Terrorism and Cyber Predators Chapter 22. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Terrorism in Perspective Terrorism –

Slides:



Advertisements
Similar presentations
Homeland Security and the Future of Criminal Justice.
Advertisements

Chapter 2 Digital Terrorism.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Bell Ringer. US-U9-L5 SSUSH25 G. Analyze the response of President George W. Bush to the attacks of September 11, 2001, on the United States, the war.
Unilateralism in Foreign Policy and Terrorism. Domestic Terrorism: Oklahoma City Bombing On 19 April 1995, the 2nd anniversary of the Waco raid, Timothy.
HUMAN TRAFFICKING AWARENESS COMMUNITY PRESENTATION Strong Families Make a Strong Kansas Presenters Name and date of presentation.
USA PATRIOT ACT USA PATRIOT ACT
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Threats to World Security Chapter 33 Section 3.
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Chapter Three The Contemporary Law Enforcement Industry
15 Globalization and Terrorism.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
The 21 st Century Begins Present Chapter 32.
CJ © 2011 Cengage Learning Chapter 16 Homeland Security.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved. Police in America Chapter Three The Contemporary Law Enforcement Industry.
1 James Johnson September 15, 2004 University of Phoenix On-Line EDTC 560 Applications of Multimedia and Web Page Design Instructor: Eli Collins-Brown.
Intelligence, Terrorism, and Homeland Security Chapter 3 Charles R. Swanson, Leonard Territo, and Robert W. Taylor Police Administration: Structures, Processes,
Introduction to the Public Safety System Created by Curt Harrell & Jesse Kuzy for.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
The U Visa for Immigrant Crime Victims Immigrant Law Center of Minnesota 450 N. Syndicate Street, Suite 175 St. Paul, MN (651) phone (651)
Sutton Public Schools Anti-Bullying Law Overview.
1 Terrorism in the Modern World Vocabulary terms.
9 Terrorism as Organized Crime.
The National Resilience Development Act and the War on Terror Opening up the Third Front.
CJ © 2011 Cengage Learning Chapter 5 Law Enforcement Today.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
STALKING. Basics of Stalking  Harassing, threatening, or menacing behavior  Is the behavior repeated conduct?  If suspect feels fear – take it seriously.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Chapter 10 © 2004 Pearson Education, Inc. Crimes Against Persons © 2004 Pearson Education, Inc.
11 Controlling Organized Crime.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
Ngafla Bakayoko Yolanda Alvarez Jimena Galdos.  The political use of violence or intimidation (The American Heritage Dictionary)  “the unlawful use.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Civil Liability and Policing Challenges.  Any questions about anything before we begin?  Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Chapter 17: Foreign Policy and National Defense Section 2.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
CJ in the USA Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Effects of 9/11. Department of Homeland Security USA PATRIOT Act Invasion of Afghanistan Invasion of Iraq?? Less formal effects?
Chapter 16 Terrorism and National Security.
Chapter 20 Terrorism and Homeland Security
Disaster and Emergency Management
Legal Implications.
Middle East Relations And Terrorism
Threats to World Security Chapter 33 Section 3.
Chapter 1: Policing in America
AP Human Geography Political Organization of Space Unit
Chapter Eleven Political Crime and Terrorism
AP Human Geography Political Organization of Space Unit
Chapter 13 Globalization and Terrorism: Our Small World
Criminal Investigations
Presentation transcript:

Terrorism and Cyber Predators Chapter 22

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Terrorism in Perspective Terrorism – The unlawful use or threat of violence against persons and property to further political, social, or religious objectives. – It is generally intended to intimidate or coerce a government, individuals, or groups to modify their behavior. Defined in the U.S. Code, Title 18, Section 2331.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 3 Motives for Terrorism Many different reasons for their acts. Terrorists often act based on one or more of these basic motives:  Strong moral convictions  Simplified definitions for good and evil  A desire to find utopia  Code of self-sacrifice Moral convictions are a powerful element for terrorists.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 4 Terrorism and Criminal Charges U.S. Code (2003), Title 18, Chapter 113:  Use of certain weapons of mass destruction.  Acts of terrorism transcending national boundaries.  Harboring or concealing terrorists.  Providing material support to terrorists.  Providing material support or resources to designated foreign terrorist organizations. Traditional charges of: – Murder, kidnapping, conspiracy, terroristic threats

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 5 Categories of Terrorism Domestic terrorism – An unlawful violent act directed at elements of the U.S. government or population by groups or individuals who are based and operate entirely within the United States and Puerto Rico without foreign direction. International terrorism – Violent acts or dangers brought against people or property; intended to intimidate or coerce a civilian population or otherwise affect the conduct of a government by intimidation, assassination, or kidnapping. – It must occur outside the borders of the United States or otherwise transcend national boundaries.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 6 Categories of Terrorism The FBI divides international terrorism into three (3) subcategories: 1.Foreign state sponsors using terrorism as a tool of foreign policy. 2.Formalized terrorist groups 3.Loosely affiliated international radical extremists who have a variety of identities and travel freely in the United States unknown to law enforcement or the government.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 7 Terrorism in the United States Until recently, many Americans did not view political terrorism as a serious threat to safety in the United States. 1993, World Trade Center Bombing 1995, Alfred P. Murrah Federal Building in Oklahoma City. 2001,World Trade Center, Pentagon – Changed the way that Americans viewed terrorists and terrorism.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 8 Legal Expansions Created by the Patriot Act The Patriot Act created a series of new laws and made changes in more than fifteen existing statutes. – Goal of the First Patriot Act: Quickly provide broad new powers to domestic law enforcement agencies and international intelligence agencies in an effort to provide the tools necessary to fight terrorism, to expand the definition of terrorists activities, and to change sanctions for violent terrorism.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 9 Legal Expansions Created by the Patriot Act Among its provisions, USAPA expanded four instruments of surveillance:  Wiretapping  Search warrants  Pen/trap orders – recording telephone calls  Subpoenas FBI given greater authority to monitor civilian communications without court orders. See figure 22.1

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 10 Domestic Terrorist Groups 1990s saw a decline in the traditional left-wing extremism and an increase in activities among extremists associated with right- wing groups and special- interest organizations. Terrorism in the U.S. by Group,

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 11 Left-Wing Groups These groups advocate liberal, often radical, measures to effect change in the established political order. 1960s & 1970s – protested Vietnam War Militant anti-white Black Panther movement Weather Underground Organization Left-wing terrorism has declined in recent years. – Due to many arrests and rejection of communism as a viable economic and political option.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 12 Right-Wing Groups Right-wing groups are conservative, favoring traditional views and values. Distrust government activism and oppose sudden changes in the established order. Characterized as conservative, racist, anti-government, survivalists and promote the white race. Survivalist Training – A type of training in which separatists groups practice guerrilla warfare tactics to prepare to protect themselves from law enforcement officials or other agents of the government.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 13 Right-Wing Groups Hate Group – A group antagonistic toward various minority groups in the United States. KKK Posse Comitatus Aryan Nation

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 14 Special Interest Groups Seek resolution of specific issues rather than widespread political changes. Animal Liberation Front Earth Night Action Group

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 15 International Terrorism International Terrorist Groups in the United States – U.S. has been resented in some countries around the world. – Americans have been targets of terrorism overseas for years. – Foreign terrorists view the U.S. as a priority target.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 16 Terrorist Groups with International Agendas Many groups are conducting criminal activities as well as military style training in the United States and in other countries ion support of their groups objectives. Take advantage of advanced technology available in the U.S. as well as unrestricted travel.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 17 Terrorist Groups with International Agendas Al-Gama at Al-Islamiyya – Egypt’s largest militant group Hezbollah – Lebanese umbrella organization of radical Islamic Shi’ite groups and organizations. – Name means “party of God” Hamas – Name means courage and bravery – Largest Palestinian militant movement – Won the PA’s general elections in 2006.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 18 Terrorist Groups with International Agendas The Al-Aqsa Martyrs’ Brigade – Emerged from Arafat’s Fatah faction of the PLO in 2001 Palestinian Islamic Jihad – Influenced by Islamic revolution in Iran – Israel is main target Al-Qaeda – Led by Osama bin Laden – Targeted U.S. and other Western interests as well as Jewish targets and Muslim government that it sees as corrupt and the Saudi monarchy.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 19 New Terrorism New Terrorists groups have international objectives, and globalization has allowed these groups to facilitate other terrorist groups on a world wide level. Terrorism has a much greater potential to cause harm to Americans and to require the intervention of police agencies at the local, municipal, and county levels as well as at the federal level of investigation.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 20 The American Response to Terrorism The United States has revamped the mission and structure of a number of federal law enforcement agencies and created new ones to coordinate counterterrorism activities. The National Strategy for Homeland Security and the Homeland security Act of 2002 created the Department of Homeland Security (DHS).

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 21 The American Response to Terrorism DHS coordinates the activities of more than 180,000 employees and is charged with overseeing these seven goals: 1.Creating awareness 2.Prevention 3.Providing protection 4.Developing appropriate responses 5.Recovery 6.Service 7.Organizational excellence

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 22 The American Response to Terrorism Border and Transportation Security – Responsible for maintaining the security of the nation’s borders and transportation system. Emergency Preparedness and Response – Oversees domestic disaster preparedness training and coordinates government disaster response.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 23 The American Response to Terrorism Science and Technology – Preparing for and responding to the full range of terrorist threats involving weapons of mass destruction. Information Analysis and Infrastructure Protection – Analyzes intelligence and information from other agencies. Secret Service and Coast Guard – Remain under DHS but report directly to the Secretary.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 24 Antiterrorism Activities Counterintelligence – Gathering political and military information about foreign countries and institutions to prevent terrorist actions. The intelligence model to terrorists activities considers terrorist activity as threats to the security of the state rather than as traditional criminal acts.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 25 Local Police and Terrorism Crisis negotiation team – A group of specialists trained to defuse potentially dangerous situations. Suspect Background Information – Use modus operandi files – Telephone, cable, wiretaps, and Internet tracking Physical Evidence – Extremely important in the prosecution of terrorists activities.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 26 Cyber Crimes Crime using the Internet & technology Children spend hours a day on the Internet Cyber Predators – Individuals, usually men, who use the Internet to hunt for victims to take advantage of, especially children, preteens, and teen who may be manipulated or seduced into meeting and engaging in sexual activity. – Cyber sex offenders use computers for purposes that may involve viewing, storing, producing, sending and receiving child pornography.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 27 Profiles of Child Pornography Users Typical person arrested for child pornography is a white male age 26 or older. 97% acted alone Internet Crime against Identified Victims – Two categories 1.Internet-initiated 2.Family or Prior Acquaintance

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 28 Categories of Internet Sex Crimes against Children

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 29 Profiles of Child Pornography Users Internet Solicitations to Undercover Law Enforcement – Referred to as proactive cases – Police patrol chat rooms Internet Child Pornography – Use the Internet to possess, distribute, and trade child pornography. – Generally involve multi jurisdictions.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 30 Profiles of Child Pornography Users Cyberstalking – Using the Internet to track and repeatedly contact people, especially children. – Transmitting threatening or sexually explicit messages via to children. Sexual tourism – Traveling, both in the United States and in foreign countries, for the expressed purpose of locating children with whom to engage in sexual activity, sexual abuse, or sexual exploitation.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 31 Implications for Law Enforcement New legislation can assist in the prosecution of individuals who sexually exploit children via the Internet. Agencies should acquire technical knowledge and expertise concerning the use of the Internet. Departments should develop specialized Internet units that investigate Internet crimes.