Chapter 10 Terrorism: The Newest Threat to our National Security.

Slides:



Advertisements
Similar presentations
Terrorism.
Advertisements

Homeland Security and the Future of Criminal Justice.
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Present and Emerging Trends: The Future of Criminal Justice
Bell Ringer. US-U9-L5 SSUSH25 G. Analyze the response of President George W. Bush to the attacks of September 11, 2001, on the United States, the war.
Hate Homicides Higgins O’Brien Spring FBI Definition: “Criminal offenses committed against persons, property, or society that are motivated, in.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Introduction to Security
Threats to World Security Chapter 33 Section 3.
The Fight Against Terrorism
Section 4 The George W. Bush Presidency Assess the outcome of the 2000 presidential election. Explain the goals and achievements of George W. Bush’s domestic.
The 21 st Century Begins Present Chapter 32.
Intelligence, Terrorism, and Homeland Security Chapter 3 Charles R. Swanson, Leonard Territo, and Robert W. Taylor Police Administration: Structures, Processes,
 Both developed and developing nations of the world are faced with social, economic, and cultural problems brought about by inequities.  Some groups.
9 Terrorism as Organized Crime.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
Terrorism.
Chapter 17 - Defining Terrorism. Terrorism in the US prior to 9/11 Bombings with the Union movement - Haymarket Square Have any presidential assassinations.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Civil Liability and Policing Challenges.  Any questions about anything before we begin?  Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
Terrorism A Conceptual Review The Nature of the Beast Defining Terrorism.
Chapter 17 - Defining Terrorism. 2 Terrorism in the US prior to 9/11 Bombings with the Union movement - Haymarket Square Have any presidential assassinations.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Introduction to Criminal Justice
US Army TRADOC TRISA TSP 159-T-0001 A Military Guide to Terrorism in the Twenty-First Century (Version 5.0) 1 Training Support Package 159-T March.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Chapter 17: Foreign Policy and National Defense Section 2.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
September 11, Events leading up to 9/11- 1 st WTC bombing in ‘93.
THE ENEMY WITHIN Extremism In America The Anti-Defamation League was founded in 1913 “to stop the defamation of Jewish people and to secure justice and.
Today we will identify and describe the events of September 11 th, By discussing what happened that day and how it impacted our nation. To understand.
Today’s Issues: The US and Canada Ch. 8 Intro to Geography.
Directions Complete the PowerPoint Guided Notes. When finished with the PowerPoint, read the article on page 4 and analyze the political cartoons on pages.
Effects of 9/11. Department of Homeland Security USA PATRIOT Act Invasion of Afghanistan Invasion of Iraq?? Less formal effects?
Global Acts of Terror. Terrorism Defined Terrorism is the use of violence and threats to intimidate and coerce (force action) for political reasons. Terrorism.
Section 4 The George W. Bush Presidency Terms and People George W. Bush – the Republican winner of the 2000 presidential election, he is the son of George.
Earth liberation Front (ELF) Origins, Doctrine, and Objectives
Chapter 16 Terrorism and National Security.
What is the Price of Freedom?
Chapter 20 Terrorism and Homeland Security
Objectives Assess the outcome of the 2000 presidential election.
Legal Implications.
Section V Getting the Job Done… Through Others
Middle East Relations And Terrorism
Chapter 9 Terrorism: From Hometown Security to Homeland Security
Threats to World Security Chapter 33 Section 3.
Terrorism Strikes the United States
Objectives Assess the outcome of the 2000 presidential election.
Terrorism.
Objectives Assess the outcome of the 2000 presidential election.
Chapter Eleven Political Crime and Terrorism
Chapter 13 Globalization and Terrorism: Our Small World
I. September 11, 2001.
Terrorism.
Modern America 1982—Present PART 5 OF 5
Objectives Assess the outcome of the 2000 presidential election.
AJ 001 Introduction to AJ Terrorism.
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
George W. Bush and 9/11.
Criminal Investigations
Presentation transcript:

Chapter 10 Terrorism: The Newest Threat to our National Security

The Terrorism Research Center notes: “One man’s terrorist is another’s freedom fighter.” The Terrorism Research Center notes: “One man’s terrorist is another’s freedom fighter.” Terrorism is “the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion or ransom.” Terrorism is “the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion or ransom.”

Most definitions of terrorism include the systematic use of physical violence, either actual or threatened, against noncombatants to create a climate of fear and cause some religious, political or social change. Most definitions of terrorism include the systematic use of physical violence, either actual or threatened, against noncombatants to create a climate of fear and cause some religious, political or social change.

Classification of Terrorists Acts Domestic: Domestic: 1995 bombing of the Alfred P. Murrah Federal Building bombing of the Alfred P. Murrah Federal Building Summer Olympic Games 1996 Summer Olympic Games Domestic terrorists represent extreme right or left wing and special interest beliefs. Domestic terrorists represent extreme right or left wing and special interest beliefs. Many are anti-government, antitaxations and engage in survivalist training to perpetuate a white, Christian nation. Many are anti-government, antitaxations and engage in survivalist training to perpetuate a white, Christian nation.

International Terrorism: International Terrorism: Foreign-based or directed by countries or groups outside the US against the US Foreign-based or directed by countries or groups outside the US against the US Three categories: Three categories: 1. foreign state sponsors of international terrorism using terrorism as a tool to foreign policy, for example: Iraq, Libya and Afghanistan. 1. foreign state sponsors of international terrorism using terrorism as a tool to foreign policy, for example: Iraq, Libya and Afghanistan. 2. Formalized terrorist groups such as Lebanese, Hezballah, Egyptian Al-Gamm’s. Al-Qaeda. 2. Formalized terrorist groups such as Lebanese, Hezballah, Egyptian Al-Gamm’s. Al-Qaeda. 3. Loosely affiliated international radical extremists who have a variety of identities and travel freely in the US, unkonw to law enforcement and the government. 3. Loosely affiliated international radical extremists who have a variety of identities and travel freely in the US, unkonw to law enforcement and the government.

The Dual Threat: The Dual Threat: The treat from domestic terrorism is as serious as the international threat. The treat from domestic terrorism is as serious as the international threat. Motivations for Terrorism: Motivations for Terrorism: Most terrorist acts result from dissatisfaction with a religious, political or social system or policy and frustration resulting from an inability to change it through acceptable, nonviolent means. Most terrorist acts result from dissatisfaction with a religious, political or social system or policy and frustration resulting from an inability to change it through acceptable, nonviolent means.

Domestic Terrorists groups include white supremacists, black supremacists, militia groups, other right-winged extremists, left-wing extremists, pro-life extremists, animal rights activists and environmental extremists. Domestic Terrorists groups include white supremacists, black supremacists, militia groups, other right-winged extremists, left-wing extremists, pro-life extremists, animal rights activists and environmental extremists. One of the oldest American terrorist organization is the Ku Klux Klan. One of the oldest American terrorist organization is the Ku Klux Klan.

Black Supremacists: Black Supremacists: The Black Panther Party was established in 1966 during a time of racial turmoil. The Black Panther Party was established in 1966 during a time of racial turmoil. Today, a newly reconstructed Black Panther Party has been organized, and it qualifies as a hate group. Today, a newly reconstructed Black Panther Party has been organized, and it qualifies as a hate group. Heavily armed, advocate violence against whites, and like their 1960’s predecessors, see cops as the enemy. Heavily armed, advocate violence against whites, and like their 1960’s predecessors, see cops as the enemy.

Left Wing Extremists: Left Wing Extremists: “the left wing extremists believes in a Pro Marxist stance where the rich must be brought down and the poor elevated. Presently the largest groups of supporters for this cause are the Anarchist. “the left wing extremists believes in a Pro Marxist stance where the rich must be brought down and the poor elevated. Presently the largest groups of supporters for this cause are the Anarchist. Pro-life: Pro-life: Animal Rights: Animal Liberation Front (ALF) Clandestine and decentralized group has claimed credit for attacks on meat packing plants, furriers, and research labs. Animal Rights: Animal Liberation Front (ALF) Clandestine and decentralized group has claimed credit for attacks on meat packing plants, furriers, and research labs. Tries to avoid hurting people in it’s attacks. Tries to avoid hurting people in it’s attacks. Stop Huntingdon Animal Cruelty (SHAC): Feel that people who make animals suffer should also be made to suffer. Stop Huntingdon Animal Cruelty (SHAC): Feel that people who make animals suffer should also be made to suffer. Justice Department: Send surprises to people it calls “animal killing scum” such as an envelop sent to researcher and hunting guides that contact razor blades dipped in rat poison positioned to cut the finger of anyone opening the envelope with out a letter opener. Justice Department: Send surprises to people it calls “animal killing scum” such as an envelop sent to researcher and hunting guides that contact razor blades dipped in rat poison positioned to cut the finger of anyone opening the envelope with out a letter opener.

Environmental Extremists: Environmental Extremists: Eco-Terrorisms seeks to “inflict economic damage to those who profit from the destruction of the natural environment. Eco-Terrorisms seeks to “inflict economic damage to those who profit from the destruction of the natural environment. Earth Liberation Front (ELF) often works with Animal Liberation Front (ALF) Earth Liberation Front (ELF) often works with Animal Liberation Front (ALF) Arson is a favorite weapon Arson is a favorite weapon Vandalism of equipment, package bombs, destruction of research data, arson of buildings, obliteration of experimental plants and animals Vandalism of equipment, package bombs, destruction of research data, arson of buildings, obliteration of experimental plants and animals

Terrorists may use arson, explosives and bombs, weapons of mass destruction (biological, chemical or nuclear agents) and technology. Terrorists may use arson, explosives and bombs, weapons of mass destruction (biological, chemical or nuclear agents) and technology. Suicide bombers: Suicide bombers: Most believe the act makes them martyrs and assures them a place in their version of heaven. Most believe the act makes them martyrs and assures them a place in their version of heaven. Their families are usually held in reverence and taken care of. Their families are usually held in reverence and taken care of. Try to kill as many people as possible. Try to kill as many people as possible.

Weapons of Mass Destruction (WMD) Weapons of Mass Destruction (WMD) Nuclear, radiological, biological and chemical weapons. Nuclear, radiological, biological and chemical weapons. Biological Agents: Biological Agents: Anthrax, botulism, smallpox. Anthrax, botulism, smallpox. CIA reports that at least 10 countries are believed to possess or to be conducting research on biological agents. CIA reports that at least 10 countries are believed to possess or to be conducting research on biological agents.

Chemical Agents: Chemical Agents: Chemical agents are not as lethal as biological agents, and they are easier to control. The four common types of chemical weapons are nerve agents, blood agents, choking agents and blistering agents. Chemical agents are not as lethal as biological agents, and they are easier to control. The four common types of chemical weapons are nerve agents, blood agents, choking agents and blistering agents. Nuclear Terrorism: Nuclear Terrorism: What is happening right now with Nuclear weapons? What is happening right now with Nuclear weapons?

Technological Terrorism: Technological Terrorism: Modern societies are susceptible to two methods of technological terror. Modern societies are susceptible to two methods of technological terror. 1) the employment of mass destruction weapons or the conversion of an industrial site-for example, a chemical plant – into a massively lethal instrument through sabotage. 1) the employment of mass destruction weapons or the conversion of an industrial site-for example, a chemical plant – into a massively lethal instrument through sabotage. 2) attack a source that supplies technology or energy. The result of either type of attack could be catastrophic. 2) attack a source that supplies technology or energy. The result of either type of attack could be catastrophic.

September 11, 2001 September 11, 2001 Where were you? Where were you? US immigration policies made it relatively easy for terrorists to enter the US. US immigration policies made it relatively easy for terrorists to enter the US. Permissiveness in allowing knives and small cutting instruments on board planes. Permissiveness in allowing knives and small cutting instruments on board planes.

As a result of 9/11 the Department of Homeland Security was established, reorganizing the departments of the federal government. As a result of 9/11 the Department of Homeland Security was established, reorganizing the departments of the federal government. USA Patriot Act USA Patriot Act Gave the police the ability to search, seize, detain or eavesdrop in their pursuit of possible terrorists, saying: “This government will enforce this law with all the urgency of a nation at war.” Gave the police the ability to search, seize, detain or eavesdrop in their pursuit of possible terrorists, saying: “This government will enforce this law with all the urgency of a nation at war.”

USA Patriot Act allows: USA Patriot Act allows: Investigators to use the tools already available to investigate organized crime and drug trafficking Investigators to use the tools already available to investigate organized crime and drug trafficking Facilitating information sharing and cooperation among government agencies so they can better “connect the dots.” Facilitating information sharing and cooperation among government agencies so they can better “connect the dots.” Updating the law to reflect new technologies and new threats. Updating the law to reflect new technologies and new threats. Increasing the penalties for those who commit or support terrorist crimes Increasing the penalties for those who commit or support terrorist crimes

Law Enforcement and Homeland Security: Law Enforcement and Homeland Security: It is vital that patrol officers correctly see themselves as the country’s first defense against terrorists attacks. It is vital that patrol officers correctly see themselves as the country’s first defense against terrorists attacks. The officer in the field, perhaps by transmitting the details of a seemingly routine traffic stop to a centralized data system, could potentially help avert a national desaster. The officer in the field, perhaps by transmitting the details of a seemingly routine traffic stop to a centralized data system, could potentially help avert a national desaster.

Al-Qaeda training manual: Al-Qaeda training manual: Lesson 1: A call to “holy war” (jihad) Lesson 1: A call to “holy war” (jihad) Lesson 2: focuses on the qualities of individual members. Lesson 2: focuses on the qualities of individual members. Lesson 3: teaches forgery Lesson 3: teaches forgery Lesson 4: focuses on safe houses and other hiding places, including instructions for establishing a clandestine terrorist network Lesson 4: focuses on safe houses and other hiding places, including instructions for establishing a clandestine terrorist network Lesson 5: concentrates on secret transportation and communication. Lesson 5: concentrates on secret transportation and communication. Lesson 6: training and security Lesson 6: training and security

Lesson 7: covers weapons, one of the keys to terrorism, including building an arsenal and safely storing explosives. Lesson 7: covers weapons, one of the keys to terrorism, including building an arsenal and safely storing explosives. Lesson 8: discusses secrecy and members safety. Lesson 8: discusses secrecy and members safety. Lesson 9: discussion of security, emphasizing planning and operations. Lesson 9: discussion of security, emphasizing planning and operations. Lesson 10 & 11: reconnaissance, including methods for clandestine spying and capturing prisoners. Lesson 10 & 11: reconnaissance, including methods for clandestine spying and capturing prisoners. Lesson 12: discusses intelligence gathering, but focuses specifically on covert methods and counter- intelligence Lesson 12: discusses intelligence gathering, but focuses specifically on covert methods and counter- intelligence

Intermediate sections between lessons are tips on handling recruited agents and dealing with countermeasures. Intermediate sections between lessons are tips on handling recruited agents and dealing with countermeasures. Lesson 18: provides instructions about behavior when arrested. Lesson 18: provides instructions about behavior when arrested. The key to combating terrorism lies with the local police’s investigation of terrorist acts and the intelligence they obtain to help prevent future attacks. The key to combating terrorism lies with the local police’s investigation of terrorist acts and the intelligence they obtain to help prevent future attacks.

The technological issue that most challenges state and local participation in any national anti- terrorism intelligence efforts can be summarized by one word- interoperability (the ability to exchange information seamlessly). The technological issue that most challenges state and local participation in any national anti- terrorism intelligence efforts can be summarized by one word- interoperability (the ability to exchange information seamlessly). Two concerns related to the “war on terrorism” are that civil liberties may be jeopardized and that people of Middle Eastern descent may be discriminated against or become victims of hate crimes. Two concerns related to the “war on terrorism” are that civil liberties may be jeopardized and that people of Middle Eastern descent may be discriminated against or become victims of hate crimes.