McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Flashcards
Internet Exercises
Interactive Exercise
Feedback
Help Center


Swanson, Criminal Investigation 8/e
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa

Terrorism

Chapter Outline

I. INTERNATIONAL TERRORISM (See Slides 20-2 and 20-3)

A. "International terrorism involves violent acts or acts dangerous to human life that are the violation of the criminal laws of the United States or any state, or that would be a criminal act if committed within the jurisdiction of the United States or any state." In addition to Osama bin Laden’s Al-Qaeda there are many other terrorist groups.

1. Abu Nidal: Split from the Palestine Liberation Organization in 1974, it since has launched terror attacks in more than 20 nations and killed or wounded more than 900 people.

2. Abu Sayyaf: Affiliated with Al-Qaeda, it is the most radical Islamic separatist group in the southern Philippines.

3. Armed Islamic Group: Seeks to replace the secular Algerian government with an Islamic state.

4. Aum Supreme Truth: Also known as Aum Shinri-kyo, the group gained infamy for loosing sarin nerve agent in the Tokyo subway system, killing 12 people and injuring up to 6,000.

5. Basque Fatherland and Liberty: Known by Basque initials, ETA, the group was founded in 1959 with the aim of establishing an independent, Marxist homeland in the border area between Spain and France.

6. HAMAS: Also called the Islamic Resistance Movement, this group formed in late 1987 from the Palestinian branch of the Muslim Brotherhood.

7. Hezbollah: This radical Shiite Muslim group is dedicated to increasing its political power in Lebanon and opposing Israel and the Middle East peach process.

8. Al-Jihad: This Egyptian group seeks an Islamic state and attacks U.S. and Israeli interests in Egypt and abroad.

9. Kach and Kahane Chai: Israeli terrorists whose goal is to restore the biblical state of Israel.

10. Kurdistan Workers’ Party: Founded in 1974 as a Marxist-Leninist insurgent group, the party is primarily composed of Turkish Kurds bent on forming an independent Kurdish state in southern Turkey.

11. Liberation Tigers of Tamil Eelam: Founded in 1976, it is the most powerful Tamil group in Sri Lanka.

12. Majahedin-e-Khalq Organization: Known as MEK or MKO, this Iranian Marxist-Islamic group formed in the 1960s to counter "excessive Western influence: in the shah’s regime.

13. National Liberation Army: Based in Colombia, this Marxist insurgent group formed in 1965 and is currently in a dialogue with the Colombian government.

14. Palestine Islamic Jihad: Originating among militant Palestinians in the Gaza Strip in the 1970s PIJ is one of many groups seeking the creation of an Islamic Palestinian state and the destruction of Israel.

15. Palestine Liberation Front: Started as a breakaway from the Popular Front for the Liberation of Palestine--General Command in 1973 but later split into pro-PLO, pro-Syrian and pro-Libyan factions.

16. Popular Front for the Liberation of Palestine: A Marxist-Leninist group founded in 1961 by George Habash, it committed numerous international terrorist attacks during the 1970s.

17. Popular Front for the Liberation of Palestine-General Command: Violently opposes Yasser Arafat's PLO.

18. Revolutionary Armed Forces of Colombia:

19. Revolutionary Organization 17 November: A Greek radical leftist group established in 1975, it is named for the 1973 student uprising that protested Greece’s military regime.

20. Turkish Revolutionary People’s Liberation Front: Also called Dev Sol, this Marxist group formed in 1978 is virulently anti-American and anti-NATO.

21. Sendero Luminoso: The Shining Path terror group of Peru, is based on founder Abimael Guzman's belief in militant Maoist doctrine.

22. Tupac Amaru Revolutionary Movement: A Peruvian group formed in 1983 that alms to establish a Marxist regime.

B. Mission-Specific Cells (See Slides 20-4 and 20-5)

Mission-Specific cells are put together for the purpose of executing a specific mission. Information is often tightly compartmentalized to prevent the mission from being "blown" if one or more people are arrested.

C. The Terrorists

The terrorists involved in the 9/11 attacks ranged in age from the early twenties to the mid-thirties and were from Middle Eastern countries

D. Terrorists' Bank Accounts

With cash or its equivalent, attackers opened 24 domestic bank accounts in four different banks, averaging $3,000 to $5,000 per account.

E. Terrorists' Transactions

The accounts were funded primarily by cash and overseas wire transfers and were kept below $10,000 to avoid federal banking reporting requirements.

F. Sleeper Cells (See Slide 20-6)

Sleeper cells are small groups of individuals who are in place in target or other countries.

II. DOMESTIC TERRORISM (See Slides 20-7, 20-8, and 20-9)

"Domestic terrorism" is the unlawful use, or threatened use, of violence by a group or individual based and operating entirely within the United States or its territories, without foreign direction, committed against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.

A. Right-Wing Terrorists. "Domestic right-wing terrorist groups often adhere to the principles of racial supremacy and embrace antigovernment, antiregulatory beliefs.'

B. Left-Wing Terrorists. Left-wing terrorists generally profess a revolutionary socialist doctrine and view themselves as protectors of the people against the 'dehumanizing effects’ of capitalism and imperialism.

C. Special-Interest Groups

Perhaps the most active special-interest groups in the United States are the Animal Liberation Front (ALF) and the Earth Liberation Front (ELF).

 

III. TREAT ASSESSMENT (See Slides 20-10, 20-11, and 20-12)

Of necessity, threat assessments are ongoing and subject to change as usable intelligence about intentions and capabilities of existing and new groups is produced. Since 1968,14,00 international terrorist attacks have taken place throughout the world. In the United States, between 1980 and 1999, there were 457 prevented, suspected, or actual terrorist acts, of which 163 involved international terrorists.

Externally, international terrorists are a formidable challenge because of the heretofore relaxed U.S. policies on obtaining visas and the presence of numerous lucrative and relatively "soft" American targets abroad, where access is less problematic for terrorists. The foreign threats are classified into three categories:

1. The radical international Jihad movement, largely consisting of Sunni Islamic extremists, such as those in Al-Qaeda.

2. Formal terrorist groups, including HAMAS and Hezbollah.

3. State-sponsored terrorism, primarily by Iran, Iraq, Sudan, and Libya.

IV. NATIONAL STRUCTURES (See Slide 20-13)

A number of federal agencies are involved in intelligence gathering, foreign counterintelligence, terrorism prevention and investigation and counterterrorism.

A. The National Infrastructures Protection Center (NIPC) is responsible for protecting and investigating unlawful acts against U.S. computer and information technologies and unlawful acts, both physical and electronic, that threaten or target critical U.S. infrastructures.

B. Enacted in response to the September 11 attacks the U.S. Patriot Act of 2001 provides law enforcement with new, broadened electronic surveillance authority.

C. The Department of Justice, Defense, Energy, and Health and Human Services, the Environmental Protection Agency, and the Federal Emergency Management Agency form the National Domestic Preparedness Office (NDPO). Established in 1998, it is responsible for assisting state and local authorities with the planning, equipping and training, including health and medical support, needed to respond to a WMD attack.

D. The FBI Counterterrorism Center has steadily expanded since its creation in 1996. It operates on three fronts: international terrorism operations both within the United States and abroad, domestic terrorism operations, and counterterrorism measures at home and abroad.

V. INVESTIGATION (See Slides 20-14, 20-15, 20-16, and 20-17)

Many officers will miss opportunities to investigate terrorism because they have not been provided with the resources needed to accurately determine whom they have stopped or what the persons' intentions are. The role of state and local agencies in combating both domestic and, recently, international terrorism is rapidly evolving, but there are things that such agencies and/or their officers can do immediately:

1. Participate in Joint Terrorism Task Forces.

2. Keep a Suspicious-Activity Log

3. Use Critical Thinking

4. Be alert for Reconnaissance Operations.

5. Apply and Update Your Knowledge Base

VI. TERRORIST CRIME SCENES (See Slides 20-18, 20-19, 20-20, and 20-21)

Terrorists have a wide range of tactics available to them. This section focuses on two areas of major concern: limited biological attacks and chemical attacks that produce mass casualties.

A. Limited Biological Attacks: Anthrax

Biological agents include both living microorganisms and the toxins produced by organisms. Their effect on humans ranges from various degrees of illness to death. Compared with chemical agents" biological agents are generally slower-acting.

1. Anthrax is an acute infectious disease caused by a bacterium, which has a one- to six-day incubation period, although in some unusual cases incubation may take as long as eight weeks.

a. In cutaneous anthrax, a cut or abrasion in the skin allows the anthrax bacterium to enter the body.

b. Intestinal anthrax is contracted by eating anthrax-contaminated meat that has been insufficiently cooked; it produces an acute inflammation of the intestines.

c. Inhalation anthrax enters the body through the respiratory system.

2. Biological Scene with No Overt Dissemination: Unopened Suspicious Letters and Packages. Workers have died from handling unopened mail containing inhalation anthrax. New precautions will reduce the potential for receiving anthrax-tainted mail through the U.S. Post Office and other major carriers.

3. Biological Scene with Limited Dissemination: Opened and Easily Bagged Letters and Packages. A somewhat higher level of PPE is required at a biological scene with limited dissemination—such as one in which dissemination occurs only through an opened letter or package—even if the situation is still fairly contained.

B. Chemical Attacks: Mass Casualties. Chemical attacks may be accomplished with V agents, mustard gas, sarin, soman, and tabun. With some chemical agents, incapacitation of victims occurs in only 1 to 10 minutes. We have no experience dealing with mass casualties from a chemical-agent attack.

l. Initial Response to the Scenes. There may or may not be a warning before the attack; you must be on the alert for signs of danger when you patrol or are assigned to the scene of a possible chemical threat or to a chemical attack scene.

2. Protection Measures. The most important thing you can do is resist the urge to rush in and help. First protect yourself; put on the highest level-PPE you have. including respiratory protection, immediately.

VII. LOOKING FORWARD

A. In addition to the dangers already discussed, other types of terrorist acts are possible, including agroterrorism, threats to water supplies, and the use of high-energy radio frequency (HERF) electromagnetic pulse (EMP) weapons.

B. HERF weapons direct a high-energy radio signal at particular targets, such as computers and networks. They are essentially denial-of-service weapons.

C. EMP bombs can destroy electromagnetic systems over a wide area when they are detonated.