John Fahy National Terrorist FIU New Scotland Yard

Slides:



Advertisements
Similar presentations
Money Laundering Physical & Cyber Crime Anti-Terrorism Focus Other Impacts.
Advertisements

ARO Seminar Ankara
POLICING THE UK ROADS Meredydd Hughes QPM ACPO Head of Roads Policing.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
Interagency Collaboration in the War on Terror 3.
Financial Exploitation For Court Officials NYC Elder Abuse Training Project.
Charity Commission for England and Wales Terrorist Financing: Perspectives on Informal Finance and Charities Preventing Terrorist Financing without damaging.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
PERSONAL FINANCIAL MANAGEMENT
Christopher Cooney International Liaison Officer Scottish Crime & Drug Enforcement Agency December 2012.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
Time Share Fraud Investigations
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
The Global Effort to Regulate the Financing of Terrorism.
For a long time the police thought it was a collision of the underground trains. The police declare the situation as a major incident. At 9.20am the train.
The London Bombings; 7 July Update –18 July All Images are available public domain and are property of owners Three of the bombing suspects visited Pakistan.
International Conference on Critical Infrastructure Protection Helsinki 4-5 October ‘07 ‘Future partnerships in critical Infrastructure protection’ Charles.
Solution Overview for NIPDEC- CDAP July 15, 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
The Patriot Act Protecting the US or Violating People’s Freedoms.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
Plan of the train carriage in the Edgware Road bomb attack Ringleader Mohammad Sidique Khan, 30, detonated his device at Edgware Road. The bomb, on a westbound.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Corporate Support (D) Personnel (D) Training (D) Engagement & Accountability (C) Organisational Development (C) Quality & Standards (C) Data Integrity.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Legal Framework and Regulatory Regime Required for an effective AML/CFT System Richard Pratt 29 March 2005.
Terrorism and Counter-Terrorism: Strategies and Policy Jonathan Jackson (MSC, BSC)
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
USE OF BSA REPORTING BY THE FBI. BSA Requirements The regulators Your customer Money Laundering – traditional targets.
Serious and organised Crime. What is SAOC? involves more than one person, is organised, meaning that it involves control, planning and use of specialist.
Operation ODIN JOINT OPERATION Metropolitan Police Special Branch Metropolitan Police Anti-Terrorist Branch The Security Service.
PHEP Capabilities John Erickson, Special Assistant Washington State Department of Health
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
The London Bombings, July SPEAKOUT UPPER-INTERMEDIATE, UNIT 9.1 Reference:
Dr. Nicholas Ryder Professor in Financial Crime ‘The financial war on terrorism: a review of UK counter- terrorist financing strategies since 2001’
“Scenario One & Two” STRs working Committee DAB, Training Center
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
World Bank International Standards and Action to Combat Money Laundering - Legal Aspects Mark Butler Financial Sector Specialist, Financial Market Integrity,
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Office for Domestic Preparedness Overview Briefing Bob Johns Branch Chief State and Local Program Management Division June 4, 2003 Department of Homeland.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
1 © 2012 Elsevier, Inc. All rights reserved. Chapter 2.0 What Is a Crime Scene?
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Canadian Money Laundering Concerns December 2012.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Chapter 13: Police Strategies and Tactics Seminar 8.
 Congestion Busting Toolbox Brief Security. Causes of congestion Below are some of the main causes of congestion in the capital Collisions – 28% Vehicle.
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
Terrorism in the EU: Threats & Trends EAASP Annual Conference Dubrovnik, April 2014 Europol Public Information.
AN INTRODUCTIONS TO AUSTRAC
how to prevent them from being successful
Organised Crime in New Zealand
REDUCING CRIME AND THE FEAR OF CRIME BY MAKING SURE CRIME DOES NOT PAY
INVESTIGATION PROCESS AND TECHNIQUE
Anti-Money Laundering Guidelines
Warm Up – Last Meals row-prisoners-last-meals.
Not Protectively Marked – Public Document
TERRORISM The use of indiscriminate violence to spread fear in a bid to achieve political, religious, ideological or financial aims.
Protect Your Money From Debit/Credit Card Fraud
Leaders Credit Union Board Presentation
TERRORISM The use of indiscriminate violence to spread fear in a bid to achieve political, religious, ideological or financial aims.
Presentation transcript:

John Fahy National Terrorist FIU New Scotland Yard

Objectives of Presentation Role & structure of the NTFIU UK Strategy on counter terrorism Cash seizure powers & use Terrorist financing 7/7 as a counter terrorism investigation Questions

Role of the NTFIU Metropolitan Police have the lead on Counter Terrorism(CT) Investigations Support CT Investigations UK lead on terrorist finance Training/capacity building

Structure of the NTFIU Rapidly growing unit with a total of 76 detectives, analysts & support staff Support to CT investigations Disruption Team Intelligence function Staff from other agencies

To reduce the threat To reduce vulnerability PREVENT terrorism by tackling its underlying causes PURSUE terrorists and those that sponsor them Improve our understanding of terrorist networks, track the terrorists down, disrupt them and, where we can, bring them to justice PREPARE for the consequences PROTECT the public and UK interests To reduce the risk UNDERPINNING ALL FOUR MISSION AREAS Improve intelligence coverage Clear, helpful, coherent communications Countering terrorist financing is a fundamental element of the UK’s long term CT strategy

Cash Seizure Powers Civil power to seize criminal or terrorist funds

The Terrorist Act Volunteers, Training, Travel, Equipment Procurement, Living Costs, Administration, Propaganda, Campaigns, Communications, Prisoners / martyrs families……. Terrorist Finances?

DRUGS EXTORTION SMUGGLING / TAX EVASION FRAUD THEFT ROBBERY COUNTERFEIT GOODS KIDNAPPING DONATIONS Fund Raising LEGITIMATE BUSINESSES

7/7 Attacks on the Underground

Casualty Figures Devices placed on carriage floors Aldgate 7 Dead 90 injured Edgware Road 8 Dead 185 injured Russell Square 27 Dead 180 injured

Inside the BMA

One hour later - Fourth Device Detonated on the Bus Tavistock Place Device placed on upper deck 14 Dead 73 injured

The Importance of the Financial Investigator There is no terrorism without money!

Financial Intelligence Makes a Difference In the first 24 hrs contact made with financial institutions, credit reference agencies etc 24/7 contact arrangements established Fast time response to intelligence and exhibits from scene

M Khan 11 Gregory St, Leeds

Financial and other documents found at scenes prove useful Exploiting account opening information Addresses Telephone numbers addresses Other potential Financial Intelligence adds Value

Identifying the Remaining Bombers Shehzad Tanweer Mohammed Khan Jermaine Lyndsay Husib Hussain

Luton Railway Station Analysis of Shazad TANWEER’s accounts show car hire on 4 th July 2005

Recovered Items Search of the car reveals hexamine blocks and other BME

Recovered Items Various home made explosives & detonators

18, Alexander Grove, Leeds

Other materials

Jermaine Lyndsey Bank account shows links to Numerous addresses ‘Bug’ detectors and other spying / anti- spying equipment

Current Enquiries Ongoing account examination of purchases Surveillance of accounts in order to ID associates & purchase patterns Purchase of mobile phones & top up cards

Massive and challenging reactive investigation Repeated on 21 st July with attempted bombings Both enquiries still continuing for criminal court and Coroner Still had to ‘service’ other NTFIU operations NTFIU Response

How much did it cost?

Future threat monitoring Purchase of precursor chemicals- Hydrogen Peroxide, Hexamine blocks, Citric Acid, Fertiliser etc…. Purchase of equipment- Fans, cooling blocks, rubber gloves Overseas travel- Payment for travel, Visas, account dormancy Training- Paint-balling, rafting, ‘adventure sports’

Questions ? John Fahy National Terrorist FIU New Scotland Yard