Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Haro flightline sport sixty sixty one

18/11/2021 Client: muhammad11 Deadline: 2 Day

Postmodern global terrorist groups engage sovereign nations asymmetrically with prolonged, sustained campaigns driven by ideology. Increasingly, transnational criminal organizations operate with sophistication previously only found in multinational corporations. Unfortunately, both of these entities can now effectively hide and morph, keeping law enforcement and intelligence agencies in the dark and on the run.

Perhaps more disturbing is the fact that al Qaeda, Hezbollah, FARC, drug cartels, and increasingly violent gangs—as well as domestic groups such as the Sovereign Citizens—are now joining forces. Despite differing ideologies, they are threatening us in new and provocative ways. The Terrorist-Criminal Nexus: An Alliance of International Drug Cartels, Organized Crime, and Terror Groups frames this complex issue using current research and real-world examples of how these entities are sharing knowledge, training, tactics, and—in increasing frequency—joining forces.

Providing policy makers, security strategists, law enforcement and intelligence agents, and students with new evidence of this growing threat, this book:

• Examines current and future threats from international and domestic criminal and terror groups

• Identifies specific instances in which these groups are working together or in parallel to achieve their goals

• Discusses the “lifeblood” of modern organizations—the money trail • Describes how nefarious groups leverage both traditional funding

methods and e-commerce to raise, store, move, and launder money • Explores the social networking phenomenon and reveals how it is the

perfect clandestine platform for spying, communicating, recruiting, and spreading propaganda

• Investigates emergent tactics such as the use of human shields, and the targeting of first responders, schools, hospitals, and churches

This text reveals the often disregarded, misunderstood, or downplayed nexus threat to the United States. Proving definitively that such liaisons exist, the book provides a thought-provoking new look at the complexity and phenomena of the terrorist-criminal nexus.

The Terrorist- Criminal Nexus

Jennifer L. HestermanISBN: 978-1-4665-5761-1 9 781466 557611

90000

An Alliance of International Drug Cartels, Organized Crime, and Terror Groups

H esterm

an The Terrorist-Crim

inal N exus

w w w . c r c p r e s s . c o m

www.crcpress.com

K15479

Homeland Security/Terrorism

The Terrorist- Criminal Nexus

An Alliance of International Drug Cartels, Organized Crime, and Terror Groups

The Terrorist- Criminal Nexus

Jennifer L. Hesterman

An Alliance of International Drug Cartels, Organized Crime, and Terror Groups

CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works Version Date: 20130220

International Standard Book Number-13: 978-1-4665-5762-8 (eBook - PDF)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www. copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750- 8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identi- fication and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

v

© 2010 Taylor & Francis Group, LLC

Contents

Preface xv

About the Author xxi

Chapter 1 A Poisonous Brew 1 References 5

Chapter 2 Transnational Organized Crime: The Dark Side of Globalization 7 Multinational Corporate Sophistication 8

Transnational Organized Crime on the Rise 9

Scoping the TOC Challenge 10

Eurasian Transnational Crime: Size, Wealth, Reach 11

Italian Transnational Crime: Not Your Grandfather’s Mafia 13

Baltic Transnational Crime: Emergent and Deadly 17

Asian Transnational Crime: Sophisticated and Multicultural 18

African Criminal Enterprises: Internet Savvy and Vast 20

Emerging Area of Concern: North Korea 22

Fighting Transnational Crime Overseas … and within Our Borders 23

Palermo Convention: First Strike on TOC 24

National Strategy to Combat Transnational Organized Crime 25

Agencies and Methods 28

INL 28

DOJ 29

FBI 30

vi Contents

© 2010 Taylor & Francis Group, LLC

Major Areas of Concern, Progress, and Lessons Learned 32

Counternarcotics 32

Human Trafficking 35

Money Laundering 37

Corruption 38

Lessons Learned 39

References 40

Chapter 3 Postmodern Terrorist Groups 43

Postmodern Organizational Theory: The Rise of Modern Terrorism and Groups 45

Genesis of Postmodern Groups and Thinking 45

Upstream Thinking 46

Epistemology 47

Deconstruction 47

Deconstruction’s Danger 48

Postmodern Organizational Theory 48

Neo-Marxist Organizational Theory 49

Diagnostic Tools of Postmodernism 51

Systems Theory 51

Environmental Theory 52

Symbolic Theory 53

Postmodern Theory and the Rise of Modern Terrorism 53

Final Thoughts on Postmodernism 54

Modern Terrorism’s Roots 55

What Is Terrorism? 55

Terrorism’s Target 56

The New Anatomy of a Terrorist Group 57

Life Cycle Study 58

Terrorist Group Members 60

Behavior 60

Motivation 61

Culture 62

Environment 63

viiContents

© 2010 Taylor & Francis Group, LLC

How Terrorist Groups End 64

International Terrorist Groups: The “Big 3” 66

Al Qaeda and Affiliates 66

The Ideology 67

Rise of bin Laden and al Qaeda 68

Emergent al Qaeda 69

AQAP or Ansar al-Sharia 69

Other Al Qaeda Splinter Groups 70

Bin Laden Speaks 72

Al Qaeda’s New Goals and Tactics 73

Al Qaeda and Nexus 73

Hezbollah 75

Unique Structure 76

Methodology and Objectives 76

Primary Area of Operations 77

Tactical Depth and Breadth 77

Political Acumen 78

Leveraging the Community 78

Strong Leadership 79

Active and Deadly 79

Global Operations 80

Latin America 80

Nexus Concern: Venezuela 80

West Coast of Africa 82

Europe 83

Iraq 83

Canada 83

United States 84

U.S. Response 85

FARC 85

Colombia: A Sophisticated, Transnational Narco-State 86

Final Thoughts 87

References 88

viii Contents

© 2010 Taylor & Francis Group, LLC

Chapter 4 Domestic Terrorism and the Homegrown Threat 93

History of Domestic Terrorism in the United States 94

The Twenty-First Century and the Rising Tide of Domestic Extremism 99

Right-Wing Extremism 100

Militias 102

Sovereign Citizens 103

Left-Wing 106

Anarchists 106

Single-Issue or Special-Interest Terrorism 110

The Earth Liberation Front (ELF) 110

Animal Liberation Front (ALF) 110

Homegrown Terror 113

Rehabilitation and the Domestic Terrorist 115

Jihadist Defined 116

Recidivism 116

Terrorist Recidivism 116

Counterradicalization Efforts 117

Inside the Saudi Program 117

Possible Solutions in the Homeland 119

The Lone Wolf 120

Gangs: Evolving and Collaborating 122

MS-13—Moving toward 3G2 123

History 124

Structure 124

Operational Activities 124

Adaptable and Morphing 124

Sophistication 124

Internationalization 124

Rival Gang 125

Outlaw Motorcycle Gangs (OMGs) 126

Prison Gangs 126

Special Concern: Gangs and the Military 127

ixContents

© 2010 Taylor & Francis Group, LLC

The Way Ahead 127

References 128

Chapter 5 Drug-Trafficking Organizations Go Global 133 The Battle in Mexico 133

Ideology: Money 134

Tactic: Brutal Violence 135

Goals: Money, Power, Control 138

Major DTOs Impacting the United States 138

Nuevo Cartel de Juárez 138

Gulf Cartel/New Federation 139

Sinaloa Cartel 139

Beltran Leyva Organization (BLO) 140

Tijuana/Arellano Felix Organization (AFO) 140

La Familia Michoacana (LFM) 141

Special Concern: Los Zetas 141

Zeta Tactics 142

Increasing Reach in the United States 144

Interaction with Dark Networks 147

Nexus with Gangs 147

Criminal Activity Expanding 148

Savvy Propaganda Campaigns 148

DTOs Cross the Border: Cartels in the Heartland 149

LE Operations against DTOs in the United States 150

Operation Dark Angel 152

Project Delirium 152

Project Deliverance 153

Project Xcellerator 153

Project Reckoning 153

Nexus Area: Terrorists, SIAs, and DTOs 154

Corruption at the Border: Opening the Gates 157

DTOs: Foreign Terrorist Organizations? 159

Final Thoughts 160

References 161

x Contents

© 2010 Taylor & Francis Group, LLC

Chapter 6 Traditional Terrorist and Criminal Financing Methods: Adapting for Success 165

Funding Terror 166

Earning, Moving, Storing 167

Tactics 167

Earn 168

Move 168

Store 168

Earning 169

Charities 169

Designation 169

Zakat 172

Commodities Smuggling and Organized Retail Crime 173

Intellectual Property Crime (IPC) 175

Identity Theft 179

Other Fund-Raising Methods 183

Mortgage Fraud: Emergent Earning Method 184

Moving 186

A Paper Chase in a Paperless World: Informal Value Transfer Systems 186

Hawala 188

Storing, Earning, and Moving 189

Precious Metals and Diamonds 189

Money Laundering 192

Fronts, Shells, and Offshores 194

Bulk Cash Smuggling 196

E-gambling and E-gaming: Emergent Money-Laundering Concerns 197

E-gambling 197

E-gaming 198

The Way Forward 200

References 200

xiContents

© 2010 Taylor & Francis Group, LLC

Chapter 7 Terrorists and Criminal Exploitation of E-commerce: Following the Money Just Got Tougher 205

New Payment Methods Defined 206

Typologies and Concerns 207

Use of a Third Party 207

Person-to-person (P2P) Transactions 208

Lack of Human Interaction and Oversight 208

NPM Financing 209

Nonbanks 210

Internet-Based Nonbanks 211

The MSB 212

Methods of Using MSBs to Move Money 213

Digital Currency Exchange Systems 215

Prepaid Access Cards 219

Limited-Purpose/Closed-Loop Cards 220

Multipurpose/Open-Loop Cards 221

E-purse or Stored-Value Cards (SVCs) 223

Devices with Stored Value 224

Auction and Bulletin Board Websites 228

Auction Sites 229

Auction Site Intellectual Property Theft (IPT) 230

P2P Websites 232

Digital Precious Metals 235

E-dinar 237

The Battle Ahead 239

References 240

Chapter 8 Exploitation of Social Networking and the Internet 243

The Internet: A Twenty-First-Century Black Swan 244

Rise of Social Networking: Are We Users … or Targets? 245

The Mind as a Battlefield: The War of Ideology 247

Shifting the Cognitive Center of Gravity 247

xii Contents

© 2010 Taylor & Francis Group, LLC

Preying on Maslow’s Needs: Affiliation 248

Social Cognitive Theory at Play 249

Marketing Ideology and Fear 250

Hizb-ut-Tahrir (HuT) 250

Exploitation by Other Groups 253

Looking through a New Lens at Social Networking 254

Second Life 254

LinkedIn 256

Facebook 258

YouTube 260

Hidden Messages on the Web 260

Enter Hackers and Cyber Vigilantes 262

th3j35t3r and th3raptor 264

Other Notable Vigilantes 265

The Way Ahead 268

References 270

Chapter 9 Sharing Tactics 273

Drug-Trafficking Organizations and Terrorist Group Interface 275

Tunnels 275

Bombs 276

IRA Inc. 278

Hezbollah and Hamas: Partnering for Success 280

IEDs, Fertilizer, and Sticky Bombs 280

IEDs 281

Fertilizer 282

Sticky Bombs 282

First Response and the Threat of Secondary Devices 283

Use of Human Shields by Terror Groups on the Rise 285

Hamas 285

LTTE 286

Asymmetric Threats 286

WMD 288

xiiiContents

© 2010 Taylor & Francis Group, LLC

Final Thoughts 291

References 291

Chapter 10 Conclusions about the Nexus and Thoughts on Resiliency and the Way Forward 295 Resiliency as a Weapon 298

Glossary 301

Appendix: List of Foreign Terrorist Organizations 313

Current List of Designated Foreign Terrorist Organizations 313

Identification 314

Designation 315

Legal Criteria for Designation under Section 219 of the INA as Amended 316

Legal Ramifications of Designation 316

Other Effects of Designation 317

xv

© 2010 Taylor & Francis Group, LLC

Preface

September 11, 2001 began as all others, with a morning office meeting to discuss the daily schedule and downing a few cups of coffee to fuel the way ahead. I was an Air Force lieutenant colonel, stationed at Seymour- Johnson Air Force Base, North Carolina, an Air Combat Command base with several squadrons of F-15E fighter aircraft and thousands of mili- tary personnel and their families. We were gathered around the office television to watch live video of the “aircraft accident” in New York City and the increasingly thick smoke pouring out of the North Tower of the World Trade Center. At 9:03 A.M., a collective gasp filled the room as we witnessed the second aircraft impacting the South Tower. The mood immediately shifted from concern to horror as we realized our coun- try was under attack. And I instantly knew from years of research and study: the attacker was unmistakably al Qaeda.

Suddenly, I was in the unexpected position of trying to secure a major military installation and its panicked residents from an enemy with unknown intentions and capabilities. In the command center, my stunned colleagues and I watched the Defense Readiness Condition change to DEFCON 3, the highest level since the Cuban Missile Crisis in 1962. The Pentagon, which I had just left three months earlier, was attacked and burning. I had to suppress thoughts and concerns about my E-ring office and my many colleagues in danger or possibly dying. With more hijacked aircraft airborne, our jets were immediately loaded with weapons and crews put on alert. My husband, then a colonel, com- manded the fleet of fighter aircraft and crew members; he had to make sure his pilots were prepared to shoot down a civilian airliner on com- mand, something they had never trained for or considered a remote possibility prior to this fateful morning. We soon received the order to launch, and I could hear the aircraft thundering into the skies to fly Combat Air Patrol sorties over major east coast cities to guard from further attacks.

My job at the helm of the Emergency Operations Center was cha- otic for the next thirty-six hours. As the installation gates were locked down, we had children (including our young daughter) outside the fence in

xvi Preface

© 2010 Taylor & Francis Group, LLC

community schools and worried parents who were trying to get to them. Landlines and cellular phone networks crashed, and our most reliable way to communicate was through handheld radios, known as “bricks” for their cumbersome bulk. I ordered the communications squadron to break into deployment kits and access every other storage area on base to harvest bricks, batteries, and charging stations for commanders and first responders. Upon wise counsel from a staff member, I immediately executed a long standing contingency contract to withdraw bottled water from the base commissary for safekeeping in case the installation became a self-sustaining island. Sure enough, within hours, the grocery store was inundated with base employees and family members who understandably stripped the shelves of basic essentials. My security forces defenders estab- lished Force Protection Delta posture, emptying the base armory of battle gear, M-16s and service revolvers. Snipers and counter snipers took posi- tions around the base to protect us from attack. As I watched the surreal situation unfold, I remember thinking that the hundreds of mundane exer- cises endured during our careers were paying off: we were a calm, precise, well-oiled machine during the most intense stress of our young lives.

As I executed seven binders of emergency checklists, my team was faced with several unanticipated threats, starting with the escape of an inmate from a minimum security federal prison on base. A convict with an “interesting” background had taken advantage of the 9/11 morning confusion to jump the base fence; a quick check of records revealed he routinely participated in work details all over the base, in unclassified facilities and along the flight line, mowing grass, picking up trash and likely interacting with base personnel. The standard operating proce- dure was to put up search helos, however the state police were denied flight clearance due to the national emergency. Instead, we implemented a coordinated ground search with local sheriffs, but without further intelligence about the 9/11 attackers, we were flying blind: the prisoner’s intimate knowledge of our base and possible intentions were of extreme concern. A few hours later, an FBI agent from a local office requested a secure phone call with our military federal agents residing in the base Air Force Office of Special Investigations (AFOSI). We listened with sur- prise as his staff described ongoing surveillance operations and suspi- cious activities within the state and at nearby facilities, some frequented by military personnel. The most worrisome call came later in the day, from a local military retiree whose daughter was in an arranged mar- riage with a Middle Eastern citizen, both residing near the base. His son- in-law, who had visited our base on many occasions including during airshows, had unexpectedly left the U.S for a “country of interest” in the days prior to 9/11. We later learned the man had remote connections to the 9/11 attack planners; however, our contacts at the embassy overseas

xviiPreface

© 2010 Taylor & Francis Group, LLC

were unable to lay eyes on him. In light of these potential external dan- gers, the base was suddenly not the “island” it had always seemed. I also learned to operate within a new realm, that of ambiguity and the “inescapable unknowables.”

Thankfully, no threats to the installation materialized in the coming days, and eventually our attention shifted from protecting the homeland to taking the battle to the enemy. Sworn to protect our country from ene- mies foreign and domestic, we were anxious to leverage years of combat training and enter the fight of our lives to eradicate the threat. Indeed, in the intervening time since 9/11, our country has taken the fight to terror- ists around the globe. Yet, after 11 years, trillions of dollars, and most importantly, the thousands of young, promising lives lost in battle, the terrorist threat remains.

Despite our efforts, the radical Islamic ideology has spread like wild- fire, ignited by globalization and technological advances in the infor- mation, financing, and social networking realms. Al Qaeda is the most feared organization, but other international terrorist groups are poised to endanger our country, whether through direct engagement or circu- itously through trafficking or financial corruption. Many of our chal- lenges at home are also fed by modernized transnational crime, which, despite our countering efforts, is on the rise. Anarchy resulting from the end of the Cold War led to a boom in transnational crimes and groups involved operate with a level of sophistication previously only found in multinational corporations, exacerbating the problem. Hezbollah, Hamas, FARC, drug cartels, and increasingly violent gangs and domes- tic groups such as the Sovereign Citizens are threatening us in new, pro- vocative ways and now joining forces despite differing ideologies.

I have spent more than two decades leading organizations. Some were the high performing, well-oiled machine I worked with on 9/11. Others were dysfunctional and dying. The size, type, and business of an organization are virtually irrelevant as to whether it fails or succeeds. All organizations share the basics: structure, culture, and environment. They all have customers, stakeholders, and products. Activities are the same—recruiting, retention, planning, and execution. Organizations are populated by human beings, all of whom are driven by the same basic instincts and needs. In fact, the rise of modern terrorist and criminal groups can be predicted when viewed through the lens of foundational organizational and sociological theories. Furthermore, viewing the life- cycles of the groups and how they start, thrive, and terminate is extraor- dinarily helpful when discussing mitigation and engagement. It may be quite possible to inject game changers at the micro level that force groups to alter course and even implode from the inside – without ever firing a shot in anger or losing a life.

xviii Preface

© 2010 Taylor & Francis Group, LLC

Perhaps the most powerful statement in the 9/11 Commission report comes from Chapter 11 and is entitled “Foresight–And Hindsight,” as the committee cites a lack of imagination as a root cause of the two worst attacks in our country, Pearl Harbor and 9/11. Certainly, any study of the terror-criminal nexus requires a fusion of imagination, “dot con- necting” intuition, and corroborated, foundational evidence. As such, this book synthesizes more than 350 sources, including congressional testimony, subpoenas, scholarly studies, and historical documents. My objective was to academically frame the nexus issue, providing policy makers, strategists, operators, and students both new evidence and a different perspective for their planning and research efforts.

In the following chapters, we will explore current and future threats from international and domestic groups, and identify specific instances in which they are working together or in parallel to achieve goals. The money trail is increasingly the “lifeblood” of modern organizations, and this work examines how nefarious groups are leveraging both tra- ditional funding methods and e-commerce to raise, store, move, and launder money. An exploration of the social networking phenomenon will reveal how it is the perfect clandestine platform for spying, com- municating, recruiting, and spreading propaganda. Finally, this work investigates emergent tactics such as the use of human shields, and the targeting of first responders, schools, hospitals, and churches; the enemy doesn’t play by our rules, creating a dangerous blindspot that must be addressed.

I would like to thank the many colleagues, friends and family mem- bers who supported my efforts to produce this book. Numerous federal agents, state, and local law enforcement officers, intelligence analysts, and military personnel spoke with me off record, not to provide spe- cific information, but to lend validation and context to the nexus chal- lenges. They truly added a “voice” to this work and I appreciate their intense dedication to keeping us safe, despite being under resourced and overtasked. I would like to convey special thanks to a former student, Mark Manshack, a veteran law enforcement officer in Texas and mem- ber of my “brain trust” who gave great insight into the expanding pres- ence of cartels in his state. Sadly, as I put the finishing touches on the manuscript, Mark called with distressing news: his best friend, Deputy Brandon Nielsen, and his partner were killed in an ambush in La Place, Louisiana by a group of heavily armed Sovereign Citizens. Between them, the deputies leave behind six children and a grieving community. The La Place case is explored in Chapter 4, and serves as a reminder of both the importance of information sharing between agencies and the need for enhanced emergent threats training for our frontline defenders. Our new reality is that Americans will kill fellow citizens in the name of

xixPreface

© 2010 Taylor & Francis Group, LLC

many things, be it faith, guns, drugs, money, or ideology. Loyalty to fac- tion now transcends loyalty to nation; undeniably this is a hard concept to grasp, but we must prepare and be resilient.

On the work front, a special thank you to Alex Anyse and Tae Kim at the MASY Group and to Chris Graham, the editor of the Counter Terrorist magazine, for your friendship and ongoing support of my myr- iad endeavors. Also, I would like to thank my doctoral cohort colleagues and friends, Lisa Greenhill, John DiGennaro, and Aaron Clevenger for their encouragement and good humor. You wouldn’t let me abandon my studies during the juggling of this book project with school, and for that, I am forever grateful. Also, I owe a large debt of gratitude to my patient and extraordinary editors at Taylor and Francis, Mark Listewnik, Prudy Taylor Board, and Stephanie Morkert.

I would like to give special appreciation to my family for their love and support. My parents, Lloyd and Barbara Whitnack, bestowed both a great work ethic and the belief that anything is possible. Thank you to my brother, Matt Whitnack, for a lifetime of friendship. Much appre- ciation and love to my wonderful family, husband, John and daughter, Sarah for always supporting my dreams. Finally, thanks to my office companion and good-natured Lab, Hunter, for somehow always know- ing when I needed to take a walk in the park for fresh air and perspective.

You all inspire me to be a better person and to live each day richly and without regret.

xxi

© 2010 Taylor & Francis Group, LLC

About the Author

Colonel (Ret.) Jennifer L. Hesterman was commissioned in 1986 as a graduate of Air Force ROTC at Penn State University. During her twenty- one-year career, she served three Pentagon tours and commanded multiple units in the field. Her last assignment was Vice Commander, 316th Wing at Andrews Air Force Base, Maryland, the home of Air Force One. She was responsible for installation security, force support, and the 1st Helicopter Squadron, and regularly greeted the President

and other heads of state on the ramp. Her decorations include the Legion of Merit and the Meritorious Service Medal with five oak leaf clusters.

Colonel Hesterman is a doctoral candidate at Benedictine University where she is completing her dissertation regarding espionage on our college campuses. She also holds master’s degrees from Johns Hopkins University and Air University. In 2003, she was a National Defense Fellow at the Center for Strategic and International Studies in Washington, DC, where she immersed herself in a year-long study of the nexus between organized crime and international terrorism. Her resulting book won the 2004 Air Force research prize and was published by AU Press. Colonel Hesterman is also a 2006 alumnus of the Harvard Senior Executive Fellows program. Since her retirement in 2007, Jenni has worked as a cleared professional for The MASY Group, a global intelligence firm, and was a full-time instructor and then director of the national and homeland security pro- grams at American Military University. She is a contributing editor for The Counter Terrorist magazine and a guest lecturer for federal and state law enforcement agencies.

1

© 2010 Taylor & Francis Group, LLC

C H A P T E R 1 A Poisonous Brew

While organized crime is not a new phenomenon today, some govern- ments find their authority besieged at home and their foreign policy interests imperiled abroad. Drug trafficking, links between drug traf- fickers and terrorists, smuggling of illegal aliens, massive financial and bank fraud, arms smuggling, potential involvement in the theft and sale of nuclear material, political intimidation, and corruption all con- stitute a poisonous brew— a mixture potentially as deadly as what we faced during the Cold War.

—R. James Woolsey Former director, CIA1

Al Qaeda works with the Mafia. The Mafia works with outlaw motor- cycle gangs. Biker gangs work with white supremacists. Surprised?

Ten years ago, when I wrote my first book on this subject, the num- ber of experts who would acknowledge that a nexus may exist between terrorists and criminals could be counted on one hand. In fact, Mr. Woolsey’s chapter-opening statement was made in 1994, long before most people heard of al Qaeda, human trafficking, and loose nukes. Unfortunately, the “poisonous brew” is becoming more toxic with time. Transnational organized crime is escalating, the cartels are global and undeterred, and the list of State Department Foreign Terrorist Organizations continues to grow.

Transnational crime is a growing U.S. national security concern, and it threatens us in new, provoking ways. For example, Americans for- merly viewed drug use as a law enforcement or health issue. Only very recently has drug trafficking been established as a global crime with a corresponding national security threat. A lesser known and understood example of a growing transnational threat reaching our borders is human trafficking. When a boat filled with women and children leaves the shores of a distant country, delivering them to a life of enslavement and unimaginable abuse, we obviously feel compelled to engage out of moral obligation and belief that human dignity must be upheld and protected.

2 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

Consider that 18,000 to 20,000 of these human beings are delivered annually by criminals to the United States and forced into labor or pros- titution; trafficking becomes an obvious and direct threat to the fabric of our society. Unbeknownst to many, our National Security Strategy con- tains a goal entitled “Champion Aspirations for Human Dignity,” which ties human trafficking to our nation’s safety and prosperity. Factor ter- rorists and their use of established drug- and human-trafficking routes in and around our country into the equation, and these issues take on new and pressing significance.

Despite economic woes at home, our government continues to spend billions of dollars to help other countries identify and battle their transna- tional crimes issues, all of which impact our national security. Globally, drug-trafficking routes are robust and plenty; the ghastly business of human trafficking is flourishing; and money is laundered in amounts and ways never before imagined. Many resource-constrained countries strug- gle to deal with their role in this epidemic and are attempting to contain it. Others are corrupt and choose to look the other way, or worse, benefit from illicit activity. Bad actors are smart; they prey on nations in turmoil where the rule of law is weak and leadership lacking. Many nation-states are on the brink of thriving or failing, and their fate depends either on us … or on the help of organized crime and terrorists. Therefore we must engage. History also reveals that failing countries are like dominoes; they lead to failing regions, an even greater threat to our national security.

In the last decade, after eradicating al Qaeda’s base in Afghanistan we watched the group franchise and scatter throughout the Middle East and Africa. Bound by ideology, and despite the death of leader Osama bin Laden and others, radical Islamists continue undaunted on their mis- sion of establishing the caliphate under Sharia law. They envision the Islamist flag flying over world capitals, including ours. Besides radical ideology, what fuels these terrorist groups? How can they continue to operate with such abandon despite our efforts and those of our allies to fight a global war on terror? One answer is the corresponding rise in transnational crime. Another is the ability to leverage unexpected and emergent funding methods such as mortgage fraud and the e-gaming industry. Additionally, exploitation of the unpatrolled, uncontrolled Internet has allowed terrorist groups unrestrained recruitment, morale- boosting, and propaganda campaigns.

As this book reveals, the nexus exists. The executive branch of our government is so troubled about the partnering of terrorists and criminals that they issued a strongly worded document in July 2011 entitled Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security. The White House, acknowledging the nexus, stated, “Terrorists and insurgents increasingly are turning to crim- inal networks to generate funding and acquire logistical support.”2

3A Poisonous Brew

© 2010 Taylor & Francis Group, LLC

Groups with dissimilar ideologies are working together to further their goals. They are also copying successful tactics, learning from each other’s mistakes, and at the very least operating in the same physical or virtual “space.” To fully grasp the complex issue of the nexus, we must first investigate root causes and the environment contributing to its rise and persistence.

Transnational criminal groups now have sophisticated business models that parallel legitimate corporations. Feeding on globalization and advances in communications and logistics technology, modern transnational crime is more expansive, far deadlier, and extremely dif- ficult to eradicate. Adding further context to the issue is an overview of international agencies involved, methods used, and lessons learned in the fight against transnational crime, all of which should be simultane- ously applied to the global war on terror.

The discussion of the rise of postmodern terrorist groups is deeply rooted in the soft sciences; a fusion of psychology, sociology, and orga- nizational development and behavioral theory allows insight into many of the vexing “whys” about the terrorism phenomenon. Viewing the life cycle of terrorist groups yields a new solution set for engagement and an intuitive understanding as to why and when they liaise with actors espousing dissimilar ideologies. The “Big Three” international terror- ist groups that most threaten the homeland, al Qaeda, Hezbollah, and FARC, are morphing in structure and changing strategy and tactics. Understanding their new goals and methodology is important for policy makers, strategic planners, and operators alike.

Domestic terrorism from right-wing, left-wing, and single-issue groups remains a great concern for our law enforcement agencies. The growing propensity of these organizations and their members to “act out” and to step up and engage law enforcement is alarming. The radi- calization of Americans continues, with several successful attacks and more than fifty thwarted in our country since 9/11. Lacking a rehabili- tation program, we have no way of ensuring that jihadists who serve their prison sentence and return to society will not go back to their old ways … with a vengeance. The threat of the lone wolf, already embedded in society and acting alone with unyielding determination, is extremely worrisome. Factor in an unprecedented increase in hate groups and gangs in our country, and the domestic terrorism picture is quite grim with resource-constrained law enforcement agencies struggling to juggle myriad challenges.

Drug-trafficking organizations are flourishing south (and north) of our border with Mexico. Now operating in the United States, cartels are using gangs to move product and are attempting to corrupt border patrol officers to open lanes for moving people, drugs, and potentially worse into our nation. The Los Zetas cartel provides the most vexing

4 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

threat, as a paramilitary organization with the tactical knowledge and equipment of a small army. Two questions are posed for the reader’s con- sideration: Are the Mexican cartels a U.S national security risk, or have we overblown the threat? Is their activity in the United States terroristic or merely criminal in nature?

The lifeblood of any nefarious group is money. For criminal organi- zations and cartels, money is the motivation, with a side goal of corrup- tion and influencing the political process in their favor to keep profits flowing. However, for terrorist groups, the driver is the religious ide- ology, extreme and even apocalyptic. Financing operations off of law enforcement’s radar is critical, and the cost to move and train people, as well as procure material, is rising. For all groups, earning, moving, storing, and laundering are critical, whether “dirty” money that must be cleaned or “clean” money that will become dirty when funding a terror operation. Many traditional avenues of financing that funded the 9/11 attacks have been under intense scrutiny, such as charitable giving; therefore, terror groups are increasingly turning to intellectual property crime, counterfeit goods, and physical precious metals as ways to deal with money issues. The e-commerce boom has presented other oppor- tunities such as e-gambling, digital precious metals, e-gaming, anony- mous fronts and offshores, and the use of gift cards and e-banks to move money outside the regulated banking sector.

Money is a precious resource to terror groups, but if ideology is their center of gravity, then people are perhaps an even greater com- modity. The rise of social networking as a “Black Swan” is explored, and viewing the mind as the battlefield provides a framework for discus- sion regarding exploitation of Facebook, Twitter, YouTube, and virtual worlds such as Second Life. The use of steganography, combined with networking sites, provides a unique opportunity for clandestine commu- nication between groups and their followers. A provocative discussion regarding patriot hackers and cyber vigilantes gives insight into citizens as combatants and their rights to engage the enemy.

Finally, investigation of the sharing and copying of tactics between groups, and emergent threats to first responders rounds out the discus- sion regarding the nexus of groups, their surprising commonalities, and how they will and do work together to further their goals. The modern terrorist threat is asymmetric, and as such, countering it requires an asymmetric approach.

Material regarding nexus activities is typically buried in court docu- ments, obscure government press releases, and articles printed in the for- eign press that often do not appear domestically. Through the synthesis of hundreds of sources, this body of work attempts to pull together a compendium of information regarding the nexus, answering the ques- tions who, why, and how for the reader. The material will appeal to

5A Poisonous Brew

© 2010 Taylor & Francis Group, LLC

policy makers, strategic planners, operators, as well as citizens with an interest in our national security and emergent challenges who want to be force multipliers in this fight.

The overarching goal is less armchair speculation and a more practi- cal, informed view of the persistence of transnational criminals, cartels, and terrorists and their impact on our future.

REFERENCES

1. Cilluffo, Frank J., and Linnea R. Raine. Global Organized Crime: The New Empire of Evil. Washington, DC: Center for Strategic & International Studies, 1994.

2. The White House. Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security. http:// www.whitehouse.gov/sites/default/files/Strategy_to_Combat_ Transnational_Organized_Crime_July_2011.pdf.

7

© 2010 Taylor & Francis Group, LLC

C H A P T E R 2 Transnational

Organized Crime The Dark Side of Globalization

Transnational crime will be a defining issue of the 21st century for policymakers—as defining as the Cold War was for the 20th century and colonialism was for the 19th. Terrorists and transnational crime groups will proliferate because these crime groups are major beneficia- ries of globalization. They take advantage of increased travel, trade, rapid money movements, telecommunications and computer links, and are well positioned for growth.

—Louise I. Shelley1

The concept of transnational crime is not new. Drugs, money, and in- demand commodities have always been smuggled across borders and oceans, as criminals circumvent laws to enhance their illicit activity. For example, during the prohibition period in the United States, alcohol was illegally brought into the country from Mexico, Canada, and the Caribbean. Criminals and Mafia syndicates soon discovered that “boot- legging” was a far more profitable activity than extortion, prostitution, and gambling.

Early transnational crime was confined to regions, was not overly violent in nature, and consisted of small groups with a very orga- nized leadership structure. However, modern transnational crime is more expansive, far deadlier, and extremely difficult to eradicate due to a sophisticated, layered organizational structure, and “franchis- ing.” The vast threat posed by modern transnational organized crime to the political, economic, and social fabric of societies appeared in the mid-1990s. Contributing factors to its rise include globalization of business networks, lowered trade barriers, communication and techno- logical advances, and turmoil caused by the collapse of communism. A new class of actors emerged during this period, operating outside the

8 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

traditional nation-state system, subsequently hindering our ability to apply diplomatic and economic pressure to compel nations to address their organized crime issues.

The situation is increasingly complex, and transnational orga- nized crime (TOC) is penetrating our society in new and dangerous ways. According to the National Security Council’s Strategy to Combat Transnational Organized Crime, TOC is a growing threat to national and international security.2 Grant D. Ashley, former assistant director of the Criminal Investigative Division at the Federal Bureau of Investigation (FBI), testified, “It is our belief that the international growth of these very dangerous, criminally diverse and organized groups and their emergence in the United States has caused a significant expansion of our crime problem.”3 Former attorney general Michael B. Mukasey further stated, “Organized crime threatens the economy, national security, and other interests of the United States.”4 Naturally, expansion of any type of criminal activity is of interest to law enforcement. However, these vast global enterprises are increasingly used as a vehicle by terrorists to move resources, recruit, raise capital, or simply spread their sphere of influ- ence, raising the stakes. The liaison of criminals and terrorists makes the proliferation of TOC a pressing national security concern; however, as with all modern threats and groups, engagement is not easy and success is elusive.

MULTINATIONAL CORPORATE SOPHISTICATION

While studying the nexus as senior defense fellow at the Center for Strategic and International Studies, a think tank in Washington, DC, I published my first book on the nexus topic. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends (AU Press, 1995) provides a detailed look at the sophistication of groups and serves as the basis for the following discussion. Although routinely underestimated, TOC syndicates are very sophisticated, act as networks, and pursue the same types of joint ventures and strategic alliances as legitimate multinational corporations. A multinational corporation (MNC) is defined as one operating on a worldwide scale, without ties to any specific nation or region. The global business environment is unique and multifaceted, requiring extra considerations. Due to the complex- ity of international operations, the right people (e.g., lawyers, accoun- tants, and subject-area experts) must be on the payroll. Analysis of the international customer base, product demand, and proper positioning of the product is necessary to maximize profit. The company must assess the cost of doing business and streamline staff and operational activi- ties, thus cutting overhead as much as possible. Any business must have

9Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

good supply-chain management, from procurement to storage to prod- uct delivery; this process requires extra planning and an enhanced level of sophistication when applied to a global market. For example, under- standing international commerce laws and issues related to the operation of offshore businesses is a necessity. The company must acquire cultural knowledge of the countries involved in the transactions, including lan- guages, currencies, and business practices. Also, the corporate strategy must be in sync with these cultural nuances for success. Savvy business ventures are low risk and high return, and most are able to extract prof- its throughout the process. Finally, an MNC is able to leverage rapidly changing communication and transportation technology to stay viable.

The preceding could easily be a description of the Sinaloa drug cartel. Successful international criminal enterprises follow the same business plan and often work in parallel with unsuspecting legitimate corporations by using their business practices as a model. They maxi- mize profits and shift strategies as technology evolves, or when detected by law enforcement. The organizations are well resourced; most own and operate a variety of aircraft and boats, with skilled and highly paid operators at the helm. Sophisticated satellite phones and use of Global Positioning System equipment keeps criminals on the run and investiga- tors in the dark. Unfortunately for governments battling this issue, not only are transnational criminal networks harder to detect and infiltrate than ever, but despite their best efforts, business is booming.

TRANSNATIONAL ORGANIZED CRIME ON THE RISE

As opposed to terrorism, which is motivated by ideology, organized crime is motivated by money. Tracking the increased sophistication and scope of organized crime, the FBI’s definition of the activity has morphed and expanded in the last ten years. In 2003, it was defined as “a continuing criminal conspiracy having a firm organizational structure, and a con- spiracy fed by fear and corruption.”5 The 2012 definition is longer and more specific. The FBI now defines organized crime as “any group hav- ing some manner of a formalized structure and whose primary objective is to obtain money through illegal activities. Such groups maintain their position through the use of actual or threatened violence, corrupt pub- lic officials, graft, or extortion, and generally have a significant impact on the people in their locales, region, or the country as a whole.”6 The terms “organized crime” and “continuing criminal enterprise” (CCE) are often used interchangeably, although the laws vary slightly regarding the definition of criminal activity falling within the CCE realm. The FBI defines a criminal enterprise as “a group of individuals with an identi- fied hierarchy, or comparable structure, engaged in significant criminal

10 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

activity. These organizations often engage in multiple criminal activities and have extensive supporting networks.”7 Although organized crime is typically associated with the Mafia or drug trafficking, it extends to any CCE such as money laundering, human trafficking, or white-collar crimes like insurance, mortgage, and prescription fraud.

There are other categories of crime. For instance, reactive crimes are violent or nonviolent crimes perpetrated by an individual or a small group, such as hate crimes or protests that turn violent. There are also crimes of opportunity, such as pickpocketing or a lone carjacking, in which the criminal targets the easiest mark or acts because of the target’s carelessness. Although any of the aforementioned methods could gener- ate resources, transnational criminal and global terrorist organizations are more likely to affiliate with a CCE with a proven track record of success, established and protected logistics lines, and the help of govern- ment officials who have been bribed, threatened, or corrupted.

Several factors contribute to the existence and proliferation of TOC originating, traversing, or committed in a country. One major consider- ation is available resources, including a desperate populace upon which to prey and a weak economy that will welcome profit from illegal activ- ity. Geographical and geological features often play a significant role, for instance the availability of fresh water and crops, or the presence of precious minerals. Border security and strength of the rule of law are critical, and will either repel or attract transnational criminal activity. A weak government invites penetration by organized crime, and the result- ing corruption further delegitimizes the country’s government. The pres- ence of terrorist groups in the region exacerbates crime problems across the spectrum, adding to existing instability.

The extent and global impact of transnational crime problem fully emerged in 2003 when State Department and FBI officials were called by Congress to testify regarding its alarming increase and mitigation efforts. Their prescient testimony, along with statements of other experts in the past ten years, provides unique insight into hotbeds of existing and emerging transnational crime.

SCOPING THE TOC CHALLENGE

When I began studying transnational crime ten years ago, the evolution from regionally contained networks to those with global reach was only beginning. Leaps in information, communication, and logistics technol- ogy contributed to the rise of syndicates with global reach, sophisticated operating methods, and fluid structures. TOCs can now “surveil the sur- veillers,” quickly closing business and moving elsewhere when detected by law enforcement. Remaining anonymous is now possible through the

11Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

use of virtual offshores, legitimate business fronts, and other e-com- merce technology discussed in Chapter 7. Every nation’s culture and citi- zenry is now affected by this new brand of organized crime and must increasingly devote precious resources to combat its spread.

Eurasian Transnational Crime: Size, Wealth, Reach

According to the FBI, Eurasian organized crime (EOC) poses some of the greatest threats because of its size, wealth, and global reach.8 EOC is associated with Russia, Eastern and Central European countries, and the independent states formed after the fall of the Soviet Union. Although a victory for democracy, the demise of communism and the resulting leadership void caused great economic and social chaos allowing for the rise of many organized crime groups. Civil wars are still unresolved, and corruption is widespread. Massive criminal activity is destabilizing an area where nuclear weapons remain deployed, with rumors of “loose nukes” and a viable black market for nuclear material emerging from political upheaval in the region. Understandably, the national security implications of destabilization in this region are worrisome.

The U.S. government is concerned about the unique blend of circum- stances in Eurasia. Terrorism, international organized crime, trafficking in persons and drugs, ethnic separatism, religious extremism, and cor- ruption are present and thriving. Corruption of government officials in Eurasian countries is a main concern and contributes to the proliferation of transnational crime in this region. Steven Pifer, former deputy assis- tant secretary of state in the Bureau of European and Eurasian Affairs, is an expert on how a vacuum in institutions and privatization led to corruption in the region. According to his assessment, after the fall of the Soviet Union, absent state resources or statutory structure, valuable state assets were privatized in “insider transactions.” Since property rights were uncertain and no court of law was available to settle dis- putes, savvy insiders and organized crime took advantage of the chaos to seize major companies, paying far less than their actual value. As small businesses began to form under Perestroika, criminals also took advan- tage of the lawless environment and moved in. Small-businesses owners often turned to gangsters to provide a krysha (roof) of protection, even- tually compelled to turn over control and capital to their benefactors. Accumulated capital was then used by criminal elements to take over large companies in the privatization process, giving them public status and ascension to political office.9 Within just a few years, the corruption problem was rampant in the region, with 4,000 organized crime groups in Russia alone. In February 1993, Boris Yeltsin, the first elected presi- dent of the Federation of Russian States, said: “Organized crime has

12 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

become the No. 1 threat to Russia’s strategic interests and to national security. Corrupted structures on the highest level have no interest in reform.”10

According to the FBI, the Russian interior ministry estimates that more than one-half of the Russian economy, including significant por- tions of its vast energy and metallurgical sectors, is now controlled by organized crime. Experts believe that the wide range of criminal activ- ity engaged in by Russian organized crime groups exceeds in scale and economic impact the Cali Cartel at the height of its power.11 Powerful groups such as the Russian Mafia have defrauded newly formed govern- ments of billions of dollars and take large profits through tax-evasion schemes and using corrupt officials to embezzle government funds. Well connected and embedded in society, criminal groups in Russia effort- lessly use the country’s banks to illegally transfer billions out of the country annually. Finally, the proximity of one of the two major nar- cotics-trafficking routes, the golden crescent of Pakistan, Afghanistan, and Iran, puts Tajikistan, Uzbekistan, Kazakhstan, Turkmenistan, and Kyrgyzstan at the crossroads of the opiate trade to Europe and Russia.

In addition to a thriving drug trade, Eurasian countries are rife with human-trafficking violations. Men, women, and children are pro- cured from the region, transported, and sold for forced labor and sexual exploitation. Populations vulnerable to human trafficking are the poor and uneducated, and for criminals in the region, it is not only a high- profit venture but very low risk. Many Eurasian countries are lagging in instituting and enforcing laws to punish perpetrators of trafficking. In fact, of the Tier 2 watch list and Tier 3 noncompliant/no effort nations indicated in the 2011 report and covered later in this chapter, Eurasian countries are the leading offenders.12

Eurasian organized crime spread to the United States in the 1970s and 1980s with the arrival of more than 100,000 Soviet émigrés, known as “Refuseniks.” Mixed in with law-abiding people was a very small group of criminals known as Vory V Zakone or “thieves-in-law,” career criminals becoming the base of U.S. domestic Eurasian organized crime.13 The dissolution of the Soviet Union in 1991 brought thousands more émigrés fleeing social strife and dismal economic conditions. The exodus added to the existing Eurasian criminal enterprise in the United States.

Fraud is prevalent with these groups, which will latch on to any cri- sis and turn it into profit. Recent activities in the United States include mortgage fraud, money laundering, extortion, drug trafficking, auto theft, hostage taking, extortion of celebrities and sport figures, insurance (staged auto accidents), medical fraud, counterfeiting, credit card forg- ery, and murder. Eurasian crime in the United States is big business; in October, 2011, law enforcement officials arrested fifty-two individuals

13Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

from an Armenian-American syndicate for health care fraud defrauding companies and their customers of more than 163 million U.S. dollars. For the first time in fifteen years, a “thief-in-law” was arrested on a fed- eral charge. However, Ukrainian Semion Mogilevich, one of the top ten fugitives wanted by the FBI, remains at large. Mogilevich’s organization, using a front operation outside of Philadelphia, bilked investors of nearly 150 million U.S. dollars. Mogilevich is also wanted on arms trafficking, prostitution, extortion, and murder-for-hire charges. Although once in custody in Russia, he was released by government officials, and he and members of his group have simply disappeared.

As illustrated, no crime is off limits to EOC groups, and the breadth and depth of their criminal activity is astounding. Understanding the roots and rise of Eurasian crime is important for international and national security purposes, and this historical example should be incor- porated in postconflict reconstruction and democratization planning. Rapidly establishing and enforcing the rule of law following governmen- tal upheaval is essential to prevent a void that soon becomes a haven for criminals and terrorists. Unfortunately, this scenario is now playing out in other countries and regions where ruling governments have been overthrown or challenged by the Arab Spring movement.

Italian Transnational Crime: Not Your Grandfather’s Mafia

The Italian criminal societies known collectively as the Mafia have existed since the 1800s and are now firmly entrenched in the political, social, and economic realms in Italy and around the world. Historically, the Mafia arose from four centuries of invasions in Italy and the people’s response was to become clans, relying on family ties instead of the ruling government for protection and justice. The clans morphed into a secret society of resistance, meant to protect allied families from invaders. The protectors, known as “men of honor,” were highly respected and revered in the community. Soon the clans fought each other for control and sought to expand their influence and power, becoming Mafias, or bodies of criminals. During the late 1800s and early 1900s, thousands of Sicilian Mafiosi entered the United States illegally, establishing the domestic Mafias persisting today. Surprisingly, New Orleans was the site of the first major Mafia incident in this country on October 15, 1890, when Police Superintendent David Hennessey was murdered execution- style. Law enforcement detained hundreds of Sicilians, and nineteen were indicted for the murder. However, a jury later acquitted the group, causing an outrage among the citizens of New Orleans; an organized lynch mob found and killed eleven of the nineteen defendants. Two were hanged, nine were shot, and the remaining eight escaped.14

14 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

Through the years, various gang factions of the Mafia have ascended and attempted to take control, such as Al Capone’s syndicate in Chicago in the 1920s. Italian organized crime (IOC) groups currently active in the United States include La Cosa Nostra (LCN); the Camorra or Neapolitan Mafia; the ‘Ndrangheta or Calabrian Mafia; and the Sacra Corona Unita or United Sacred Crown. The FBI estimates that the four groups have approximately 25,000 core members and 250,000 affiliates worldwide, and experts estimate the Mafia’s worldwide criminal activity at more than $100 billion annually.15

In the United States, there are more than three thousand Mafia members and affiliates, with the largest presence centered in New York, southern New Jersey, and Philadelphia. Criminal activities are interna- tional, including collaboration with other international organized crime groups from all over the world, especially those involved in drug traf- ficking. The Mafia in Italy is extremely violent and has assassinated public officials and targeted law enforcement with car bombs and other incendiary devices. The Mafia in the United States is not as brazen, yet has plenty of blood on its hands and continues to wield influence with political figures and corporate leaders.

La Cosa Nostra (translated to “this thing of ours”) is the most persistent Mafia threat in our country. In 1946, LCN leader “Lucky” Luciano was convicted for running a prostitution ring in the United States and was deported. However, his return to Italy delivered a trans- national capability to the LCN, as he became the liaison between the two countries. LCN grew in power through the years; major threats now posed are drug trafficking and money laundering, but naturally the group is engaged in a broad spectrum of illegal activities including mur- der, extortion, corruption, gambling, labor racketeering, prostitution, and financial fraud. In January 2011, the largest coordinated arrest in FBI history netted 127 members of La Cosa Nostra in New York, New Jersey, and New England. More than thirty were “made” members of LCN, serving as underbosses, street bosses, and consiglieres, or close family advisors.16 Although a major blow to the U.S. arm of the orga- nization, the LCN operates with multinational corporate sophistication and will persist.

The Camorra or Neapolitan Mafia is based in Naples. The Camorra is the largest of the Italian organized crime groups, emerging from the 1970s “Camorra War,” which resulted in the deaths of 400 members of the Sicilian Mafia. Great opportunists, the Camorra made their primary fortune in reconstruction after an Italian earthquake in the region in 1980. They are also expert cigarette smugglers and participants in the gamut of other illegal activities. There are nearly 200 Camorra affiliates residing in the United States, many of whom arrived during the Camorra Wars.

15Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

The ‘Ndrangheta or Calabrian Mafia is based in Calabria, Italy. The word Ndrangheta comes from the Greek meaning “loyalty.” The ‘Ndrangheta formed in the 1860s when a group of Sicilians was banished from their island by the Italian government and settled in Calabria, Italy, forming small criminal groups. There are currently at least 160 ‘Ndrangheta cells worldwide, with 6,000 members. The group specializes in kidnapping and political corruption, but also engages in drug trafficking, murder, bombings, counterfeiting, gambling, frauds, thefts, labor racketeering, loan-sharking, and alien smuggling. Cells are loosely connected family groups based on blood relationships and mar- riages. In the United States, there are an estimated 100 to 200 members and associates, primarily located in New York and Florida.

The Sacra Corona Unita, or United Sacred Crown, is based in the Puglia region of Italy, after emerging in the late 1980s from its roots as a prison gang. The Sacra Corona Unita consists of fifty clans with approximately 2,000 members worldwide and specializes in smuggling cigarettes, drugs, arms, and people. The organization also collects payoffs from other criminal groups for landing rights on the south- east coast of Italy, a natural gateway for smuggling to and from post- Communist countries like Croatia, Yugoslavia, and Albania. The Mafia group works with Balkan organized criminal groups, which engage in arms and cigarette smuggling and human trafficking.17 Very few Sacra Corona Unita members have been identified in the United States, although some individuals in Illinois, Florida, and New York have links to the organization.

IOC provides a perfect example of shifting ideology. Early Mafia godfathers stated they would never get into the drug-trafficking busi- ness or work with people of color. However, the organizations changed their philosophy in the name of making money and spreading power and influence. By leveraging new “business opportunities” through the years, the Mafia not only persists but remains an extremely powerful force at their base in Italy and many other countries. Similar to their activi- ties to bring alcohol to thirsty patrons during the prohibition, they now supply drugs and sex slaves with no moral restraint. During the global financial crisis, any prior successes with diminishing their strength were lost, as IOC gained stronger footing in their host country. IOC expert Antonio Roccuzzo states, “The mafia has enormous liquidity. It may be the only Italian ‘company’ without any cash problem.” Banks and at least 180,000 business owners in Italy turned to various IOC groups for loans during the financial crisis, with interest rates upwards of 120 percent. The full ramifications of these loans, made in desperation, have not yet been felt.18

16 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

IN FOCUS: THE IMPACT OF LABOR RACKETEERING

Labor racketeering is the domination, manipulation, and control of a labor movement in order to affect related businesses and indus- tries. The resulting denial of workers’ rights is not only illegal but an affront to their constitutional rights. Economic loss due to increased labor costs is vast and undermines the fabric of free enterprise.

Why do criminal elements such as the Mafia target labor unions? The primary reason is their vast pension, welfare, and health funds. Consider that in the United States, there are approximately 75,000 union locals with 14 million members. In the mid-1980s, the Teamsters Union controlled more than 1,000 funds with total assets of more than $9 billion. Racketeers infiltrate unions by offering “sweetheart” contracts, offering to broker peaceful labor relations with management, or worse, by rigging union elections.

Labor racketeering has become one of La Cosa Nostra’s funda- mental sources of profit, national power, and influence. The rise of LCN’s involvement from small factories to our largest unions in our country was swift and stunning.

• In the late 1950s, a major U.S. Senate investigation found systemic racketeering in both the International Brotherhood of Teamsters and the Hotel Employees and Restaurant Employees International Union.

• In the early 1980s, former Gambino Family boss Paul Castellano was overheard saying, “Our job is to run the unions.”

• In 1986, the President’s Council on Organized Crime reported that five major unions, including the Teamsters and the Laborers International Union of North America, were dominated by organized crime.

New York, Buffalo, Chicago, Cleveland, Detroit, and Philadelphia are the primary hubs for unions, attracting racketeers and other criminal elements.

The FBI leverages the Racketeer Influenced and Corrupt Organization (RICO) Statute to infiltrate, gather evidence, and bring racketeers to justice. RICO allows law enforcement to engage the entire operation instead of individuals, who can be easily replaced in a vast organization such as the Mafia. For at least twenty years, the Teamsters union has been substantially controlled by LCN, with four of the last eight presidents indicted on criminal charges.

Source: FBI, http://www.fbi.gov/about-us/investigate/organizedcrime/ italian_ mafia/

17Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

Baltic Transnational Crime: Emergent and Deadly

Balkan organized crime (BOC) describes activity originating from, or operating in, Albania, Bosnia-Herzegovina, Croatia, Kosovo, Macedonia, Serbia, Montenegro, Bulgaria, Greece, and Romania. Similar to Italian organized crime, BOC began as a familial or clan activity as a source of safety and protection during occupation of the Balkans by other countries in the fourteenth century and later. Communist rule led to contained, regional black-market activities in the Balkans; however, the collapse of communism allowed rapid worldwide expansion. Organized crime elements grew in scope, corrupting new rulers and allowing insti- tutions to expand power and profit. Leadership of BOC groups is decen- tralized and, similar to the Mafia, along family lines. European nations now recognize BOC as one of the greatest criminal threats they face; the enterprise controls upwards of 70 percent of the heroin market in some of the larger European nations, and they are rapidly taking over human smuggling, prostitution, and car-theft rings.

According to the State Department, terrorists and Islamic extremist groups have already exploited inadequate border security and institu- tional weaknesses in the Balkans. Middle Eastern charities identified as supporting terrorist activities are currently providing assistance to Islamic extremist groups in the region. Terrorists also exploit the region’s liberal asylum laws, open land borders, and weaknesses in their investi- gative, prosecutorial, and procedural processes while using these coun- tries as operational staging areas for international terrorist attacks.19 Albania and Kosovo lie at the heart of the Balkan route traversing the narcotics golden crescent. The Balkan route starts with the shipment of Afghan opiates through Pakistan and Iran, and into Turkey. The drugs are then shipped onward through the Balkans and into Western Europe, where they are distributed and consumed. This route is worth an esti- mated $400 billion a year and handles 80 percent of heroin destined for Europe. In 2010, an estimated seventy-five to eighty metric tons of heroin were trafficked to Western and Central Europe. The bulk of this drug, some sixty metric tons, was trafficked via the Balkan route.20

BOC activity has been detected in the United States since the mid- 1980s, at first in petty crimes like theft and burglary. Then, ethnic Albanians began partnering with LCN families in New York; however, as their communities and presence became more established, the groups expanded to lead and control their own organizations. At one point, after establishing presence and growing in power, the FBI believes that the Albanians challenged the LCN for control of some traditional crimi- nal activities in New York City. Balkan organized crime is an emerging threat in the United States, and although they don’t share the criminal sophistication of Eurasian or LCN groups, they have proven themselves

18 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

capable of adapting to expanding and becoming involved in new activi- ties, such as mortgage fraud.21 Albanian organized crime groups in the United States have been involved in murders, bank and automated teller machine burglaries, passport and visa fraud, illegal gambling, weapons and narcotics trafficking, extortion, and mortgage fraud. Hallmarks of BOC activity are acts of extreme violence.22

Asian Transnational Crime: Sophisticated and Multicultural

In the early 1900s, signs of Asian criminal enterprises emerged in the United States with the onset of criminally influenced Chinese groups, which thrived and expanded. Asian criminal enterprises have now been identified in more than fifty metropolitan areas and many other smaller communities. Groups are predominantly from East and Southeast Asia, including members of Chinese, Korean, Japanese, Thai, Filipino, and Cambodian, Laotian, and Vietnamese descent. However, other Asian criminal enterprises are now emerging as domestic and international threats, including groups from the South Pacific Island nations as well as organizations from Southwest Asia such as Pakistan, India, Afghanistan, Nepal, and Iran. These groups are described as very fluid and extremely mobile, easily adapting to changes and thus able to evade law enforce- ment. They are multilingual, can be highly sophisticated in their crimi- nal operations, and are well financed. Some groups have commercialized and commingled their criminal activities into business firms of various sizes, from small family-run operations to large corporations. The FBI also believes that the criminal conduct engaged in by Asian criminal enterprises includes not only traditional organized crime activities but human smuggling, technology theft, and intellectual property crime as well. A unique characteristic of Asian organized crime groups is their ability to elicit cooperation of other groups that cross ethnic and racial heritage lines. Maturing groups are now structuring their groups hierar- chically like corporations to be more competitive.23

An emergent area of concern in the region is the Malaysian straits, an area of considerable established and uncontrolled organized crime. The Indonesian archipelago is a series of 17,000 islands, a vast amount of territory to govern, to patrol, and in which to enforce the rule of law. Human trafficking is rampant in Indonesia, largely because of the tens of millions of people mired in poverty, corrupt governments, and little to no law enforcement capability. The region is subjected to sporadic vio- lence created by a handful of separatists grouping with gangsters engaged in weapons smuggling, money laundering, and drug trafficking. These criminal activities are fueling international terrorist activity. Previously, most terrorist activity in East Asia was related to domestic political

19Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

disputes, but now the area is home to several lethal international terror- ist groups. Organizations with direct links to al Qaeda were discovered in 2001 in Malaysia and Singapore, and their activities, movements, and connections now traverse the entire region. The al Qaeda offshoot Jemaah Islamiyah (JI) is responsible for many large hotel and embassy bombings in the last decade, impacting the tourist market and affect- ing the region’s economy. The Abu Sayyaf Group (ASG) is an Islamic extremist organization in the Philippines allied with al Qaeda through Ramzi Yousef, the mastermind of the first World Trade Center bombing in 1993. Yousef is the nephew of Khalid Sheikh Mohammed, who was one of the principal architects of the 9/11 attacks. An ASG subsidiary, the Abu Haf al-Masri Brigades, emerged as a lethal new group, initiating hotel bombings in Malaysia and possibly executing the train bombings in Madrid. Although many of JI’s and ASG’s leaders have been arrested,

IN FOCUS: MACAU

The former Portuguese colony of Macau is worthy of close scru- tiny. Macau, consisting of two islands and a peninsula connected to mainland China, is one of two “special administrative regions” governed by the Chinese, the other being Hong Kong. The area is an offshore financial hub, with a free port, tax protection, and no foreign control of their financial schemes. Throw in a booming gambling market, with thirty-three casinos with annual profits of 52 billion U.S. dollars (as opposed to 1 to 2 billion U.S. dollars in Las Vegas), and Macau is a haven for shadowy groups seeking to make, store, and launder money. Gambling and gaming for profit is illegal in China; therefore, the Chinese people turn to one of two hundred “junket” companies to arrange their transportation to Macau and handle their gambling outlay and debt. These com- panies are heavily infiltrated by Chinese organized crime syndi- cates, who use kidnapping, extortion, and heavier-handed tactics on tourists to recover their money, often with a large commission attached. The Las Vegas Sands and Wynn Resort are heavily vested in Macau, with casinos earning far more than their austere counter- parts in Las Vegas. The website at http://www.casinoleaks-macau. com/ is hosted by the International Union of Operating Engineers (IUOE,) consisting of thousands of casino workers in Las Vegas who are concerned about what is happening in Macau and how the nefarious activity could undermine the credibility and stability of the U.S. gaming system. A repository of court documents and other material on the site provides a unique look into the criminal elements penetrating the Macau market.

20 The Terrorist-Criminal Nexus

© 2010 Taylor & Francis Group, LLC

the groups remain on the Foreign Terrorist Organization designation list as worthy of watching. A final concern in the region is Islamic extrem- ists operating in and around western China, the Uighur Muslims. ETIM is a militant Uighur organization advocating creation of the indepen- dent Islamic state of East Turkestan in the Xinjiang region. The group has received training, equipment, and inspiration from al Qaeda, the Taliban, and others in Afghanistan. ETIM threatened the 2008 Summer Olympics in Beijing, yet there were no incidents.24

African Criminal Enterprises: Internet Savvy and Vast

African organized crime has been on the rise exponentially in the last ten years, fed by globalization and political and social unrest in the region. Economic conditions with failing or failed states have opened the door to corruption, and the leveraging of stable African countries has led to global expansion of formerly contained, regional crime.

The FBI reports that Nigerian criminal enterprises are the most con- siderable transnational threat, operating in more than eighty other coun- tries. Drug trafficking provides the most profit, as the country is a transit point for heroin between Southeast and Southwest Asia into Europe and the United States and cocaine from South America into Europe and South Africa. Ethnic Nigerians in India, Pakistan, and Thailand have access to 90 percent of the world’s heroin production and serve as operational con- duits, and money laundering from these activities is accomplished world- wide. Nigerian groups are skilled at financial frauds and schemes, which costs the United States alone an estimated 1 to 2 billion U.S. dollars each year. Leveraging the Internet, they are the masters of “419” schemes, e-mail correspondence indicating winning from lottery winnings or estates. A new sector of 419 activities includes virtual kidnapping fraud, where the recipient is notified of the abduction of a family member and asked to send their bank wire information to help secure their release. African criminal enterprises in the United States are also heavily engaged in identity theft and are most prevalent in Atlanta, Baltimore, Chicago, Dallas, Houston, Milwaukee, Newark, New York, and Washington, DC.25

A new concern in Africa concerns the mass killing of elephants to harvest ivory. In 2011, at least 25,000 elephants were slaughtered in Central Africa, with violence escalating between poachers and anti- poachers resulting in the death of hundreds. China, Thailand, and the Philippines are the countries with the greatest demand for ivory based on religious beliefs, among them many Catholics and Buddhists, that ivory honors God.26 The countries are paying exorbitant rates for the tusks, causing an elephant-killing frenzy on the continent. Ivory is moved

21Transnational Organized Crime

© 2010 Taylor & Francis Group, LLC

IN FOCUS: THE LATIN AMERICA DRUG WAR EXPANDS TO WESTERN AFRICA

In 2009, the Department of Defense (DOD) took on a new role: countering the expanding drug trade in Western Africa. The FY 2009 defense authorization bill, House Resolution (H.R.) 5658, Section 1024, provided funding for counterdrug equipment in the republics of Ghana, Guinea-Bissau, and Senegal. The Senate Armed Services Committee voiced concern about the rapid growth of ille- gal drug trade in the region and directed the State Department and DOD to jointly prepare a region-wide, counterdrug plan for Africa, with a special emphasis on West Africa and the Maghreb.

Since 2003, 99 percent of all drugs seized in Africa have been found in the west. The volume seized has increased fivefold in the last few years. Agencies involved in counterdrug operations acknowledge that the situation in several West African countries is rapidly deteriorating. For instance, Ghana has become a significant transshipment point for illegal drugs, particularly cocaine from South America, and DOD has identified it as the “anchor coun- try” for emerging counternarcotics efforts through AFRICOM. Perhaps the greatest threat lies in Guinea-Bissau, which the UN has dubbed Africa’s first “narco-state.” With a landmass equal to the state of Maryland, Guinea-Bissau is one of the poorest coun- tries in the world, with two-thirds of its 1.5 million population liv- ing below the poverty line. The country is attractive to traffickers due to its unpatrolled coastline, numerous hidden bays, and close proximity to several other declining countries and their weak rule of law. In a country lacking a main source of electricity, the police force has no cars, no radios, and few weapons. The military is thought to be complicit in the drug trade; in 2008, two military personnel were detained along with a civilian in a vehicle carrying 635 kilos of cocaine. The army secured the soldiers’ release from prison and they were not charged.

Trafficking and unrest is not new to Guinea-Bissau; it was first known as the “Slave Coast” when African rulers prospered from the slave trade. After centuries of Portuguese rule, a paramilitary group emerged and, aided by arms and supplies from Cuba, Russia, and China, fought a protracted war to eventually win the coun- try’s independence in 1974. Years of unrest ensued; thousands of citizens who had fought alongside the Portuguese against the rebels were slaughtered and buried in unmarked graves. The country has subsequently faced bloody uprisings, conflicts, and even a complete

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Academic Tutor
Engineering Guru
Unique Academic Solutions
Essay & Assignment Help
Instant Homework Helper
Coursework Help Online
Writer Writer Name Offer Chat
Top Academic Tutor

ONLINE

Top Academic Tutor

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$34 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$37 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$48 Chat With Writer
Essay & Assignment Help

ONLINE

Essay & Assignment Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$42 Chat With Writer
Instant Homework Helper

ONLINE

Instant Homework Helper

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$47 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$36 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

General certificate in brewing questions - Oberon american repertory theater events - Offer and acceptance form - Android hacking and penetration testing - Small Business Mgmt Assignment 4 Essay help - Essay - California poppy hair oil - Did the aztecs invent soccer - Diagnoses documented as probable suspected or questionable are - GHF A.6 - Harley engine vin decoder - Dumping data for table orders - Uipath certification questions and answers pdf - What is a post and lintel system of construction - Logical fallacies in 12 angry men - UFO Sightings- building website - Disney public relations examples - Nike bond rating - 360g2 cassette 12 lc sm bl pigtails - Post-Rufina - Windshield survey nursing examples - An inconvenient truth study guide - Similar polygons assignment answers - Addition reactions with benzenes lead to the loss of aromaticity - Helicity operator commutes with hamiltonian - Myocardium receives its blood supply from - A best cost provider strategy - All or none law muscle - Functional areas of strategic management - The heart of the samurai - 3 letter greek words - Computer analysis and response team - Capital project fund journal entries examples - Paige pennington walter ray williams - Making content comprehensible for english learners 4th edition pdf - They say i say moves academic writing edition 3rd - BUSINESS STATISTIC - Homework and design inc gardena ca - How profitable is cereals business - How can emirates airlines improve - Kirra sands pty ltd - Milke bhi kyun sanam milne ki pyas hai - Te106 timer instructions manual - Buff and tuff gym excel - Abc the song by jackson 5 - Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization to: - Roberts v. lanigan auto sales - Samsung nand flash part number decoder - Cisco packet tracer add simple pdu - Discussion Question - Cause/effect essay - How do unstable atoms gain stability - Is social media sabotaging real communication - Rio salado chm 130 midterm answers - What i am grateful for - Thumbs up elbows back feet apart - Breaching experiment essay - Case study on performance appraisal with questions and answers - Blaine kitchenware case solution excel - Manrose 1350 fan speed controller - Strangle her in bed even the bed she hath contaminated - Why does the klan burn crosses - DQ4 - Anthropology of religion research paper topics - What language(s) must be used to display a bare-minimum web page - Web analytics at quality alloys inc case summary - Combining like terms and distributive property worksheet - Read two articles and complete an annotated bibliography for each article (scholarly/peer-reviewed journal articles). - Aspyre project management software - Example of thesis statement about technology - Write response - Gear drawing with dimensions pdf - Discussion - Effective Facilitators Paper or Presentation - Joy luck club characters - 1. what did fred t. korematsu do that resulted in his arrest and conviction? - El al flight 426 hijacking - Cast of the curious creations of christine mcdonald - Ipr curve excel - Essentials of economics 3rd edition krugman - 520 dis - Guidedogs org uk raffle - If a firm raises capital by selling - Serial problem business solutions lo p1 p2 p3 p4 p5 - Volts x amps x 1.73 - Technology and the good life - Don sabo pigskin patriarchy and pain - Axioms of real numbers - How have humans impacted the everglades - What is the indifference point - Milgram customs broker pars tracker - Firework song by katy perry lyrics - Explain how the spectroscope will be calibrated - Great western hospital departments - The drawing shows three point charges fixed in place - +91-8306951337 get your love back by vashikaran IN Gaya - Principle beliefs of islam - Week 2 discussion - D2 market - Greek mythology activities scholastic teaching resources