Download presentation
Presentation is loading. Please wait.
Published byCora Wells Modified over 9 years ago
1
Terrorism and Cyber Predators Chapter 22
2
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Terrorism in Perspective Terrorism – The unlawful use or threat of violence against persons and property to further political, social, or religious objectives. – It is generally intended to intimidate or coerce a government, individuals, or groups to modify their behavior. Defined in the U.S. Code, Title 18, Section 2331.
3
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 3 Motives for Terrorism Many different reasons for their acts. Terrorists often act based on one or more of these basic motives: Strong moral convictions Simplified definitions for good and evil A desire to find utopia Code of self-sacrifice Moral convictions are a powerful element for terrorists.
4
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 4 Terrorism and Criminal Charges U.S. Code (2003), Title 18, Chapter 113: Use of certain weapons of mass destruction. Acts of terrorism transcending national boundaries. Harboring or concealing terrorists. Providing material support to terrorists. Providing material support or resources to designated foreign terrorist organizations. Traditional charges of: – Murder, kidnapping, conspiracy, terroristic threats
5
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 5 Categories of Terrorism Domestic terrorism – An unlawful violent act directed at elements of the U.S. government or population by groups or individuals who are based and operate entirely within the United States and Puerto Rico without foreign direction. International terrorism – Violent acts or dangers brought against people or property; intended to intimidate or coerce a civilian population or otherwise affect the conduct of a government by intimidation, assassination, or kidnapping. – It must occur outside the borders of the United States or otherwise transcend national boundaries.
6
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 6 Categories of Terrorism The FBI divides international terrorism into three (3) subcategories: 1.Foreign state sponsors using terrorism as a tool of foreign policy. 2.Formalized terrorist groups 3.Loosely affiliated international radical extremists who have a variety of identities and travel freely in the United States unknown to law enforcement or the government.
7
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 7 Terrorism in the United States Until recently, many Americans did not view political terrorism as a serious threat to safety in the United States. 1993, World Trade Center Bombing 1995, Alfred P. Murrah Federal Building in Oklahoma City. 2001,World Trade Center, Pentagon – Changed the way that Americans viewed terrorists and terrorism.
8
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 8 Legal Expansions Created by the Patriot Act The Patriot Act created a series of new laws and made changes in more than fifteen existing statutes. – Goal of the First Patriot Act: Quickly provide broad new powers to domestic law enforcement agencies and international intelligence agencies in an effort to provide the tools necessary to fight terrorism, to expand the definition of terrorists activities, and to change sanctions for violent terrorism.
9
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 9 Legal Expansions Created by the Patriot Act Among its provisions, USAPA expanded four instruments of surveillance: Wiretapping Search warrants Pen/trap orders – recording telephone calls Subpoenas FBI given greater authority to monitor civilian communications without court orders. See figure 22.1
10
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 10 Domestic Terrorist Groups 1990s saw a decline in the traditional left-wing extremism and an increase in activities among extremists associated with right- wing groups and special- interest organizations. Terrorism in the U.S. by Group, 1980-2001
11
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 11 Left-Wing Groups These groups advocate liberal, often radical, measures to effect change in the established political order. 1960s & 1970s – protested Vietnam War Militant anti-white Black Panther movement Weather Underground Organization Left-wing terrorism has declined in recent years. – Due to many arrests and rejection of communism as a viable economic and political option.
12
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 12 Right-Wing Groups Right-wing groups are conservative, favoring traditional views and values. Distrust government activism and oppose sudden changes in the established order. Characterized as conservative, racist, anti-government, survivalists and promote the white race. Survivalist Training – A type of training in which separatists groups practice guerrilla warfare tactics to prepare to protect themselves from law enforcement officials or other agents of the government.
13
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 13 Right-Wing Groups Hate Group – A group antagonistic toward various minority groups in the United States. KKK Posse Comitatus Aryan Nation
14
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 14 Special Interest Groups Seek resolution of specific issues rather than widespread political changes. Animal Liberation Front Earth Night Action Group
15
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 15 International Terrorism International Terrorist Groups in the United States – U.S. has been resented in some countries around the world. – Americans have been targets of terrorism overseas for years. – Foreign terrorists view the U.S. as a priority target.
16
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 16 Terrorist Groups with International Agendas Many groups are conducting criminal activities as well as military style training in the United States and in other countries ion support of their groups objectives. Take advantage of advanced technology available in the U.S. as well as unrestricted travel.
17
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 17 Terrorist Groups with International Agendas Al-Gama at Al-Islamiyya – Egypt’s largest militant group Hezbollah – Lebanese umbrella organization of radical Islamic Shi’ite groups and organizations. – Name means “party of God” Hamas – Name means courage and bravery – Largest Palestinian militant movement – Won the PA’s general elections in 2006.
18
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 18 Terrorist Groups with International Agendas The Al-Aqsa Martyrs’ Brigade – Emerged from Arafat’s Fatah faction of the PLO in 2001 Palestinian Islamic Jihad – Influenced by Islamic revolution in Iran – Israel is main target Al-Qaeda – Led by Osama bin Laden – Targeted U.S. and other Western interests as well as Jewish targets and Muslim government that it sees as corrupt and the Saudi monarchy.
19
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 19 New Terrorism New Terrorists groups have international objectives, and globalization has allowed these groups to facilitate other terrorist groups on a world wide level. Terrorism has a much greater potential to cause harm to Americans and to require the intervention of police agencies at the local, municipal, and county levels as well as at the federal level of investigation.
20
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 20 The American Response to Terrorism The United States has revamped the mission and structure of a number of federal law enforcement agencies and created new ones to coordinate counterterrorism activities. The National Strategy for Homeland Security and the Homeland security Act of 2002 created the Department of Homeland Security (DHS).
21
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 21 The American Response to Terrorism DHS coordinates the activities of more than 180,000 employees and is charged with overseeing these seven goals: 1.Creating awareness 2.Prevention 3.Providing protection 4.Developing appropriate responses 5.Recovery 6.Service 7.Organizational excellence
22
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 22 The American Response to Terrorism Border and Transportation Security – Responsible for maintaining the security of the nation’s borders and transportation system. Emergency Preparedness and Response – Oversees domestic disaster preparedness training and coordinates government disaster response.
23
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 23 The American Response to Terrorism Science and Technology – Preparing for and responding to the full range of terrorist threats involving weapons of mass destruction. Information Analysis and Infrastructure Protection – Analyzes intelligence and information from other agencies. Secret Service and Coast Guard – Remain under DHS but report directly to the Secretary.
24
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 24 Antiterrorism Activities Counterintelligence – Gathering political and military information about foreign countries and institutions to prevent terrorist actions. The intelligence model to terrorists activities considers terrorist activity as threats to the security of the state rather than as traditional criminal acts.
25
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 25 Local Police and Terrorism Crisis negotiation team – A group of specialists trained to defuse potentially dangerous situations. Suspect Background Information – Use modus operandi files – Telephone, cable, wiretaps, and Internet tracking Physical Evidence – Extremely important in the prosecution of terrorists activities.
26
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 26 Cyber Crimes Crime using the Internet & technology Children spend hours a day on the Internet Cyber Predators – Individuals, usually men, who use the Internet to hunt for victims to take advantage of, especially children, preteens, and teen who may be manipulated or seduced into meeting and engaging in sexual activity. – Cyber sex offenders use computers for purposes that may involve viewing, storing, producing, sending and receiving child pornography.
27
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 27 Profiles of Child Pornography Users Typical person arrested for child pornography is a white male age 26 or older. 97% acted alone Internet Crime against Identified Victims – Two categories 1.Internet-initiated 2.Family or Prior Acquaintance
28
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 28 Categories of Internet Sex Crimes against Children
29
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 29 Profiles of Child Pornography Users Internet Solicitations to Undercover Law Enforcement – Referred to as proactive cases – Police patrol chat rooms Internet Child Pornography – Use the Internet to possess, distribute, and trade child pornography. – Generally involve multi jurisdictions.
30
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 30 Profiles of Child Pornography Users Cyberstalking – Using the Internet to track and repeatedly contact people, especially children. – Transmitting threatening or sexually explicit messages via email to children. Sexual tourism – Traveling, both in the United States and in foreign countries, for the expressed purpose of locating children with whom to engage in sexual activity, sexual abuse, or sexual exploitation.
31
Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 31 Implications for Law Enforcement New legislation can assist in the prosecution of individuals who sexually exploit children via the Internet. Agencies should acquire technical knowledge and expertise concerning the use of the Internet. Departments should develop specialized Internet units that investigate Internet crimes.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.