Aum Shinrikyo Terrorist Attack Report THIS REPORT IS CLASSIFIED SECRET// REL TO US, JPN Federal Bureau of Investigation National Security Branch.

Slides:



Advertisements
Similar presentations
NIMS ICS All-Hazard Position Specific Training – A Way Forward A Special Presentation for the All Hazards IMT Conference Houston, Texas November 4.
Advertisements

WMD Crime Scene Management
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Aum Shinrikyo‘s (Supreme Truth) Aum Shinrikyo, an extremist religious sect founded in 1987 by Shoko Asahara, a blind yoga guru from Tokyo. Religious status.
Zone Chair Training 22 May Agenda Introductions and icebreaker Responsibilities of a Zone Chair Scenarios Working as a leadership team Further personal.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
FUNDING AND ARTS IN HEALTHCARE PROGRAM A BALANCED DIET AND EXERCISE Rural Arts in Health Training 2012.
Elements of an Offence, Intention & Involvement in a Crime *The Elements of a Crime Actus Reus + Mens Rea =Crime “The Guilty Act: demonstrates a voluntary.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Writing Grant Proposals. I. Cover letter II. Proposal Summary III. Organizational Description IV. Problem Statement V. Project Objectives VI. Methods.
Homeland Security Exercise and Evaluation Program HSEEP.
Plot is the literary element that describes the structure of a story. It shows a causal arrangement of events and actions within a story. Plot is a simple.
ISO EMERGENCY PREPAREDNESS AND RESPONSE
Incident Reporting Procedure
FILE 648B MI5 British Intelligence Service London, England THIS INFORMATION IS CONFIDENTIAL.
LOS ANGELES COUNTY Family Information Center Planning Guide for Healthcare Entities This project was funded by Hospital Preparedness Program grant number.
Implementing and Conducting a School Threat Assessment United States Secret Service & U.S. Department of Education Presented by Eric Gettes School Psychologist.
 English Binders & Writers Notebook plus writing utensils ready to go.  Back Packs and large purses placed in blue area by door.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Interdisciplinary Forensics English Language Arts Art Science Social Studies.
The Events of September 11, What is Al-Qaeda? a multi-national group formed by Osama bin Laden in the late 1980s to unite Arabs that had been fighting.
Preparing For the Advocacy You’re Already Doing Great Lakes Alliance Region May 3, 2007 organizecollaborate mobilize connect overcome.
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
9 Terrorism as Organized Crime.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
The U.S. Secret Service Shhhhhh!
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Importance of Evidence
NCLB Federal Funding Planning Meeting Private Non Profit Schools LEA Date.
Guess the Chief!!!. Guess the “Chief” - #1  The President meets with members of the AFL- CIO to address workers’ concerns in factories. Although the.
No Child Left Behind Education Week
12/14 – 12/20 - RESPOND TO DISCUSSION BOARD - ATTEND SEMINAR - COMPLETE AND SUBMIT LEARNING ACTIVITY UNIT 6: Crime Analysis Applications and organized.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Counterterrorism: Aum Shinrikyo Initial Response Intelligence Weapons Laws.
A better Gauteng is in the making The Gauteng Aggravated Robbery Strategy Institute for Security Studies 8 October 2009.
Partnerships In Action Colorado State Patrol & Colorado Coroners Association.
Week 8 Seminar Role Of The Company Officer And The Safety Officer.
ORIENTATION TRAINING Relationship Marketing Judy M. Groff Advisory System and Program Development Leader NCCE.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
The Crazy 1990s! By Jarrett Gingrich. In 1991 the Hubble Space Telescope was launched The telescope has published more than 6,000 scientific articles!
German Covert Action in WWI Brittney Ross Drew Gaskin Jake Ramey.
Terrorism. What is terrorism? Definitions Encyclopedia Britannica “The systematic use of terror (such as bombings, killings, and kidnappings) as a means.
 Brainstorm with your group members what you predict the following areas involve when conducting a forensic arson investigation:  *Proof of Incendiarism.
Week 4 Seminar Investigating Significant Injuries and Lessons Learned.
Terrorist Strategy By Kevin Kahler
Unit 2 Seminar. The Objectives of a crime scene investigation are Reconstruct the incident Ascertain the sequence of events Determine the mode of operation.
CRIMINAL OFFENCES PULP FICTION KEVIN SAKAI – HAYDEN SO – AARON ANG – KIRBY SO.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Presented By: Chris M. Wright, CPP IIA Spring Conference 2016 IRVINE, CA March 17, 2016.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
SEC 430 master Expect Success/sec430masterdotcom FOR MORE CLASSES VISIT
Chapter 12 Robbery Hess Introduction Robbery has plagued the human race throughout history Robbery is one of the three most violent crimes against.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
University of Georgia Police Department
Sarin attack in the Tokyo subway
Mystery Vocabulary Alibi: A story by an accused person of not having been at the scene of the crime.   Clue: Something that appears to give information.
Every Student Succeeds Act (ESSA)
Disaster Preparedness
Louis Engelbrecht, Caleb Richardson, Chapin Bartlett, and Dan Wadman
Pharmacy Safety.
Active Shooter Response Training
Federal Protective Service
WORKPLACE VIOLENCE Updated 09/28/11 1
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Federal Law Enforcement
Crime Scene Investigation
Science of Crime Scenes
Presentation transcript:

Aum Shinrikyo Terrorist Attack Report THIS REPORT IS CLASSIFIED SECRET// REL TO US, JPN Federal Bureau of Investigation National Security Branch

SECRET// REL TO US, JPN Title Page Team 10: Brian Roam, Ari Rosenblum, Tim Bevan, Colin McNulty, Tyler Chubb, Bryce Malinchak, Eric Emery, Chris Masden Individual Roles/Responsibilities: Team Leader: Brian Roam Assistant Leader: Ari Rosenblum Analysis Binder: The Entire Team Story Board: Tim Bevan Evidence & Database:Colin McNulty/ Chris Masden/ Tyler Chubb Writer & Report Editor:Bryce Malinchak/Eric Emery/Brian Roam Visualizations:Eric Emery/Chris Masden Presenters: Chris Masden/Tyler Chubb/Tim Bevan

SECRET// REL TO US, JPN 1 April 2011 DC Metro Rail the Blue Line and Orange Line collide 2011 Cherry Blossom festival Sumter - Dodge Jewelry Store Jewel Heist Scene Setter / Orientation & Agency Roles

SECRET// REL TO US, JPN Key Intelligence Questions: ACH I: Determined whether or not this was a terrorist attack or human / mechanical error. ACH II: Determined whether or not this was a terrorist attack or not. ACH III: Determined if Aum Shinrikyo or another terrorist organization was behind this attack. ACH IIII: Determined that Aum Shinrikyo was responsible for the jewel heist at Sumter- Dodge. Investigative Focus

SECRET// REL TO US, JPN Major Findings / BLUF Terrorist attack by Aum Shinrikyo History of similar incident - Tokyo 1995 Target: Japanese Prime Minister Motive: cease positive diplomatic relationships Method: sabotage of train’s brakes and hydrogen cyanide poison Sumter-Dodge Jewelry Store Secondary objective Fund the terrorist organization

SECRET// REL TO US, JPN Terrorists/Robbers Sean O’Leary Dontel Smith Douglas Frederick Angel Cordero Mohar Abul-Nassar Rahim Douriri Key Personnel Profiles

SECRET// REL TO US, JPN Metro Crash April 1, 2011 a blue line train collided with the back of an Orange Line train. Conductor was found dead in the cabin of train from codeine overdose. Japanese Prime Minister was on one of the trains involved in the crash Aum Shinrikyo made a threat to kill the Prime Minister on his visit to the U.S. Prime Minister was not killed in the attack Tunnel security cameras had been tampered with before the crash occurred Camera lenses to tunnel two had been painted over. Quentin Jones, was poisoned by Aum Shinrikyo with codeine resulting in his death Then they disengaged the braking system of the trains causing the crash. Two backpacks were found to hold hydrogen cyanide canisters in the train tunnels. The devices were intended to be broken during the crash and release the gas into the train but failed. During the train crash Hired members used the ventilation shaft to break into Sumter-Dodge Jeweler and steal diamonds. The diamonds are needed to help fund their terrorist organization. Once the attack and robbery were complete, Aum Shinrikyo killed off the pawns to tie up any loose ends.

SECRET// REL TO US, JPN April 2, 2011 a midday jewel heist at Sumter- Dodge Jewelry Store. Robbers escaped during train crash chaos Jewels worth $200,000 were stolen Suspect Sean O’Leary Found deceased with map of DC metro system, newspaper clippings from April 2, and 1 Ct. diamond in a Sumter-Dodge pouch. Jewelry Store Heist

SECRET// REL TO US, JPN Using ACH methodology we initially deduced that the event was most likely a terrorist attack. Using that analysis we further concluded, using the ACH method, that Aum Shinrikyo is the most likely perpetrator. ACH I: This was NOT mechanical error. ACH II: This was a terrorist attack. ACH III: Aum Shinrikyo was responsible. ACH IIII: Aum Shinrikyo profited from the jewel heist at Sumter-Dodge. Our team developed an association chart through Analyst’s Notebook (ANB). This chart grew throughout the investigation as our knowledge of the day’s events increased. Research Methods

SECRET// REL TO US, JPN Aum Shinrikyo is responsible for the train crash and the jewelry store heist Main goal was to kill the Japanese Prime Minister They were unsuccessful Secondary goal was to supplemental income from stolen diamonds Goal was accomplished Aum Shinrikyo killed the hired partners involved in the crimes to cover their tracks Conclusion

SECRET// REL TO US, JPN Follow-On or Pass Down NTSB should investigate how the braking system on the metro trains was disengaged. MPDC should conduct the initial investigation of the Sumter-Dodge jewelry heist. DCMTA needs to review why unauthorized individuals were spotted conducting suspicious activities in the train tunnels before the collision.

SECRET// REL TO US, JPN