena had a hole in his skull caused by a rod-like instrument. SA
"
ing State Judicial Police Officers, were arrested and interrogated concerning the kidnaping of SA Camarena. Primer Comandante Pavon-Reyes was fired, and arrest warrants were issued for a number
... certain Mexican law enforcement officials were paid a large sum of money ... to. obs.truct
and prematurely concludt:: the inVestigation.
Camarena's body was then released to the American officials and immediately flown to the United States.
The next day, both FBI and DEA personnel proceeded to the Bravo ranch where the bodies were initially found. Because this site had been a completely uncon- trolled crime scene, contaminated by both police personnel and onlookers, only a limited crime scene search was conducted. It was immediately noted that there was no grave site in the area, and that the ~olor of the soil where the bodies had been deposited differed from the soil that had been re- moved from the bodies. There- fore, "known" soil samples from the drop site were taken to com- pare with soil removed from the victims. It was also noted that there were no significant body flu- ids at the "burial" site. This led the forensic team to conclude that the bodies had been buried else- where, exhumed and transported to this site.
The MFJP officials were later confronted with the evidence that the bodies had been relocated to the Michoacan area. This was one of the factors which led to a new, unilateral MFJP investigation. As a result, several suspects, includ-
" of international drug traffickers, including Rafael Caro-Quintero and Ernesto Fonseca.
In late March 1985, DEA Agents located a black Mercury. Gran Marquis which they believed was used in the kidnaping or trans- portation of SA Camarena. The vehicle had been stored in a garage in Guadalajara, and a brick wall had been constructed at the entrance to conceal it. The vehicle was traced to a Ford dealership owned by Caro-Quintero. Under the watchful eye of the MFJP at the Guadalajara Airport, the FBI forensic team processed the vehi- cle for any hair, fiber, blood and/ or fingerprint evidence it might contain.
During April 1985, the MFJP informed the DEA that they be- lieved they had located the residence where SA Camarena and Captain Zavala had been held. The FBI forensic team was imme- diately dispatched to Guadalajara; however, they were not allowed to proceed to the residence, located at 881 Lope De Vega, until an MFJP forensic team had processed the residence and had removed all of the obvious evidence. The DEA was also informed that since the abduction of SA Camarena, all of the interior walls had been
----------------------____________ September 1989/3
painted, the entire residence had recently been cleaned, and that a group of MFJP officers were pres- ently occupying, and thereby con- taminating, the residence.
On the first day after the arrival of the FBI forensic team, they surveyed and began a crime scene search of the residence and surrounding grounds. The residence consists of a large, two- story structure with a swimming pool, covered patio, aviary and tennis court surrounded by a com- mon wall. The most logical place to hold a prisoner at this location would be in the small out-building located to the rear of the main residence. This out-building, des- ignated as the "guest house," consisted of a small room, car- peted by a beige rug, wi th an adjoining bathroom. The entire room and bathroom were 'proc- essed for hairs, fibers and latent fingerprints. The single door into this room was made of steel and reinforced by iron bars. It was ultimately determined by means of
testimony and forensic evidence that several individuals interro- gated and tortured SA Camarena in this room. In addition, a locked bedroom, located on the second floor of the main house, was also
" The forensic pitfalls and problems of this case
. .. were eventually resolved.
" processed, and the bed linens were removed from a single bed. Known carpet samples were taken from every room in the residerice.
A beige VW Atlantic, which fit the general description of the smaller vehicle noted by the per- son who witnessed SA Cama- rena's abduction, was parked under a carport at the rear of the residence. The VW Atlantic was also processed for hairs, fibers and fingerprints.
On the second day, a thor- ough grounds search was con- ducted. As FBI forensic team members were walking around the tennis court, they caught a glimpse of something blue in one of the drains. Upon closer inspection, it appeared to be a folded license plate, at the bottom of the drain. However, a heavy, iron grate cov- ered the drain and prevented the plate's immediate retrieval.
When one of the FBI Agents returned to the main house to ask the MFJP officers for a crowbar, they became extremely curious and followed the Agent as he returned, empty handed, to the tennis court. By this ,time, a sec- ond Agent had managed to remove the grate by using a heavy-wire coat hanger. The license plate was retrieved, unfolded and pho- tographed. The MFJP officers, all of whom were now at the tennis court, became upset at this discov- ery, and one of them immediately contacted his superior at MFJP headquarters, who ordered them to
DEA Agents remove the brick wall concealing the black Mercury Gran Marquis believed to have been used in the kidnaping and transportation of SA Camarena.
4 I FBI Law Enforcement Bulletin _______________________________ _
..
- secure the license plate until the Assistant Primer Comandante arrived on the scene. After his arrival approximately 20 minutes later, he seized the license pI ate and would not allow the Ameri- cans to conduct any further searches.
However, by this time, five very large plastic bags of evidence had been recovered and were placed in the rear of a DEA truck. The evidence was quickly trans- ported to the DEA vault in the U.S. Consulate.
After negotiations between the United States and Mexico, the MFJP did allow a second, final search of the residence. On June 24, 1985, a forensic team returned and processed the four remaining rooms on the first floor of the main house.
By this point in the investiga- tion, an associate of Rafael Caro- Quintero had been arrested and interrogated by the MFJP. He stated that the bl.'Jies of two Americans, Albert Radelat and John Walker, who had been ab- ducted and killed by Mexican drug traffickers, were buried on the south side of La Primavera Park, a large, primitive park west of Guadalajara. The bodies of Radelat and Walker were located and recovered. Soil samples taken from the surface of an area near their graves were similar in most respects to the soil recovered earlier from the bodies of SA Camarena and Captain Zavala.
In September 1985, DEA personnel went to La Primavera park and sampled an area approx- imately 2 feet below the surface near the same site. This sample matched the soil samples from SA Camarena and Captain Zavala
almost grain for grain, indicating that this site was almost certainly their burial site before they were relocated to the Bravo ranch.
Later that fall, after further negotiations between the U.S. and the Mexican governments, pelmis- sion was finally granted for an FBI forensic team to process the evi- dence seized by the MFJP forensic team from 881 Lope De Vega the previous April. The evidence con- sisted of small samples the MFJP had taken of SA Camarena's bur- ial sheet, a piece of rope used to bind SA Camarena, a portion of a pillowcase removed from bedroom number 3, a piece of unsoiled rope removed from the covered patio and a laboratory report prepared by the MFJP Crime Laboratory. The remainder of the evidence had been destroyed for "health rea- sons."
"
interrogator during his ordeal at 881 Lope De Vega.
The Trial In July 1988, the main trial of
the murder, interrogation and abduction of SA Camarena began in U.S. District Court in Los Angeles, CA. The forensic evi- dence presented in this trial identi- fied 881 Lope De Vega as the site where SA Camarena had been held. The evidence also strongly associated two Mexican citizens, Rene Verdugo and Sergio Espino- Verdin, with the "guest house" at 881 Lope De Vega. Several types of forensic evidence were used to associate SA Camarena with 881 Lope De Vega: Forcibly removed head hairs, founeI in the "guest house" and bedroom number 4, in the VW Atlantic and in the Mer- cury Gran Marquis, and two types
... almost all of the evidence introduced at the trial made a tremendous impact on the
outcome of this proceeding.
In January 1986, a drug traf- ficker named Rene Verdugo, who was considered to be a high-rank- ing member of the Caro-Quintero gang, was apprehended and taken to San Diego, where he was aITested by the DEA. He was then transported to Washington, DC, where hair samples were taken. He refused to testify before a Fed- eral grand jury investigating the Camarena case. Later that year, DEA personnel obtained hair sam- ples in Mexico City from Sergio Espino- Verdin, a former federal comandante, who is believed to have been SA Camarena's primary
" of polyester rug fibers, a dark, rose-colored fiber and a light-col- ored fiber. Fabric evidence was also presented, which demon- strated the similarities of color, composition, Gonstruction and design between SA Camarena's burial sheet and the two pil- lowcases recovered from bed- rooms number 3 and 5.
Based on this evidence asso- ciating SA Camarena and 881 Lope De Vega, the FBI Labora- tory examiner was able to testify that SA Camarena was at this residence, as well as in the VW
----------------------------------- Septernber 1989 I 5
II I ----
cense Tennis lates
Li P F ound Court PRIVATE
BUSINESS ~.
BATHHOUSE & SPA I WALL
~ VW ~
ATLANTIC -"
GROUNDS Covered
- Porch I
(/) 0
WALL AND ARCHWAYS F~
0.. I GUEST ~J "0 IL ROOM Q) I. MAIDS a; ~ > Siorage .. 0
Swimming () 0;001 LIBRARY - l(!l ·z i~::;: , CO I, 0 en I ~ a: ::!E 0
0 I Storage 1 ..J a: 0 -< w
CD KITCHEN MAIN HOUSE
GARAGE Area
FRONT PORCH l
SIDE ENTRANCE
SIDE ENTRANCE
Shdlng Gale Left: Diagram of the 881 Lope De Vega grounds.
Atlantic and the Mercury Gran Marquis, and that he had been in a position such that his head hairs were forcibly removed. Captain Alfredo Zavala was also found to be associated with the "guest house" at 881 Lope De Vega. Light-colored nylon rug fibers, found on samples of his clothing taken at the second autopsy, matched the fibers from the "guest house" carpet.
A detailed model of the residence at 881 Lope De Vega was prepared by the Special Proj-
Top right: The beige VW Atlantic Which was found parked under a carport at the rear of the residence. Bottom right: The "guest house" in which Camarena was interrogated and tortured.
ects Section of the FBI Laboratory for the trial. Over 20 trial charts were also prepared to explain the various types of forensic evidence. These charts proved invaluable in clarifying the complicated tech- niques and characteristics used in the examination of the hair, fiber, fabric and cordage evidence.
Conclusion The forensic pitfalls and
problems in this case (i.e. destruc- tion of evidence, contamination of crime scenes) were eventually resolved. In some cases, certain
routine procedures had to be ig- nored or unconventional methods employed. However, in many instances, detailed trial testimony overcame the limitations of certain evidence, and eventually, almost all of the evidence introduced at the trial made a tremendous im- pact on the outcome of this pro- ceeding. After an 8-week trial, conducted under tight security af!d involving hundreds of witnesses, all of the defendants were found guilty, convicted on all counts and are currently serving lengthy sen- tences. lF~~
6 i FBI Law Enforcement Bulletin _________________________________ _
Chapter: Chapter 1 - Defining Terrorism Article Title: “Terrorism” Chapter 1 of the text goes into much detail about defining terrorism and the types of terrorism. What exactly constitutes terrorism and why does it seem so complicated to define? This article from the Federal Bureau of Investigation (FBI, 2021) defines terrorism as a "contested term, with no set definition for the concept or broad agreement among academic experts on its usage " (para. 1). Is it really that difficult to define? It’s a word and as such it should just be in any old dictionary or textbook glossary and boom there's the definition. Is it more complicated than that? To answer my own question, yes, it is very complicated. But at least I’m not alone in the complicatedness of defining terrorism as it seems like the FBI is having problems too. The article notes that “the recent spate of extremist attacks in the United States and Europe have highlighted the difficulty of defining what constitutes ‘terrorism’” (FBI, 2021, para. 2). Here, The FBI focuses on recent examples extremism to attempt to answer the question, even giving the readers an account of some of the recent terroristic attacks and how the relate to terrorism and extremism. By the end of the article the question remains unclear and unanswered, making this task of defining terrorism that much more confusing. The pro of this article is that there were some real-world examples. These help show the complicated nature of defining terrorism. The article would have been more interesting if there were some frontline details, like the definition from the FBI’s perspective, especially given it’s the leading legal enforcement mechanism in the country. Words: 270
Reference
Federal Bureau of Investigation. (2021). What We Investigate: Terrorism. Retrieved from
https://www.fbi.gov/investigate/terrorism
Commented [JW1]: When citing from a webpage, you must count the paragraphs and include a para. citation.
Commented [JW2]: Note how the quote within a quote appears: " ' ' " And note the citation here follows the quote since the source was not mentioned before the quote.
Homeland Security and Terrorism
Second Edition
Chapter 09
Homeland Security and Weapons of Mass Destruction
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
1
Learning Objectives
1. Define weapons of mass destruction (WMD).
2. Explain the history of the use of various weapons of mass destruction.
3. Distinguish between types of nuclear threats.
4. Explain how biological agents can be used as WMDs.
5. Describe the nature of chemicals and their use as WMDs.
6. Discuss how the various weapons of mass destruction can be delivered and their limitations
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Defining Weapons of Mass Destruction
Any explosive, incendiary, poison gas, bomb, grenade, or rocket having a propellant charge of more than four ounces, missile having an explosive or incendiary charge of more than one-quarter ounce, or mine or device similar to the above.
Poison gas.
Any weapon involving a disease organism.
Any weapon that is designed to release radiation at a level dangerous to human life.
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
History of the Deployment of Weapons of Mass Destruction
Historical Precedent for Biological WMDS
Historical Precedent for Chemical WMDS
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Historical Precedents for Biological WMDS
History of Use in United States
Individuals Rather Than International Groups Have Committed Terrorist Attacks Using Biological Weaponst
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Historical Precedents for Chemical WMDS
As Early as 1000 B.C. the Chinese Used Arsenic Smoke
Used Extensively in World War I
Used During World War II
Used in 1995 to Attack Subway Trains in Tokyo
Ricin Used in Las Vegas in 2008
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
The Threat of Nuclear Weapons of Mass Destruction: Destructiveness, Potential for Use, and Availability
WMDS Present a Vexing Problem for Homeland Security
Three General Types of WMDS:
Nuclear
Biological
Chemical
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Nuclear or Radiological Attack Can Be Mounted in Several Ways:
Obtain a Nuclear Weapon, Smuggle into the U.S., and Detonate It
Combine Radiological Materials With a Conventional Explosive Device Across a Wide Area
Use Conventional Explosives or Attacks or Nuclear Facilities or Materials in the U.S.,
Many Chemicals Could be Weaponized and Deployed Against a Population
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Nuclear and Radiological WMDS
Nuclear Bombs or Weapons
The Spread of Nuclear Material and Information
Smuggling Nuclear Weapons and Materials
Terrorist Attacks Using Dirty Bombs and Attacks on Nuclear Facilities
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Biological Weapons of Mass Destruction
Types of Biological Weapons
How Biological Weapons Work
Creating Biological Weapons
Threat Assessment and Biological Weaponst
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Chemical Weapons of Mass Destruction
Blister and Blood Agents
Choking and Nerve Agents
Creating Chemical Weapons
Advantages of Chemical Weapons
Weaponizing Chemicals
Means of Delivery
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Factors Constraining Terrorists From Using WMDS
Organizational Capabilities
Financial Resources
Logistical Resource
Knowledge/Skill/Acquisition
Materials and Technology Acquisition
Production
Weaponization and Delivery
State Sponsorship
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Examining Which Groups Might Use WMDs
Salience of Identity
Collective Incentives
Groups’ Cohesion and Ability to Mobilize
Opportunity to Acquire and Use It
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
image1.emf
image2.jpeg
image3.png
Homeland Security and Terrorism
Second Edition
Chapter 10
Cybercrime and Terrorism
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
1
Learning Objectives
1. Identify the methods of attacking cyber infrastructure.
2. Distinguish between cyber crime and cyber terrorism.
3. Discuss the various sectors within America that are vulnerable to cyber attacks.
4. Identify the types of information that terrorist groups post on their Internet home pages.
5. Examine how terrorists use the Internet.
6. Describe the federal cyber counterintelligence agencies and their operations I chnaged the Verb to a berb that is measurable.
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Methods of Attacking Cyber Infrastructure
Physical or Conventional Attack
Electronic Attack or Electromagnetic Pulse
Malicious Code
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Distinguishing Hacking, Cyber Crime, Cyber Terrorism, and Cyber Warfare
Hacking
Cybercrime
Cyber Terrorism
Cyber Warfare
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Hacking
Persons Who Deliberately Gain (or Attempt to Gain) Unauthorized Access to Computer Systems
Three Categories of Hackers
Nation States
Criminals looking for financial gain
Terrorists, Anarchists Gaining Access to Disrupt
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Cyber Crime
Attacks on financial institutions, businesses, and industries, including military installations
Cyber stalking
Obscenity, including child pornography
Child molestation (obtaining contacts)
Sex tourism, in which pedophiles seek underage victims
Distribution of digital hate
Communications among criminal and terrorist groups
Gathering of intelligence information on potential targets
Identity theft
Money laundering
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Cyber Warfare
Gain economic or military intelligence
Test another country’s defenses
Cripple another country’s weapons systems
Cripple another country’s military communications systems
Cause economic chaos
Military posturing or political bargaining
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Cyber Terrorism
The Use of Computer Network Tools to Harm or Shut Down Critical National Infrastructures
Many Avenues for Disruption and Numerous Targets
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Physical Attacks on Communications Infrastructure
Stealing Information or Disabling With Viruses and Worms
Nation is Not Prepared to Constitute the Internet After a Massive Disruption
Nation is Not Prepared to Enact a Coordinated, Comprehensive Response to a Significant Breach in the Internet
Breach Could Have Significant Long-Lasting, Detrimental Effects on Our Economy, Defense, and Society in General
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Significant Cyber Gaps
Lack of Formal Trip Wires to Indicate an Attack is Underway
Lack of Accountability and Clarity on Which Institutions Provide Reconstitution
Lack of Resources For Institutions to Reconstitute the Internet Infrastructure Should a Breach Occur
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Deterring Cyber Intrusions and Attacks
Remove Cyber Anonymity
Mandate That Institutions Use and Constantly Update Security Software
Minimize the Amount of Time That Computers are Online
Periodically Check Computers For Worms and Other Malicious Code
Centralize Reporting of Computer Breaches and Intrusions
Need Better Mechanisms For Reporting Hacking
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Reasons Why Terrorists Use the Internet
Easy Access
Little or No Regulation, Censorship or Other Government Control
Potentially Large Audiences Spread Throughout the World
Anonymity of Communication
Fast Flow of Information
Inexpensive Development and Maintenance of a Web Presence
Multimedia Environment
The Ability to Shape Coverage in the Traditional Mass Media
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
How Terrorists Use the Internet
Psychological Warfare
Publicity and Propaganda
Data Mining
Fund-Raising
Recruitment and Mobilization
Networking
Sharing Information
Planning and Coordination
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Agencies Charges With Combating Cyber Terrorism
FBI’s Cyber Crime Division
Department of Homeland Securities’ National Cyber Security Division
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
image1.emf
image2.jpeg
image3.png
Homeland Security and Terrorism
Second Edition
Chapter 11
Terrorist Financing
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
1
Learning Objectives
1. Explain how the terrorists financed the 911 attacks.
2. Explain the difference between money laundering and terrorist financing.
3. Discuss how the United States is attempting to reduce terrorist financing.
4. Describe how terrorist organizations raise money.
5. Describe how terrorist groups move money.
6. Discuss identity fraud and identity theft.
7. Explain how breeder documents work
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Terrorist Financing of the 9/11 Attacks
$300,000 Was Deposited in Bank
Moved to U.S. by Bank Transfer
Hijackers Carrying Traveler’s Checks to US
Credit or Debit Cards Used to Access Foreign Bank Account
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Distinguishing Terrorist Financing and Money Laundering
Money Laundering – Three Step Process:
Illegally Derived Money is Placed Into the Financial System
It is Layered or Moved Through the Financial System, Usually Internationally, and Intermingled With Legitimate Profits and Monies to Hide Its Provenance
It is Returned and Reintegrated Into the Legitimate Economy
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering (1 of 2)
The Central Intelligence Agency
Bureau of Customs and Border Protection and Bureau of Immigration and Customs
U.S. Secret Service
The Bureau of Alcohol, Tobacco, Firearms, and Explosives
Drug Enforcement Agency
Federal Bureau of Investigations
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Federal Mechanisms Used to Counter Terrorist Financing and Money Laundering (2 of 2)
Bureau of Economic and Business Affairs
Office of the Coordinator for Counterterrorism
Executive Office for Terrorist Financing and Financial Crime
Financial Crimes Enforcement Network
Internal Revenue Service
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Means and Methods of Terrorist Financial Transactions
Earning or Acquiring Resources
Moving or Laundering the Money
Storing or Banking the Money Until It is Needed
Black Market Oil and Gas
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Earning and Acquiring Resources
Donor Support of Terrorism
Criminal Activity
Charities
Legitimate Businesses
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Moving or Laundering Money
Precious Commodities
Banking and Wire Transfers
Money Brokers or Hawaladars
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Storing or Banking Money
Terrorist Organizations Acquire Agriculture Goods, Precious Gems and Metals, and Disposable Goods
Terrorist Organizations Develop a Business Model Whereby they Estimate their Cash Flow Needs and Develop a Timely Process or Method to Convert these Goods into Cash
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Black Market Oil and Gas
Unique to ISIS
ISIS Received About $2–4 Million in Daily Profits
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Saudi Arabia’s Financing of Terrorism
America’s Closest Ally in the Middle East
Wahhabism
Saudi Arabian Charities Support Terrorists
Saudi Government Supports Sunny and Other Terrorist Groups
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Identity Fraud or Theft
Avoid Watch List
Obscure Their Whereabouts
Gain Unauthorized Access
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Real ID Act
A Photo Identity Document
Documentation Showing The Person’s Date of Birth
Proof of Person’s Social Security Account Number (SSN) or Verification That the Person is Not Eligible for a SSN
Documentation Showing the Person’s Name and Address of Principal Residence
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
Copyright
Copyright © 2019, 2016, 2013 Pearson Education, Inc. All Rights Reserved
image1.emf
image2.jpeg
image3.png
Criteria No Submission: O Points
Emerging (F through D range) 12 points
Satisfactory (C Range) 14 points
Proficient (B Range) 16 points
Exemplary (A Range) 20 points
Criterion score 20/20
Thesis and Ideas: Explores the appropriate topic based on chapters read in the week and displays college level thinking Submits the correct number of Journal articles.
Student did not submit the assignment
Work does not meet assignment expectations; shows little or no understanding of assignment concepts
Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts
Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments
Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts
20/20
Criteria
No Submission: O Points
Emerging (F through D range) 12 points
Satisfactory (C Range) 14 points
Proficient B Range 16 points
Exemplary (A Range 20 points
Criterion score 20/20
Comprehension: Synthesizes information and communicates it through student’s own thoughts and words.
Student did not submit the assignment
Work does not meet assignment expectations; shows little or no understanding of assignment concepts
Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts
Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments
Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts
20/20
Criteria No Submission: O Points
Emerging (F through D range) 12 points
Satisfactory (C Range) 14 points
Proficient (B Range) 16 points
Exemplary (A Range) 20 points
20/20
Evidence critical and analytical skills
Student did not submit the assignment
Work does not meet assignment expectations; shows little or no understanding of assignment concepts
Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts
Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments
Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key assignment concepts
20/20
Criteria No Submission: 0 Points
Emerging (F through D range) 12 points
Satisfactory (C Range) 14 points
Proficient B Range 16 points
Exemplary (A Range) 20 points
20/20
Research: Appropriate use of scholarly sources
Student did not submit the assignment
Work does not meet assignment expectations; shows little or no understanding of assignment concepts
Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of the assignment concepts
Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate and apply key assignments
Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the ability to evaluate, apply and synthesize key
20/20
Criteria No Submission: 0 Points
Emerging (F through D range) 6 points
Satisfactory (C Range) 7 points
Proficient B Range 8 points
Exemplary (A Range) 10 points
10/10
Organization: Writing demonstrates well- developed body that evidences each element from the thesis in succinct paragraphs and each
Student did not submit the assignment
Work does not meet assignment expectations; shows little or no understanding of assignment concepts
Assignment partially meets expectations with minimal depth; demonstrates a limited understanding of
Assignment meets expectations with all components being addressed; demonstrates the ability to evaluate
Assignment exceeds expectations with exceptional depth; presents all requirements of the assignment; demonstrates the
10/10
paragraph supports the thesis.
the assignment concepts
and apply key assignments
ability to evaluate, apply and synthesize key
Criteria No Submission 0 Points
Emerging (F through D range) 6 points
Satisfactory (C Range) 7 points
Proficient (B Range) 8 points
Exemplary (A Range) 10 points
10/10
Used APA formatted citations and references and used correct structural formatting
Student did not submit the assignment
No attempt at APA formatting when using references
APA is attempted with numerous errors
Using APA format accurately; errors are noticeable
Using APA format proficiently, text is basically error free
Overall Score
Emerging (F-D) Satisfactory (C Range)
Proficient (B range)
Exemplary (A range)
Research & Report
For your Week 3 Journal Assignment, you should find two articles that relates to the material covered in your reading this week:
· Chapter 9: Homeland Security and Weapons of Mass Destruction
· Chapter 10: Cyber Crime and Terrorism
· Chapter 11: Terrorist Financing
Use any peer reviewed resources (Keiser University Library sources or government websites ( .GOV better) to find an article that discusses the same topic. Then write in an APA review of the article. You should submit two of these. Submit them in the same document.
Requirements:
· Complete two article reviews.
· Each review should have a minimum of 250-350 words.
· Each review should explain the significance of the article and relate it to your reading this week.
· Each review should end with your opinion on the pros or cons of the article being reviewed.
· Note: Do NOT use any articels older than 5 years. This field is always changing, so you should be using current information (no older than five years).
· Note: Do NOT simply cut-and-paste from a website or from an article. Yes, you should be sources to find the information for this journal assignment, but do not simply cut-and-paste someone else's words. As you review the article, put it in your own words. Be sure to cite in APA. If you copy and paste, you will NOT get credit for doing this. Your reviews must be your own words, thoughts, and analysis.
Resources:
·
Homeland Security Journal Rubric
Homeland Security Journal Rubric - Alternative Formats
· Example Student Journals:
· Example 1 - “Florida Officials Seek Tourism Boost after Alberto Blows Through” - Alternative Formats
·
Example 2 - "What We Investigate: Terrorism"
Example 2 - "What We Investigate: Terrorism" - Alternative Formats
image.gif
image2.gif
Chapter 12: Structure for Managing Emergency Response
Article Name:
“Florida officials seek tourism boost after Alberto blows through”
Article Review:
The Emergency Operations Center should be the most important building of any community.
This is where all the knowledge and nuts and bolts to keep the safety, economy, and welfare of
all the citizens and dynamics of a city or county, flowing. Every part of our country has its own
hazards, from California and earthquakes, wildfires and tsunami threats, to hurricanes, tornadoes,
and floods in the South and Midwest. Every EOC has its own set of emergency plans based on
the threat assessment.
I bring up economy because you see it every storm season, disasters blow in and everyone flees,
including the tourists which would have spurred the economy but now are gone, and so is the
economy. Disasters not only pull down the economy, and the lack of needed tourism, but then is
the increased cost of preparing, mitigating, and recovery of disasters and emergencies. Hurricane
season started in the south, and now Florida is trying to pull back in tourists in between storms. I
understand that, but I also see a risk involved. According to one source, “As winds and rains let
up from Subtropical Storm Alberto, Florida officials Tuesday were quickly spinning ways to
draw tourists to areas that may have missed out on Memorial Day crowds” (Turner, 2018, para.
1). The Governor of Florida visited an EOC to thank them for a job well done for this first storm
as he was questioned about tourism efforts. He said, “The Legislature gave us $76 million again
this year (for visit Florida), and part of that money is to work on when we have something like
this, to let people know we’re back open for business” (Turner, 2018, para. 5). The EOC is the
hub and is excellent at tracking emergency and disaster situations before they happen, when
possible, and that success is shown by minimal loss of life and property.
When greed steps in, that is when you see tourism take a back seat, but most who have been
through the big storms know those risks, and you see a good attitude with the Governor of
Florida in this article who knows what his State is facing. It shows a good leader also who shows
appreciation to those he knows keeps the public safe.
WC 375
Turner, J. (2018, May 30). Florida officials seek tourism boost after Alberto blows through.
Florida Division of Emergency Management. Retrieved from
http://www.floridadisaster.gov/FloridaofficialsseektourismboostafterAlbertoblows
through

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com