Terrorism and Organized Hate Crime

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis and Investigations, Third Edition

Published:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$93.95
Add to cart
ISBN 9781439867594
Cat# K13056
eBook
ISBN 9781466505056
Cat# KE16049
 

Features

    • Explains how investigators can enhance their surveillance
    • Details the tracking of illicit funds used for terrorism
    • Describes methods employed by the government to address terrorism-related activities
    • Focuses on the National Suspicious Activity Reporting (SAR) Initiative and explores how to implement the process of behavior-based analysis
    • Identifies the difference between source development and criminal informants
    • Examines the Fusion Center concept and practices
    • Identifies radicalization and recruitment behaviors

     Ancillary materials available with qualifying course adoption

    Summary

    The ability of law enforcement agencies to manage intelligence is key to fighting the war on terror, and a critical foundation of intelligence-led policing is proper analysis of the information gained. Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations, Third Edition provides a methodical approach to analyzing homeland security needs, enabling the law enforcement community to understand the vital role it plays in the war on terrorism.

    Using techniques applicable to the private and the public sector, the book combines academic, research, and practitioner perspectives to establish a protocol for effectively gathering, analyzing, investigating, and disseminating criminal intelligence. The book demonstrates how to recognize the indicators of an impending act of terrorism or mass violence, how to deter an attack, and how to transform information into intelligence to meet community demands for safety and security.

    New chapters in this third edition focus on source development and their use in investigations, the role of fusion centers, terrorism financing, the handling of classified materials, and the National Suspicious Activity Reporting (SAR) Initiative. The book also discusses pre-incident indicators, the radicalization process, and behavioral traits associated with terrorism.

    A one-stop resource for the homeland security, intelligence analyst, and investigative professional, this volume arms those tasked with protecting the public with a solid blueprint for combating and investigating crimes associated with terrorism and hate.

    Table of Contents

    A need for understanding and analysis
    The mission
    Intelligence analysis units
    Defining analytical positions and roles
    Intelligence disciplines
    What is homeland security and terrorism analysis?
    Understanding what needs to be analyzed
    Keys to analysis
    Deterrence, prevention, arrest, and target hardening
    Deterrence
    Prevention
    Arrest
    Target hardening


    Understanding and defining terrorism
    Defining terrorism
    Defining terrorist activity
    Forms of terrorism
    Political terrorism
    Ecological terrorism
    Agricultural terrorism
    Narco-terrorism
    Biological terrorism
    Cyberterrorism
    History and roots of modern terrorism
    The evolution of domestic terrorism
    Domestic terrorism
    Organized hate groups and crimes
    Role of organized hate groups in domestic terrorism
    What is a terrorist?
    Terrorist versus street criminal
    Understanding the religious connection
    Islamic extremism
    Islamic sects
    Terrorism: Structure and management

    Homeland security and analysis
    Definition of homeland security
    Homeland Security Advisory System
    The updated Homeland Security Advisory System
    National Threat Advisory System
    Homeland security and analysis
    The Uniting and Strengthening America by Providing Appropriate Tools
    Required to Intercept and Obstruct Terrorism Act
    Importance of finances in terrorist activities
    Hawala system
    Charitable contributions—zakat
    Dealing with terrorism
    Law enforcement concerns
    Coordination, training, and awareness

    Behavioral traits and suspicious activity
    National information sharing and suspicious activity reporting
    Why suspicious activity reporting, and the role of local law enforcement
    Suspicious activity reporting and the national landscape
    Suspicious activity reporting behavioral indicators
    Actions arousing suspicion
    Possession arousing suspicion
    Retrieving the suspicious activity report for analysis
    Terrorism information needs
    Radicalization and behaviors
    Early indicators of terrorism
    Would-be warriors
    Relationships of people, places, and things
    Data and information quality
    Information life cycle
    Information quality

    Gathering information, the key to the process
    Intelligence gathering
    Role of the first responder
    Crimes and incidents that may yield information or links
    Stolen identities
    False identification
    Gathering limitations and restrictions
    Gathering information from tips
    Intelligence gathering and information interpretation
    Evaluating the information used

    Enhancing investigations: Going beyond the traditional
    Middle Eastern criminal enterprises
    Financing terrorism through various forms of criminal activity
    Role of the financial investigator in the intelligence process
    Role of fusion centers in the intelligence process
    Intelligence-led policing
    Fusion centers
    Handling of classified materials
    Security and nondisclosure
    Source development and use in investigations (human intelligence)
    Source development and handling procedures
    Source management
    Open source reporting
    Confidential source management and reporting

    Working the puzzle one piece at a time: Learning to anticipate behavior
    Data set challenges
    Names and addresses
    Data tools
    Identifying what is needed
    Forms of analysis that can be used to identify the missing piece
    Use of calendars and significant dates in analysis
    When is 9/11 not 9/11?
    Dates of terrorism significance
    Learning from past behavior
    Looking for skill, knowledge, resource, access(ibility), motive
    Recruiting opportunities
    Prisons—Recruitment and communication
    Ability to communicate from within
    Gangs—Today’s street terrorists
    Mara Salvatrucha 13 and Sureño 13
    Music—Another means to recruit

    Enhanced analysis: Transforming information into intelligence
    Analyzing: Transforming information into intelligence
    Analytical and investigative variables
    Websites and other resources
    Macro-micro-macro continuum
    Link analysis charts
    Association and directional matrices
    Event flowcharts
    Heuer’s analysis of competing hypotheses (ACH)
    Assessing the threat
    Vulnerability assessment
    Spatial referencing and its use in homeland security analysis
    Range of geographic information system uses
    Preparation and planning
    Geographic information system linking
    Additional benefits of a geographic information system
    Dissemination of intelligence
    Commonly used analytical reports

    The threat: The future is here today—Learning from the past
    Transportation targeted
    Transportation and terrorism
    The Irish Republican Army campaign against transportation
    Planes, trains, and automobiles—But there are more
    United States: Terrorism and transportation
    Symbolic government targets
    Notable terrorist cases and attacks with a transportation nexus other than 9/11
    Aviation (Figure 9.1)
    Maritime
    Buses and trains/railways
    Trucks, cars, vans, taxis, limos, and rescue vehicles
    Bicycles
    Summary of recent transportation targets
    Use of suicide bombers
    Who are the bombers and their groups?
    What can you look for?
    Homegrown terror—Learning from others
    Expanded details
    Cases for groups found in the United States and abroad
    Other notable cases

    What the future may hold
    Foreign-based terrorist influence
    Groups, movements, and ideologies with a presence in the United States
    Hezbollah
    Al-Gama’a al-Islamiyya
    Hamas (Islamic Resistance Movement)
    The Muslim Brotherhood Movement (Hizb al-lkhwan al-Muslimun)
    Wahhabism
    Means of support
    Cyberterrorism
    Defining cyberterrorism
    Spectrum of cyber conflict
    Using Internet Protocol addresses and e-mails in analysis
    Some Internet problems that might come up during analysis
    Finding information in an e-mail
    E-mail addresses
    What is an Internet Protocol address?
    No message, no extended header, no Internet Protocol address
    Tracing an e-mail address to an owner
    Does the target have a web page?
    How does one trace a web address?
    Bioterrorism and weapons of mass destruction
    The past, present, and future

    Conclusion
    Expanding horizons through media outlets
    Muslim/Arab Internet news sites and resources

    Appendix A: Domestic-based terrorist organizations
    Appendix B: "Patriot" groups in the United States
    Appendix C: Symbols of hate
    Appendix D: Foreign-based terrorist organizations
    Appendix E: Explosive materials
    Appendix F: Homeland security state contact list
    Appendix G: Publication references
    Appendix H: Government legislative references
    Appendix I: Glossary of terminology
    Appendix J: Department of Homeland Security recognized fusion centers
    Index

    Author Bio(s)

    Textbooks
    Other CRC Press Sites
    Featured Authors
    STAY CONNECTED
    Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
    Sign Up for Email Alerts
    © 2013 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us