December 2007 Volume 76 Number 12

United States Department of Justice Federal Bureau of Investigation Washington, DC 20535-0001 Robert S. Mueller III Director Features Contributors’ opinions and statements should not be considered an endorsement by the FBI for any policy, program, or service. Countering Violent Working with communities and Islamic Extremism identifying patterns and trends of The attorney general has determined 3 extremist behavior in its early stages that the publication of this periodical By Carol Dyer, Ryan E. McCoy, is necessary in the transaction of the can help counter the spread of public business required by law. Use Joel Rodriguez, and extremist ideology. of funds for printing this periodical has Donald N. Van Duyn been approved by the director of the Office of Management and Budget. The FBI Law Enforcement Bulletin Words Make Worlds To effectively penetrate the extremist (ISSN-0014-5688) is published By Angus Smith world, the law enforcement and monthly by the Federal Bureau of 12 intelligence communities must Investigation, 935 Avenue, N.W., Washington, D.C. understand extremist discourse. 20535-0001. Periodicals postage paid at Washington, D.C., and additional Operation Smokescreen SmallerThis case law illustrates enforcement that terroristsagencies can mailing offices. Postmaster: Send do not operate only in major cities address changes to Editor, FBI Law By Robert Fromme and 20 reap benefi ts from crime analysis reports Enforcement Bulletin, FBI Academy, Rick Schwein andbut alsomaps in similarsmall towns. to those derived by Madison Building, Room 201, larger ones. Quantico, VA 22135. Establishing state fusion centers Editor A Look at Fusion Centers John E. Ott By Bart R. Johnson has been a vital step toward sharing 28 information. Associate Editors Cynthia L. Lewis David W. MacWha Bunny S. Morris Departments Art Director Denise Bennett Smith Assistant Art Director 10 Book Review 26 Bulletin Reports Stephanie L. Lowe Bomb and Bombings Computer-Based Training Staff Assistants Crime Victims Cynthia H. McWhirt 18 Unusual Weapon Gabriel E. Ryan Juvenile Justice Plastic Spike Arlene F. Smith Education This publication is produced by 19 Leadership Spotlight members of the Law Enforcement Fellowship Communication Unit, Training Division. Issues are available online at http://www.fbi.gov. E-mail Address Editor’s Note: [email protected] Due to the special contents of this issue, the 2007 subject and author Cover Photo indexes, which usually would appear in the December issue, will be in our © Digital Stock January 2008 issue. Also, the second part of the article, “Program Evaluations: Send article submissions to Editor, Improving Operational Effectiveness and Organizational Effi ciency,” will be FBI Law Enforcement Bulletin, moved to our January issue. FBI Academy, Madison Building, Room 201, Quantico, VA 22135. This issue includes our last book review. As of our January 2008 issue, we no longer will publish book reviews.

ISSN 0014-5688 USPS 383-310 © Photos.com

Focus on Terrorism

or the past decade, al Qaeda has been the driving force of terrorism—moving thousands of people through training camps in Afghanistan and providing the F motivation, the money, and the management of worldwide attacks. Since the terrorist attacks on September 11, 2001, U.S. and foreign services have made tremen- dous progress in weakening al Qaeda. Yet, the group has been resilient at rebuilding its leadership and creating new safe havens, and, just as dangerous, its message of violence also has inspired followers with no formal links to the group. We have in- creasingly seen the emergence of individuals and groups inspired by al Qaeda that will carry out attacks on their own soil. Homegrown terrorists or extremists, acting in concert with other like-minded in- dividuals or as lone wolves, have become one of the gravest domestic threats we face. Largely self-recruited and self-trained, these terrorists may have no direct connection to al Qaeda or other terrorist groups. Identifying these individuals and groups is a tremendous challenge, and the role of our partners in state and local law enforcement is critical in these efforts. Local police offi cers, who are out on the streets, are on the frontline of the war on terrorism. They often may be the fi rst to detect potential terrorists. The vast jurisdiction of state, local, and tribal offi cers brings invaluable access to millions of people and resources, which can help protect the nation and its citizens. The information gathered on the street and in our communities is one of the most powerful tools we have. Understanding the radicalization process also proves vital to our efforts of iden- tifying terrorists. What are the early indicators of those who demonstrate a potential for violence? How does an individual become a radical extremist, and how does an extremist then become a terrorist? To help answer these questions, the International Association of Chiefs of Police (IACP) Committee on Terrorism requested that this issue of the FBI Law Enforce- ment Bulletin be devoted to terrorism. With the foresight to focus on terrorism before it came to the forefront of American concerns, the committee fi rst undertook this ef- fort in the March 1999 issue of the magazine. Because the terrorist threat has evolved dramatically during the past 8 years—especially in the wake of September 11—the committee determined that it was time to publish another focus issue and enhance our understanding of emerging terrorist threats by focusing on homegrown terrorism and radicalization. We hope that these four articles, contributed by IACP Committee on Terrorism members, will give readers a clear understanding of the challenges posed by homegrown terrorism and the importance of a coordinated response to the terrorist threats we face.

December 2007 / 1 “Countering Violent Islamic Extremism” provides law enforcement with a potential approach to identify indicators for extremists who pose the greatest danger to society. The article urges law enforcement to engage Muslim com- munities and dispel misconceptions that may foster extremism. Complementing this article, “Words Make Worlds: Terrorism and Language” offers insights to understand and accurately describe extremist rhetoric. The article asserts that such terms as jihadism and Islamic terrorism confl ate terrorism with mainstream Islam and erroneously cast all Muslims as terrorists or potential terrorists. Instead, the intelligence and law enforcement communities must understand extremist discourse and use this understanding to counteract extremist rhetoric. Two additional articles highlight the importance that collaborative efforts play in the war on terrorism. “Operation Smokescreen” details the multiagency investigation of a terrorist cell operating in and raising money for Hizballah by smuggling cigarettes. This case not only illustrates how interagency partnerships can address terrorist threats but also shows the critical role local law enforcement plays in detecting criminal activity that may form part of a larger terrorist plot. Further emphasizing the importance of a multiagency approach to countering terrorism, “A Look at Fusion Centers” describes the integral role state fusion centers play in assisting intelligence and law enforcement agencies in sharing information and combining their resources to understand the threat environment and address terrorism. One consistent message resonates through each of the articles: our greatest weapon against terrorism is unity. That unity is built on information sharing and coordination among our partners in the law enforcement and intelligence com- munities. It is built on partnerships with the private sector and effective outreach to the public as our eyes and ears. It is built on the idea that, together, we are smarter and stronger than we are standing alone. In the past 6 years, the coopera- tive efforts of intelligence and law enforcement agencies have made substantial progress in detecting U.S. terrorist cells. Some notable successes this year alone include identifying and disrupting the plan to attack our military forces at Fort Dix and the plot against JFK Airport. These successes show that no one person, no one agency, no one police de- partment, and no one country has all of the answers. We may not always know where and when terrorists will attempt to strike. But, we do know they will try again, and we must combine our intelligence, our technology, and our resources to stop them.

Willie T. Hulon Executive Assistant Director National Security Branch Federal Bureau of Investigation

2 / FBI Law Enforcement Bulletin Countering Violent Islamic Extremism A Community Responsibility By CAROL DYER, RYAN E. MCCOY, JOEL RODRIGUEZ, and DONALD N. VAN DUYN

Russell Square, London, 2005

he disruption of ter- fi rst must understand and defi ne leadership as the primary terror- rorist plots in 2006 in it.1 What is Islamic extremism? ist threat to the . Al T the United Kingdom, Do radical beliefs always lead Qaeda’s infl uence has prolifer- Canada, and the United States, to terrorist activity? The ex- ated; its ideology and infl uence as well as the July 2005 attacks ploitation of religion by Islamic has spread beyond the Middle in London, generated signifi cant extremists to use violence both East and South Asia. It now attention to the concept of overseas and at home is one of has subsidiaries in Iraq, North homegrown radicalization. But, the gravest dangers facing the Africa, and Greater .2 this term does not defi ne the United States. Al Qaeda repre- However, as the March 11, real focus of concernviolent sents the most pressing mani- 2004, attacks in Madrid demon- Islamic extremism. Before festation of this problem, and strated, direct al Qaeda con- fi nding an effective solution to the FBI still assesses attacks nections are not a precondition this problem, law enforcement directed by core al Qaeda for successful Islamic terrorist

December 2007 / 3 operations. The fact that every been interested in religion but even without First Amendment terrorist attack, even when al changed and became willing to concerns about using these be- Qaeda does not claim credit, carry out terrorist operations haviors as indicators. But, law creates a debate as to whether al within a year. In the summer of enforcement agencies and in- Qaeda in some way directed the 2006, the “Toronto 18” plot, a telligence services around the operation signifi es that al Qaeda terrorist operation that sought to world wrestle with the problem has become a “brand” as much bomb several prominent build- of predicting people’s behavior. as an organization. ings in the Canadian cities of To address the threat that vio- Public opinion surveys of Toronto and Ottawa, included lent extremists pose, the FBI de- Muslims in the and fi ve participants younger than veloped a 2-pronged approach: the West suggest the diffi culty 18. The timeframe needed to 1) identify early indicators of of countering the message of develop a plot can be disturb- those who demonstrate the po- violent extremists to those in- ingly short, and the tendency tential for violence and 2) en- clined to hate the United States to dismiss youthful enthusiasm gage in extensive outreach to and the West for perceived as empty bravado may prove Muslim communities to dispel oppression against Muslims.3 A extremely dangerous. misconceptions that may foster survey conducted in the United extremism. Kingdom in the spring of 2006 indicated that a small but IDENTIFYING signifi cant minority supported EARLY INDICATORS the July 2005 attacks there.4 Acceptance Conversion to Islam is It also revealed that a major- “seeking, a form of not radicalization. The FBI ity of Muslims in the Middle extrinsic conversion, defi nes violent extremists as East still believe that the 9/11 is a fundamental persons who engage in, encour- attacks were a Mossad plot,5 human motivation. age, endorse, condone, justify, even after Usama Bin Ladin or support in any way the publicly claimed credit. More commission of a violent act recent fi ndings have suggested against either the U.S. govern- that negative and suspicious at- ment, its citizens, or its allies titudes toward the United States Law enforcement leaders to achieve political, social, or persist.6 Because of this en- must be able to identify individ-” economic changes or against trenched mind-set, support for uals with the most potential to others who may possess opin- violent Islamic extremism will effect immediate harm, thereby ions contrary to their own remain a continuous problem. controlling the operating envi- radicalized ideology. The speed with which ronment and designating time to The FBI assesses the radicalization to violence can address the larger issues under- radicalization process as four occur and the increasing youth lying violent Islamic extremism. stages: preradicalization, iden- of those drawn to the cause pose Expressing dislike for the Unit- tifi cation, indoctrination, and additional challenges. Both ed States or lauding Usama Bin action. Each one is distinct, British and Canadian authorities Ladin does not make an individ- and a radicalized individual reported that people involved in ual a terrorist. Such an approach may never reach the fi nal stage. the plotting in those countries would create a scenario simply The chart (page 6) identifi es apparently had not previously too large to address effectively different aspects of the stages

4 / FBI Law Enforcement Bulletin and provides indicators to help reinterpretation is another form at least a minimum quantity determine when an individual of an intrinsically driven con- of lasting and signifi cant in- likely is in a certain one. version where individuals alter terpersonal relationships.10 their religious tradition through However, the product of these Preradicalization introspection and evaluation. relationships can have positive Conversion may be to a This motivation refers specifi - or negative consequences for religion or a commitment to cally to those born into Muslim the people involved. Those with another form of the religion. families but choose to follow a weak social ties may benefi t An individual’s motivation is more extremist form of Islam, from the solidarity that extrem- critical to the process and not including such individuals as ist groups provide. always static. For example, Faysal Galab, Tasein Taher, and people who initially convert to Stimulus and Opportunity gain acceptance may reinterpret Converts who proceed their faith if the group they through the radicalization join is composed of Muslim process often are driven by a extremists. respected, frequently older, extremist with whom they Motivation have come into contact. Kamal In a jilted-believer conver- Derwish played a key role in sion, internal frustration and the radicalization of the Lacka- dissatisfaction with the current wanna Six. In the case of the religious faith leads the indi- Jihad Network, spiri- vidual to change belief systems. tual leader Ali Al-Timimi con- The new system can be initially vinced a group of individuals, religious in tone or secular. including a technology expert Conversion attempts to resolve © Ronald Jeffers from Pakistan, a decorated Gulf inconsistencies between what Shafal Mosed of the Lacka- War veteran and member of the the person has come to believe wanna Six. Galab, Taher, and National Rifl e Association, a and was taught to believe. For Mosed drank alcohol, used Korean immigrant, a son of a example, Adam Gadahn (aka drugs, and had relationships Yemeni diplomat, and a Muslim Azzam the American), a Cali- with non-Muslim women—all who had converted from Ca- fornia native who converted to forbidden by the Koran—before tholicism, to engage in violent Islam and supports al Qaeda converting. After this transition, jihad against U.S. troops. Inter- and Islamic extremism, wrote in it was easier for Kamal Der- actions between converts and his conversion story that Jesus wish, who primarily infl uenced Islamic extremists can occur in was, at best, the Son of God and their newfound Islamic path, to a variety of venues. For exam- not someone who individuals convince them to participate in ple, in mosques, extremists can should revere and pray to.7 jihad as a way of absolving observe other Muslims’ com- A protest conversion may their sins.8 mitment to the faith and their be an attempt by people to Acceptance seeking, a form reactions to the Islamic message identify themselves apart from of extrinsic conversion, is a given by extremist religious or to rebel against a society or fundamental human motiva- leaders. In prisons, extremist circumstances they perceive as tion.9 Individuals have a perva- recruiters can identify a popula- oppressive. Additionally, faith sive drive to form and maintain tion disaffected with society and

December 2007 / 5 The Radicalization Process PRERADICALIZATION IDENTIFICATION INDOCTRINATION ACTION

Motivation/Conversion Individual accepts the • Intensifi ed group Individual knowingly • Jilted believer cause bonds engages in extremist • Acceptance seeker • Social activity. • Protest conversion • Increased isolation • Terrorist • Faith reinterpretation from former life • Increased vetting • Operational • Developing social opportunities activities of Stimulus bonds with new group • Training camp Facilitation • Self • Forge new social • Surveillance Recruitment • Other identity • Finance Financing • Domestic training include: Opportunity • Overseas experience Individual convinced • Preparation • Mosque • Religious training that action is required • Planning • Internet • Language training to support the cause. • Execution • School • Basic paramilitary • Employment activities • Prison • Conferences

CONVERSION/ ACCEPTANCE CONVICTION TERRORISM REINTERPRETATION PROPENSITY FOR NO ACTION ACTION READY FOR ACTION IMPLEMENT ACTION use their operational skills and Identifi cation faith. Converts’ social connec- propensity for violence to fur- In this stage, individuals tions with other like-minded ther their cause. In Islamic and identify themselves with a par- individuals can strengthen this secular universities, they can ticular extremist cause and ac- dedication. In addition, overseas fi nd curious individuals who cept a radicalized ideology that travel may accelerate the radi- question society, as well as their justifi es violence or other crimi- calization process by provid- own beliefs. Further, extremists nal activity against perceived ing networking and experience can interact with others in busi- enemies. Accepting the cause (e.g., religious or language in- nesses, which provide a private leads people to become increas- struction and basic paramilitary setting to conduct meetings ingly isolated from their for- training) that later may support and further indoctrinate new mer lives. New converts often operational activity. converts, and in Internet chat seek and follow guidance from rooms where vulnerable indi- imams, more senior followers, Indoctrination viduals from around the world on how to live every detail of Indoctrination can involve can gather to discuss Islamic the religion, becoming more becoming an active participant doctrine. committed to the newfound in a group or being initiated

6 / FBI Law Enforcement Bulletin within the recruit’s self-created disseminating the JIS manifesto forming distinct operational jihadist environment. Through and through direct meetings cells. various activities with the group with inmates. James also sought Facilitation, a key compo- and increasingly demanding new recruits without prison nent of any terrorist attack, can and signifi cant roles within it, records who could benefi t the be accomplished by operatives converts see their potential as group through their occupa- dedicated to the support role or a jihadist and, ultimately, can tions, abilities, or access to waiting for a separate attack, become convinced of the need sensitive locations. supporters unwilling or unable for further action to support the to perpetrate a terrorist attack, cause. or unwitting participants. It Formal recruitment into can include providing fi nancial a terrorist group usually will assistance, safe houses, false occur before or during indoc- Recruitment documents, materials, attack trination. Recruitment plays an “plays an important plans, surveillance, or travel important role in any terrorist assistance. Individuals un- organization, and radicalized role in any terrorist able or unwilling to carry out a individuals can use their experi- organization…. violent terrorist attack still can ence to spot, assess, and encour- further the goals to which they age potential recruits to follow subscribe. For example, facilita- the same path. This process also tors play a key role in obtaining could include vouching for new funding for a terrorist operation recruits or helping them estab- through such criminal activi- lish their extremist credentials. Action ties as fraud, scams, embezzle- The fi nal stage consists” of A charismatic recruiter with ment, or theft and some may limited training or participa- supporting or engaging in ter- even involve violence. The JIS tion in jihad can transform that rorist activities. Although this case included three homegrown experience into a particularly action can be violent or nonvio- Islamic extremists in Los Ange- enticing recruitment tool for lent (e.g. fi nancing), it always les, California, who robbed gas individuals susceptible to an intends to infl ict damage on the stations allegedly to fund their extremist message. Extremist enemy. Some individuals who planned operations in support of Islamic clerics can play a major reach this stage will attempt to the JIS cause. role because of their knowledge participate in a terrorist attack. of Islam, their ability to provide Every action has three ENGAGING religious justifi cation for terror- stages: preparation, planning, THE COMMUNITY ist attacks, and the emotional and execution. During any of Using this model to identify hold they can have over impres- these, recruits can try to stop violent extremists, offi cers need sionable recruits. participating. However, they to rely on the community. Law In the case of Jam’iyyat may be so caught up in the enforcement resources are lim- Ul-Islam Is-Saheeh (JIS), Kevin group’s activities that they will ited, and offi cers may not have James, the group’s founder, engage in behaviors they other- the intimate community knowl- propagated JIS ideology and wise would not consider. Attack edge to detect subtle indica- recruited adherents inside preparations can include target tors when an individual moves and outside prison mainly by selection, casing, fi nancing, and toward terrorist action. Only

December 2007 / 7 people who reside near potential Executive Seminar Training on watchlists and conducting extremists can provide this ca- (CREST). Members of the searches at airports continu- pability. Police offi cials in Can- Arab-American community ously frustrate individuals of ada and the United Kingdom have attended the citizens acad- Middle Eastern descent, the emphasize that fi ghting violent emy, a popular 8-week program U.S. Department of Homeland Islamic extremism must become designed to give community Security established its own a community responsibility in leaders an overview of FBI outreach program to address the wake of the disrupted terror- and U.S. Department of Justice the issue. Similarly, school and ist operations in their countries. policies and procedures. FBI recreation offi cials can play an Law enforcement agencies must fi eld offi ces host the CREST important role in preventing fi rst build trust with individuals program, a shorter version of disaffected youth from espous- in these areas and then create a the citizens academy, in their ing and engaging in extremist link for communities to share local area. behaviors. issues of concern. In September 2001, the FBI CONCLUSION began developing an extensive Although the most danger- program to strengthen relations ous instances of violent extrem- with Arab-American, Muslim, ism have occurred overseas, the Sikh, and South Asian com- “Any successful Islamic radicalization of U.S. munities to establish trust and effort must involve persons, foreign-born or na- encourage careers in the FBI. a multifaceted tive, increasingly concerns law The program seeks to dispel approach.… enforcement leaders because myths about the FBI and U.S. of its potential to lead to vio- government policies toward lent action. The key to success these communities, particularly in countering violent Islamic the notion that the government extremism lies in identifying targets Muslims. The FBI estab- patterns and trends of extrem- lished liaison with the national Reaching out to the com- ist behavior in its early stages. munity is a long-term effort.” leaders of Muslim and Arab- This delicate balance requires American advocacy groups. Large gaps in trust persist. Ac- an approach that protects First For example, the FBI consulted cording to community leaders, Amendment rights. Law en- with the American-Arab Anti- many members of Arab-Ameri- forcement professionals must discrimination Committee to can and Muslim communities convey that, as part of a fair develop effective communica- almost unanimously feel that and compassionate govern- tions strategies. FBI fi eld offi ces government agents treat them as ment, they also share the in- regularly contact local chapters suspects and view all Muslims terests of communities. They of the same groups and hold as extremists. must respond aggressively to recurring meetings with com- Any successful effort must hate crimes and discrimination munity members as well. Also involve a multifaceted approach against any ethnic populations. essential to the FBI’s outreach addressing the variety of factors By upholding and enhancing the efforts are such programs as that affect attitudes in Muslim community’s trust, law enforce- the FBI Citizens Academy communities. For example, ment can counter the spread of and the Community Relations because identifying individuals this extremist ideology.

8 / FBI Law Enforcement Bulletin Endnotes beyond its borders. For more information, comes from a nonclinical sample, which 1 The model the authors present in this see http://www.mossad.gov.il/Eng/About would apply to all nonclinical psychologi- article was derived from both classifi ed Us.aspx. cal research fi ndings to understand and and open source information and academic 6 http://www.worldpublicopinion.org/ predict the behavior of someone who literature and refl ects events that occurred pipa/articles/brmiddleeastnafricara/346. is extreme. A distinct difference exists up until April 2006. php?nid=&id=&pnt=346&lb=brme between extremist behavior and someone 2 Greater Syria encompasses the pres- 7 http://www.freerepublic.com/focus/ who is extreme. Blowing oneself up can be ent-day states of Jordan, Israel, , f-news/1482394/posts considered extremist behavior, but camp- and Syria before those states were formed; 8 A group of six Yemeni-Americans ing trips for the purpose of radicalization retrieved from http://lcweb2.loc.gov/frd/cs/ convicted of providing material support to are not. syria/sy_glos.html. al Qaeda. 3 Andrew Kohut and Bruce Stokes, 9 Roy Baumeister and Mark Leary, America Against the World: How We Are “The Need to Belong: Desire for Interper- Ms. Dyer is an intelligence analyst in Different and Why We Are Disliked (New sonal Attachments as a Fundamental Hu- the FBI’s Counterterrorism Division. York, NY: Times Books, 2006). man Motivation,” Psychological Bulletin Mr. McCoy is an intelligence analyst in 4 http://pewglobal.org/reports/display. 117 (1995): 497-529. the FBI’s Counterterrorism Division. php?ReportID=253 10 Psychological research on terrorism Mr. Rodriguez is an intelligence 5 The Institute for Intelligence and Spe- suggests that psychopathology proves only analyst in the FBI’s Counterterrorism cial Operations, otherwise known as the a modest risk factor for general violence Division. Mossad, has been appointed by Israel to and possibly irrelevant to understanding Mr. Van Duyn serves as the deputy collect information, analyze intelligence, terrorism. Thus, it is prudent to conclude assistant director of the FBI’s Counter- and perform special covert operations that the current population inferred to terrorism Division.

The Bulletin’s E-mail Address

© Digital Vision he FBI Law Enforcement Bul- T letin staff invites you to commu- nicate with us via e-mail. Our Internet address is [email protected]. We would like to know your thoughts on contemporary law en- forcement issues. We welcome your comments, questions, and suggestions about the magazine. Please include your name, title, and agency on all e-mail messages. Also, the Bulletin is available for viewing or downloading on a number of computer services, as well as the FBI’s home page. The home page address is http://www.fbi.gov.

December 2007 / 9 Book Review

in the procedures, methods, and techniques for handling bomb and explosive situations. A number of manufacturers now produce numer- ous new tools and innovative items of equip- ment and supplies for use by bomb units. Other items are being revised and updated, and many more models and varieties of robots, bomb suits, disruptors, and similar equipment have begun appearing in the marketplace. In this new third edition of Bombs and Bombings, Tom Brodie, relying on his consid- erable background, knowledge, personal expe- rience, research, and numerous contacts in the fi eld, provides a detailed and in-depth look at a Bombs and Bombings: A Handbook to wide variety of the equipment and techniques Protection, Security, Detection, Disposal, suitable for use in handling and investigating and Investigation for Industry, Police and these situations. In addition to vehicles and Fire Departments, third edition, Thomas G. items used for the movement, transportation, Brodie, Charles C. Thomas Publisher, Spring- safe disposal, and destruction of explosives, fi eld, Illinois, 2005. bombs, IEDs, ordnance items, and other haz- In this well-written and clearly presented ardous materials, the textbook also discusses book, the author provides a unique look at the latest in protective clothing and bomb suits, bombs and explosive-related problems from other specialized handling paraphernalia, and a the comprehensive viewpoint of an experienced variety of robotic equipment. and accomplished bomb technician and inves- The book, expanded in content to over 300 tigator. The text, detailed and well researched, pages of material, presents a large measure of includes extensive data on a wide variety of new information, case studies, and additional related topics. Information on organizing, photos to impart details and ideas regarding training, and equipping a bomb response unit is bomb detection, bomb investigation, bomb clearly presented. The author adds fi rsthand in- search procedures, crime scene search investi- formation about the selection of personnel and gation, and evidence collection procedures. It the availability of various types and sources of also covers range disposal sites and personal training plus offering valuable insight regard- safety, as well as environmental and noise is- ing the organization of such a specialized unit sues and concerns. within a department or agency. Law enforcement offi cers, military person- The proliferation of improvised explosive nel, security professionals, fi re and emergency devices (IEDs) being used in numerous ter- service workers, and other individuals involved rorist attacks, combined with individual-borne in personal and industrial safety and security IEDs, suicide bombers, vehicle-borne IEDs, will fi nd a wealth of information regarding and remotely detonated massive amounts of commercial explosive items and products, explosives, are taking a toll on bomb techni- military explosives and ordnance items, and cians worldwide. This has led to some changes homemade or improvised explosive devices.

10 / FBI Law Enforcement Bulletin Various types of initiators, detonators, switch- This book contains valuable information es, timing devices, and booby traps, as well as and ideas and should be on the personal book- time, action, motion, command, and remote- shelf of every bomb technician, investigator, control detonation methods are discussed. As EOD technician, security professional, law a bomber may employ just about any type of enforcement offi cer, and anyone else involved mechanical or electrical switching method, the in public or private security and service. material in this book proves invaluable to any Readers will learn much from it and its professional that may come into contact with author. such a device. The book also covers bomb Reviewed by threats and their consequences, along with Dr. Larry Linville protection of individuals, buildings, vehicles, Professor of Criminal Justice public and private conveyances, planes, trains, Northern Virginia Community College and ships. Annandale, Virginia

Subscribe Now

Order Processing Easy Secure Internet: Toll Free: 866 512–1800 Mail: US Government Printing Oce Code: bookstore.gpo.gov DC Area: 202 512–1800 P. O. Box 979050 St. Louis, MO 63197–9000 3491 Fax: 202 512–2104 S YES, please send ______subscriptions to the FBI Law Enforcement Bulletin. (FBIEB) at $53.00 each ($74.20 foreign) per year. Price includes regular shipping and handling and is subject to change. The total cost of my order is $______.

Check method of payment:

Personal name (Please type or print) T Check payable to Superintendent of Documents

T SOD Deposit Account Company name T VISA T MasterCard T Discover/NOVUS T American Express

Street address (expiration date) Thank you for your order!

City, State, Zip code

Daytime phone including area code AUTHORIZING SIGNATURE 03/07

December 2007 / 11 Words Make Worlds Terrorism and Language By ANGUS SMITH

© Photos.com

ince September 11, 2001, Islam, thereby casting all plots, rather than the religious many Western intelli- Muslims either as terrorists or backgrounds of the terrorists, gence and law enforce- potential ones. Although intel- ignore a critical element of this S 2 ment agencies have received ligence offi cers and analysts global threat. To address this criticism for the terminology may understand this terminol- conundrum, the law enforce- they use to describe terrorism ogy, meanings become blurred ment and intelligence communi- that has an ideological basis in when fi ltered through the media ties must understand extremist Islam. Inherent diffi culties exist and public perceptions. Even discourse to counteract extrem- in fi nding appropriate language innocuous terms and completely ist rhetoric. that does not imply a clash legitimate expressions of belief between Islam and Western re- become loaded with innuendo. Describing Jihad ligion and culture.1 Such terms Yet, attempts to downplay Like the other Abrahamic as Islamic or Islamist terrorism, Islamic components of terrorist faiths—Judaism and Christian- jihadism, and Islamo-fascism conspiracies and acts by focus- ity—the fundamental tenets of fuse terrorism with mainstream ing on the mechanics of the Islam are rooted in compassion,

12 / FBI Law Enforcement Bulletin kindness, forgiveness, and, become a better person. Also, of the faithful.8 Combat repre- perhaps most important, social in 2005, Raheel Raza was the sents one of the central meta- justice. For example, one of the fi rst Muslim woman to lead phors of the history of early Pillars of Islam is zakat (the mixed gender Friday prayers in Islam, as the Prophet Muham- giving of alms to the poor), and, Canada. She characterized the mad and his followers battled during the Ramadan fast, Mus- courage and determination that and ultimately triumphed over lims are enjoined to remember allowed her to persevere over those they considered idolaters the less fortunate who fast the objections of conservative and unbelievers.9 The canon involuntarily.3 Incorrect state- and traditionalist elements as of Islamic teachings stresses ments about the nature of Islam a form of gender jihad aimed, that all Muslims must defend offend Muslims who try to live ultimately, at helping all women dar al-islam (the land of Islam) within those tenets. More im- take their rightful and scrip- from moral or spiritual corrup- portant, distorted and infl amma- turally mandated place as full tion originating in dar al-harb tory linkages between Islam and participants in the temporal and (the land of war) where Islamic terrorism can convince Muslims spiritual life of the community law does not prevail.10 Despite that the West is their enemy. of Muslims.7 this, Islamic law and tradition The word jihad, which has But, jihad also can have a always have favored defensive become almost a catchall term more combative interpretation. over offensive war; the impor- for extremism of any kind, Like the basic texts of Judaism tance of mercy to enemies; and illustrates this problem. De- and Christianity, the Koran has the inviolability of women, spite widespread belief to the numerous references to physi- children, and noncombatants.11 contrary, jihad is not one of the cal struggle and confrontation Additionally, Islamic teachings Pillars of Sunni Islam (in addi- with unbelievers and others who often stress the importance of tion to fasting at Ramadan and represent a threat to the safety the greater (spiritual) jihad over the giving of alms, these con- and integrity of the community the lesser (physical) jihad.12 sist of the profession of faith, daily prayer, and pilgrimage to Mecca).4 Translated literally, jihad means striving and often is expressed jihad fi sabil illah, or striving in the path of God.5 In this context, jihad describes In determining the efforts to live in the way “ appropriate that God intends and fi nd the terminology, we inner will and discipline to live must remain mindful according to the basic tenets of of words and their Islam.6 Jihad is a duty for all nuances. Muslims, an act of piety aimed at social or personal improve- ment. For example, Muslims might talk about their jihad to Mr. Smith is offi” cer in charge, Alternative Analysis, National stop smoking, raise money for Security Criminal Investigations, Royal Canadian Mounted Police. a community project, or simply

December 2007 / 13 The concept of jihad as an nation and because of their If both interpretations of offensive war, largely a 20th support for Israel...the 9/11 jihad are correct, they prove century phenomenon, devel- operations were a response highly problematic from polic- oped primarily in the writings to great acts of aggression ing and intelligence viewpoints. of ideologues, such as Abdul by America—its attacks on If we use the term jihad to Ala Mawdudi (founder of Afghanistan, on Iraq, on describe either terrorist activity Pakistan’s Jamaat-i Islami) Sudan, not to mention the or the terrorist mind-set, we and Sayyid Qutb (the Egyptian historic Crusades from long risk alienating those Muslims thinker who, in many respects, ago[.]...[K]illing innocent for whom jihad describes is the ideological father of al people is forbidden in Islam. either a highly personalized Qaeda and its offshoots). Both But, who is innocent—that internal struggle or an effort to individuals reinterpreted the is another question.14 effect positive change within concept of jihad by framing it as or beyond the Muslim com- an obligation equivalent to one munity. We effectively brand of the pillars and transforming it them as dangerous radicals, if from a spiritual concept to a po- not as terrorists, perpetuating litical one. In this reinterpreted stereotypes that equate Islam understanding, jihad became a “ To correctly and its adherents with terrorism. physical, rather than spiritual, name enemies, On the other hand, the combina- struggle and one to use against we must learn more tion of jihad with violence in the ignorance and barbarism of about them…. the name of faith (or a political those who threaten the funda- creed disguised as faith) is mental integrity of Islam (gen- also a reality. But, by referring erally interpreted as the Western to extremists as jihadis—a world or the “far enemy” of positive component of the Usama Bin Ladin) and Muslim Muslim historical and cultural leaders (the “near enemy”) who This highly politicized in- experience—we also recognize turn their backs on the teachings ” their actions as being in the terpretation of jihad has driven of the Koran and the example critical events in the Muslim path of God and, therefore, of the Prophet Muhammad.13 world from the assassination legitimate.15 In opposing jihad Omar Bakri, the Syrian-born of Egyptian President Anwar and its practitioners, we again Islamic cleric recently barred Sadat in 1981 to the rise of the risk characterizing ourselves as from the United Kingdom, viv- Taliban. It also lies at the heart the enemies of Islam. Not only idly illustrated both the thinking of a range of terrorist plots and does this empower extremists behind and the consequences attacks beginning with the fi rst but it also conveys a strong of this form of jihad in a 2007 World Trade Center bombing message that we are engaged in television interview. in 1993 through such recent a strugglenot with extremism The duty of jihad...had been threats as the “Toronto 18” but to suppress Islam itself. neglected by the Islamic plot in the summer of 2006, an nation for a long time be- operation that sought to bomb Identifying Accurate cause of the arrogance and several prominent landmarks in Terminology injustice of America and its the Canadian cities of Toronto To correctly name enemies, allies against the Islamic and Ottawa. we must learn more about them:

14 / FBI Law Enforcement Bulletin how they think and how they of the early fathers, the Prophet physical jihad.20 This imperative likely will act. Those at the Muhammad and his compan- can represent a form of jihad. forefront of addressing terror- ions.19 Both “Wahabbist” and The critical consideration is not ism—the intelligence and law “Salafi st” have been extensively what Raza says but the manner enforcement communities— used to defi ne particular types in which it diverges from other should assume a leadership role of terrorism. While elements of forms of Islamic discourse. in researching and determining Wahabbism could encourage a Ideological and rhetorical appropriate terminology to de- mind-set that includes extremist differences divide the larger scribe extremism and its perpe- action, as September 11 dem- Islamic world and Muslim com- trators. To date, relatively little onstrated, the vast majority of munities throughout the West. research exists in this area.16 Wahabbists and Salafi sts are not Further, in Europe, where the Although a glossary of terrorists. infl uence of extremist ideology alternate terminology is beyond © Photos.com tends to inhibit the integration the scope of this article, more of certain segments of Mus- appropriate descriptions of the lim populations into their host challenges we face do exist. societies, physical jihad exerts Usama Bin Ladin and many tremendous infl uence. 21 Beyond other extremists are heavily this, ideological confl ict within infl uenced by the writings of Islamic communities often man- Sayyid Qutb, who urged his ifests itself between two distinct followers not only to withdraw cultural groupings. Muslim from the moral vacuum of mod- academic and theologian Tariq ern society but also to destroy Ramadan characterizes the fi rst it.17 Qutb validated extreme as middle-class, assimilated violence in the cause of faith, Muslims whose Islam is sophis- so Islamic terrorism could more ticated and attuned to broader accurately be called Qutbian Understanding the People social and intellectual currents.22 terrorism. The debate over the mean- The second group, and neces- In determining appropriate ing and proper role of jihad sarily of great interest to the law terminology, we must remain occurs in Muslim communities enforcement and intelligence mindful of words and their around the world. Some Muslim communities, consists of young, nuances. For example, many commentators, such as Raheel unassimilated, and often under- contemporary terrorist move- Raza, emphasize the need for class individuals characterized ments—including Afghanistan’s Muslims to speak out and take by a strong sense of specifi c or Taliban and al Qaeda—have action to ensure that terrorism, generalized grievance. They theological roots in Wahab- extremism, and anti-Western exhibit strong leanings toward bism, a sect that forms the state propaganda are eliminated from a shared Islamic identity and a orthodoxy of contemporary Muslim discourse. For exam- spirit of precisely Islamic activ- Saudi Arabia.18 Wahabbism, a ple, Raza states that Muslims ism and mobilization frequently particularly strict interpreta- must “take back the mosques” in confl ict with Western so- tion of Islam, originated in the to ensure that the voices of cial and political norms. They Salafi st notion that pure Islam “reasonable Muslim men and reject Western culture (includ- must be rooted in the teachings women” are heard over calls for ing Westernized intellectuals

December 2007 / 15 and assimilated Muslims) as a by the violence inherent in al phenomenon. As one Saudi ex- reproach to true Islam and are Qaeda-type extremist ideol- tremist exhorted, “I do not need drawn into historical and ideo- ogy. But, those thinkers and to meet the Sheikh and ask his logical discourse that proves the commentators may not speak permission to carry out some greatness of Islamic civilization. for that portion of the Muslim operation, the same as I do not This combination of perceived world disconnected, isolated, or need permission to pray or to oppression and the search for otherwise susceptible to such think about killing the Jews a dignifi ed alternative easily ideology, making it diffi cult to and the Crusaders. There are translates into openness to phys- accurately guage the impact a thousand bin Ladens in this ical, or politicized, jihad.23 This of their message in the overall nation. We should not abandon demographic group includes context of Muslim discourse our way, which the Sheikh has the British-borne terrorists who or to what extent it can com- paved for you, regardless of the bombed the London transporta- pete rhetorically with the siren existence of the Sheikh or his tion system in July 2005 and call of extremism and physical absence.”25 the “Hamburg Cell” terrorists, jihad. Even before September 11, the nucleus of the September 11 governments and the law en- attacks. forcement and intelligence com- Exemplars of Ramadan’s munities engaged in a concerted fi rst group, such as Raza, tend strategy to confront extremism to distance themselves from the through a variety of means, second group that they believe “An understanding such as disrupting conspiracies, has transformed the traditional of the nuances preempting terrorist operations, concept of jihad as a form of of concepts like forging meaningful alliances, spiritual struggle into an ideol- jihad is critical. and gaining knowledge and un- ogy of violence and revenge. derstanding of the threat. How- Distortion also occurs when ever, the problem continues and portraying true Islam in an many indicators suggest that it unremittingly positive light. is becoming worse. Extremism in the name of a Ultimately, the construc- politicized Islam is a perversion Seeking ” tion of alternative narratives of faith but a legitimate form Alternatives designed to subvert extremist of discourse to its adherents, An understanding of the messaging may prove the most fully justifying direct action that nuances of concepts like jihad is effective long-term strategy can range from proselytizing to critical. However, any attempt against al Qaeda-type extrem- overt acts of terror on the scale to promote one understanding ism, domestic or global. We of September 11. or interpretation over another need to fi nd ways to counter- The messaging, particularly may be futile because classical balance the culture of death the interpretation of jihad, that texts do not necessarily speak and martyrdom with one that originates with assimilated for contemporary Muslims, and celebrates the value of life26 Muslim thinkers and commen- individual Muslims ultimately and determine the targets of our tators is comforting, especially will make up their own minds.24 messaging. The United States’ to non-Muslims who fi nd them- With the extremist mind-set, we cold war experience shows that selves perplexed and disquieted address a cultural and emotional messaging campaigns tend to

16 / FBI Law Enforcement Bulletin © Photodisc work best when asymmetric, fo- cused away from the opponent’s center of gravity, and aimed toward more receptive groups.27 Domestically, hardened activists may be a lost cause, whereas confused and idealistic adoles- cents may pose real opportuni- ties to exert far-reaching infl u- ence. Internationally, it may be possible to engage groups that remain Islamist while repudiat- ing extremism. The Internet is one of the most important tools available to the contemporary terrorist. Al Western culture but not its intel- seek to fi nd common ground Qaeda-inspired entities that are lectual underpinnings. and demonstrate what is worth less groups and more loose as- saving in both cultures. Extrem- sociations of far-fl ung networks Conclusion ism is a global phenomenon; must rely on the Internet to The intelligence and law no single agency or govern- recruit and train adherents, raise enforcement communities must ment can counteract extremist funds, propagandize, document learn not only how to penetrate messaging on its own. Such a their history and mythology, the extremist world effectively challenge requires a worldwide and organize terrorist strikes.28 but also how to understand response and signifi cant interna- Further, extremists with engi- the discourse that defi nes that tional cooperation to have any neering and computer training world. This involves gaining real effect. from Western colleges and a much broader and deeper universities undoubtedly fi nd understanding of the cultural Endnotes poetic justice in using the tech- roots of extremism than we cur- 1 Some political scientists have argued nology of the West as a means rently possess, not just words that individuals’ religious and cultural identities will be the primary source of of attacking and terrorizing the or rhetoric but also the meaning confl ict in the post cold war world. For societies that created that tech- and symbolism underlying even more on this theory, see Samuel P. Hun- nology (e.g., the choice of civil sounds, colors, and images.30 tington, The Clash of Civilizations and the aviation as a continuing focus of The creation of alternative Remaking of World Order (, NY: terrorist activity).29 On a more narratives requires not just cul- Simon and Schuster, 1996). 2 See, for example, Christie Blatchford, practical level, few extremists tural understanding on our part “Ignoring the Biggest Elephant in the have any grounding in either but on the target audience’s as Room.” Globe and Mail, June 5, 2006. the history or the culture of the well. To be effective, however, 3 All scriptural references are from the societies they intend to destroy. any large scale, cross-cultural M.A.S. Abdel Haleem translation of the By immersing themselves in the initiatives cannot originate in a Koran (Oxford, England: Oxford Univer- sity Press, 2004), 2:177; 183-186. applied sciences, they acquire a missionary sensibility that char- 4 For example, see the Koran (1:1-7; superfi cial understanding of the acterizes one culture as inferior 2:125-129; 142-153; 196-202; 22:26-30 technological manifestations of to the other but, rather, should among others).

December 2007 / 17 5 Douglas E. Streusand and 16 The European Union has prepared a 25 Jessica Stern, “The Protean Enemy,” Harry D. Tunnell, Choosing Words handbook of nonoffensive terminology to Foreign Affairs (July/August 2003): 35. Carefully: Language to Help Fight Islamic use in describing terrorism, but this remains 26 This idea builds on those expressed Terrorism (National Defense University, classifi ed. See BrunoWaterfi eld, “Don’t by others, including Gabriel Weimann of 2006), 3. Confuse Terrorism with Islam, Says EU,” Haifa University, cited in Joshua Sinai, 6 Karen Armstrong, Islam: A Short The Telegraph (March 31, 2007). “Defeating Internet Terrorists,” Washing- History (New York, NY: Random House, 17 Supra note 6 (Armstrong, 169-170); ton Times, October 8, 2006. 2002); and Raheel Raza, Their Jihad... Lawrence Wright, The Looming Tower: Al 27 Angel Rabasa, Cheryl Benard, Lowell Not My Jihad (Ingersoll, Ontario: Basileia Qaeda and the Road to 9/11 (New York, H. Schwartz, and Peter Sickle, Build- Books, 2005), 18. NY: Knopf, 2006), 28-31. ing Moderate Muslim Networks (Santa 7 Supra note 6 (Raza, 118-122). 18 Robert Fisk, The Great War for Civi- Monica, CA: RAND Center for Middle 8 The Koran (48:16-18; 2: 190-196; lization: The Conquest of the Middle East East Public Policy, 2007), 142. 8:12-20; 9:29). (London, England: Fourth Estate, 2005), 28 http://www.usip.org/pubs/special 9 Supra note 6 (Armstrong, 18-22). 1045. reports/sr116.html 10 Richard C. Martin, Said Amir Ar- 19 Charles Allen, God’s Terrorists: The 29 Ibid. jomand, Marcia Hermansen, Abdulkader Wahhabi Cult and the Hidden Roots of 30 See, for example, Combating Terror- Tayob, Rochelle Davis, John Obert Voll Modern Jihad (London, England: Little, ism Center, U.S. Military Academy, The (eds.) Encyclopedia of Islam and the Brown, 2006), 210. Islamic Imagery Project: Visual Motifs Muslim World (New York, NY: Macmil- 20 Supra note 6 (Raza, 61). in Jihadi Internet Propaganda; retrieved lan, 2004). 21 International Crisis Group, “Under- from http://ctc.usma.edu/publications/ 11 The Koran 2:190-196. standing Islamism,” Middle East/North publications.asp. 12 Ibid. Africa Report (No. 37, March 2, 2005), 13. 13 Supra note 6 (Armstrong, 168-170). 22 Tariq Ramadan, Western Muslims Note: The opinions expressed in this 14 Middle East Research Institute, and the Future of Islam (New York, NY: article are the author’s and not neces- Special Dispatch Series 1529 (March 30, Oxford University Press, 2004), 106-107. sarily those of the Royal Canadian 2007). 23 Ibid., 107-109. Mounted Police or the government of 15 Supra note 5. 24 Supra note 5. Canada.

Unusual Weapon

Plastic Spike Law enforcement officers should be aware of this plastic spike (dagger). Offenders may at- tempt to use this unusual weapon. And, magnetometers cannot de- tect it because of its composition.

18 / FBI Law Enforcement Bulletin Leadership Spotlight

Leadership Through Fellowship: No One Has All of the Answers

Good fellowship and friendship are lasting….

—William Wycherley

n July 2007, I gave a presentation on en- those that refl ect the ethnic, religious, or lightened leadership at the 12th Annual cultural background of offi cers, while oth- I National Association of Women Law ers focus on regional issues. Some cater to Enforcement Executives (NAWLEE) in Baton the concerns faced by offi cers specializing Rouge, Louisiana. NAWLEE is dedicated to within a fi eld such as canine units, probation, addressing the needs and issues of women law youthful offenders, community policing, and enforcement executives and those who aspire narcotics. Many of these associations, such as to these positions. To learn more about these, NAWLEE, hold national or regional confer- I decided to attend the conference, as well as ences. Although conference participation is facilitate a workshop. What a wonderful op- benefi cial, offi cers often are hindered by their portunity this was. department’s lack of funding. If scholarships While the educational elements and pro- or other subsidized sources are not available, fessional presentations were exceptional, I interested individuals still can be involved by found that fellowship, by far, was the greater receiving newsletters, reviewing association benefi t. The membership of NAWLEE con- Web sites, and developing one-on-one rela- sists of both male and female law enforcement tionships with other members in their area. professionals of every rank and type of depart- An effort as small as having lunch with ment. These members can reach out to each officers from neighboring counties every other for advice, support, counseling, or men- few months can be the catalyst to developing toring. They know they do not have to have valuable fellowship and liaison that can all of the answers all of the time, and they can serve everyone well. The trials faced by law seek guidance from others regardless of their enforcement personnel everywhere are too rank, position, or department. many and too severe to be faced alone; offi cers A recent search of the Internet revealed must reach out to their sisters and brothers a multitude of law enforcement associations who just might have the answers. in every state and in nearly every city and county. There also are organizations at the Deborah Southard, a leadership program specialist in the Leadership Development Institute at the FBI Academy, national and international levels with member- prepared Leadership Spotlight. ships in the thousands. These groups include

December 2007 / 19 © Photos.com

Operation Smokescreen A Successful Interagency Collaboration By ROBERT FROMME and RICK SCHWEIN, M.A.

n a spring day in 1999, confi rmed something he had was about to be hijacked by Detective Sergeant long suspected: there was much the FBI in the name of national O Fromme of the more to the group of Lebanese security. Iredell County, North Carolina, cigarette smugglers he had The agents’ startling infor- Sheriff’s Offi ce thought that spent the last several years mation revealed that the sus- what the two FBI agents sitting investigating than mere criminal pects in Detective Fromme’s across from him at the U.S. activity. On the other hand, with cigarette-smuggling case were Attorney’s Offi ce in Charlotte his case ready for indictment, members of Hizballah, an inter- had just told him was something Detective Fromme feared that national terrorist organization right out of a Hollywood the long, painstaking investiga- responsible for the deaths of script. Moreover, he had mixed tion he had conducted alongside more Americans than any other feelings about the disclosure. the Bureau of Alcohol, Tobacco, terrorist group in the world On the one hand, the agents Firearms, and Explosives (ATF) prior to September 11, 2001.1

20 / FBI Law Enforcement Bulletin When he learned this, Detective activities directed by and con- individuals entered the store Fromme knew that the inves- ducted on behalf of Hizballah. carrying plastic grocery bags tigation was about to take on a “The case opens an important containing $20,000 to $30,000 life of its own.2 window on the small but wor- in cash and bought massive risome subculture of militant quantities of cigarettes. The Cell Islamic immigrants who despise During the next few months, In 1992, Mohamad Youssef America, even while living in it, Detective Fromme began to Hammoud arrived in New York who fl aunt its laws and actively document the activities of these City using a fraudulent visa. aid its enemies.”4 people as they continued to Over time, the FBI determined purchase large amounts of ciga- that Hammoud and several of The Crime rettes on an almost daily basis. his relatives were members of, An example of the type of They carried large volumes of affi liated with, or sympathetic open criminality practiced by cash and bought anywhere from toward Hizballah. These indi- the North Carolina Hizballah 1,000 to 4,500 cartons of ciga- viduals also participated in an cell exists in the blatant manner rettes at a time. After loading ongoing pattern of relatively in which the group engaged in their purchases in cars, vans, or low-level criminal activity that cigarette smuggling. In early trucks, they took the interstate ranged from fraud (e.g., immi- 1995, while off duty working toward Virginia or . gration, marriage, credit card, in uniform at a tobacco shop, Detective Fromme followed and identity) to money launder- Detective Fromme observed them to the North Carolina state ing (e.g., cigarette smuggling). something that his instincts line to detail that the individuals The information developed by told him went beyond a typical had crossed into an adjoining the FBI augmented and, in some criminal operation. He watched state, thereby potentially violat- cases, mirrored that from the while several Middle Eastern ing federal law. criminal investigation of ciga- rette-smuggling activities con- ducted by Detective Fromme and the ATF. According to FBI Special Agent Schwein, who conducted much of the FBI’s investigation, Hammoud and the other cell members were “part-time ter- rorists and full-time criminals.”3 The criminality of Hammoud and his confederates ultimately became their greatest vulner- ability and allowed investiga- tors to painstakingly unravel a Mr. Fromme, a retired detective, Special Agent Schwein is the criminal enterprise inexorably currently serves as a senior FBI liaison to the U.S. Special tied to terrorism, specifi cally consultant with a private fi rm Operations Command at MacDill fund-raising and procurement in McLean, Virginia. Air Force Base in Tampa, Florida.

December 2007 / 21 He contacted Charlotte ATF State’s Diplomatic Security the investigation uniquely suited agents who advised him that Service (DSS) of possible viola- to their areas of expertise. This what he had uncovered was tions of visa, immigration, and division of labor proved to be most likely a cigarette diver- marriage fraud. As the investi- a highly effi cient and effective sion ring, a scheme to purchase gation expanded and additional way of doing business. As an large amounts of cigarettes in organizations joined, it became example, INS and DSS handled states where the tax is low, such apparent that the efforts of the the immigration, visa, and mar- as Virginia and North Carolina, combined agencies were mutu- riage fraud; ATF and the Iredell and transport them to northern ally supportive. County Sheriff’s Offi ce focused states, such as , New on the cigarette smuggling and York, and Pennsylvania, where money laundering; and the FBI taxes are much higher.5 Typical- developed the racketeering and ly, a carton of cigarettes costing terrorism-related charges. $14 in North Carolina would Each organization The sheer breadth and sell for $28 in Michigan. Taking “worked the aspects scope of the criminal activ- these cartons to Michigan by ity conducted by the Charlotte the thousands, they were mak- of the investigation Hizballah cell provided enough ing an average of $13,000 profi t uniquely suited evidence for the U.S. Attorney’s per van load, and the group was to their areas of Offi ce to charge the suspects capable of shipping as many as expertise. under the racketeer infl uenced three van loads per day. corrupt organization (RICO) In September 1996, ATF statutes, which were designed opened an offi cial investigation to break up criminal enterprises and signed a memorandum of and require proof of an ongoing understanding with the Iredell The Collaboration pattern of criminal activity and County Sheriff’s Offi ce, which By the time Detective” evidence that the coconspira- assigned Detective Fromme Fromme had the fateful meeting tors are associated in fact. Aside to the ATF on a permanent with the FBI agents in 1999, the from the evidence document- full-time basis. This marked agencies with mutual investiga- ing the cell’s ongoing pattern the fi rst formal collaboration tive interests in the subjects had of criminality, the investigation among law enforcement agen- begun formally sharing infor- also gathered information that cies in the case and resulted mation. At that point, the scope linked individuals to each other in an investigative framework of the investigation clearly was and to Hizballah. The North and the collection of extensive so large that no single organiza- Carolina cell met weekly at evidence that readily augmented tion or agency could effectively each others’ homes ostensibly the intelligence investigations piece everything together. What for religious prayer meetings being simultaneously conducted emerged was an unprecedented and often watched Hizballah- by the FBI. In turn, intelligence collaborative effort involving produced videotapes, which the FBI developed supported more than 16 separate local, cell leader Mohamad Ham- subsequent criminal investiga- state, federal, and international moud used to solicit donations. tions by the Immigration and law enforcement agencies and At these meetings, the cell also Naturalization Service (INS) intelligence services. Each orga- discussed and shared techniques and the U.S. Department of nization worked the aspects of for conducting various criminal

22 / FBI Law Enforcement Bulletin activities, such as cigarette- smuggling routes and tactics and procedures for committing credit card, identity, marriage, visa, and immigration fraud. Employing the RICO statutes to disrupt or dismantle an opera- tional terrorist cell set a prec- edent, allowing the investigators to defi ne the group as a Hizbal- Mohamad Darwiche (third from lah cell and to seize evidence left), one of Hammoud’s convicted confederates, poses with Hizballah during the execution of search militia. warrants that could be used to prove the elements of the mate- rial support violations. To connect the cell to A teenage Mohamad Hammoud Hizballah, the investigation poses with an automatic rifl e in leveraged disparate and seem- front of a picture of Ayatollah Kho- ingly unconnected investiga- meini. Arabic writing on the back of tive efforts to support larger the photograph reads, “Mohamad operational goals. Cell member at Hizballah Center.” Said Harb became the linch- pin between the fund-raising conducted in Charlotte and and his role in the group por- was scrutinizing Harb as a re- procurement activities directed trayed him as “a smooth talker sult of his relationship to Moha- by Hizballah in Vancouver, with an innocent air.... Harb was mad Dbouk, an Iranian-trained Canada. Harb came to the at- perhaps the most versatile crook Hizballah operative. Dbouk, tention of U.S. law enforcement of the bunch. He had played a an intelligence specialist and offi cials, specifi cally the ATF, key role in the cell’s criminal propagandist, was dispatched as a result of his involvement activities, personally driving to Canada by Hizballah for the in the cigarette-smuggling ring. cigarettes to Michigan and rais- express purpose of obtaining Subsequent investigation by ing a lot of money through bank surveillance equipment (video the FBI determined his heavy and credit fraud. At one time, cameras and handheld radi- involvement in numerous visa, he had 12 credit cards and 3 os and receivers) and military marriage, and immigration driver’s licenses, all in different equipment (night-vision devic- frauds and in organized identity, names. His cell phone had fi ve es, laser range fi nders, mine and credit, and bank frauds. Harb distinct rings, each for a sepa- metal detectors, and advanced attended meetings Hammoud rate identity, and he needed to aircraft analysis tools). CSIS hosted with the Charlotte cell refer to a notebook to keep track could do little more than moni- and personally couriered money of his myriad of social security tor his activities because Cana- for Hammoud to a Hizballah numbers and bank accounts.”6 da did not have anything simi- military commander in Leba- The Canadian Security In- lar to a material support statute non. One description of Harb telligence Service (CSIS) also at the time and Dbouk and his

December 2007 / 23 accomplices had not violated provided the United States through the cooperation of a Canadian law. When Dbouk with transcripts and photo- number of U.S. law enforce- solicited his old friend Said graphs to support the indict- ment agencies directly led Harb to assist in purchasing the ment and prosecution of Harb, Harb to plead guilty to violat- equipment and to test counter- Dbouk, and others involved in ing the material support stat- feit credit cards as a method of the conspiracy. utes and to subsequently testify doing so, the dynamic changed against Charlotte cell leader and the Canadian cell became The Consequences Mohamad Hammoud. In turn, part of an overarching conspira- This unprecedented col- Harb’s testimony helped con- cy that violated the U.S. mate- laboration between CSIS and vict Hammoud during his trial rial support statutes. Canadian the FBI and the overwhelm- on RICO and material support authorities subsequently ing criminal case developed charges. Ultimately, the investigation led to the indictment of 26 indi- viduals on charges ranging from immigration violations to RICO and material support violations. Cell leader Mohamad Ham- moud was convicted at trial and sentenced to 155 years in fed- eral prison. In addition to being the fi rst case in U.S. history to result in a conviction of an in- dividual charged with violating the material support statutes, as well as the fi rst use of the RICO statutes to disrupt or dismantle Mohamad Darwiche (right) and another convicted confederate count money likely collected from selling contraband cigarettes. an operational terrorist cell, it was one of the few cases where a friendly foreign intelligence service provided its intelligence holdings for use as evidence in a U.S. trial. Among the other positive outcomes of the investigation, it served as the impetus for the FBI to form the North Caro- lina Joint Terrorism Task Force (NCJTTF). Many of the inves- tigators assigned to work on the Operation Smokescreen case Mohamad Darwiche (left) and Mohamad Hammoud (right) stand subsequently became charter at the back fence of the White House in Washington, D.C. members of the NCJTTF.

24 / FBI Law Enforcement Bulletin Detective Fromme offered crime and terrorism in today’s Endnotes this observation, “This case interconnected world. As the 1 As the literal translation of its name serves to show the importance case illustrates, terrorists do not suggests, Hizballah or “The Party of God” of law enforcement agencies just use major cities to carry is a religious terrorist organization formed coming together and working out their activities but also can in the early 1980s to organize Shiite fundamentalists in opposition to the Israeli as a team. I can say without operate in small towns. Because occupation of Lebanon. Hizballah sees reservation that everyone of this, local law enforcement the use of violence as a sacramental act or involved in the case left their offi cers play a key role in pro- divine duty executed in response to a theo- egos at the door. It was a perfect tecting the nation because they logical imperative. Hizballah has repeat- example of how an investiga- often are fi rst to detect criminal edly shown that terrorist tactics, such as suicide bombings, airline hijackings, and tion should be conducted.” activity that may be part of a kidnappings, are justifi able in furtherance Detective Ken DeSimone of the larger terrorist plot. But, no law of their ideology. See, Bruce Hoffman, In- Charlotte-Mecklenburg Police enforcement or intelligence side Terrorism (New York, NY: Columbia Department and assigned to the agency can have all of the University Press, 1998), 94. Former CIA investigation remarked about pieces at hand to dismantle such Director George Tenet compared them with al Qaeda when he stated, “Hizbal- the strength of the collabora- a plot on its own. lah as an organization with capability and tion between the agencies, “I worldwide presence is [al Qaeda’s] equal, was a little intimidated the fi rst if not a far more capable organization. time I traveled with the FBI I actually think they are a notch above in to Canada for meetings with many respects.” Deputy Secretary of State Richard Armitage further warned of the CSIS. After all, I’m just a local Ultimately, the investigation led serious threat posed by Hizballah, “Hizbal- cop and I fi nd myself sitting “ lah may be the ‘A’ team of terrorists and in a big conference room at to the indictment of maybe al Qaeda is the ‘B’ team...they are the headquarters of a foreign 26 individuals…. global and can reach out when they are ready.” See, “Hizballah: The A Team of intelligence service discuss- Terror,” American Israel Public Affairs ing policy issues relating to Committee Near East Report, October 11, the sharing of information and 2004, 72. intelligence to support interna- 2 For additional details on Operation tional terrorism operations and On that spring day in 1999, Smokescreen, see Tom Diaz and Barbara prosecutions. What impressed Detective Fromme could not Newman, Lightning Out of Lebanon: ” Hizballah Terrorists on American possibly have imagined that me the most is that not only Soil (New York, NY: Presidio Press, did the FBI treat me as a full his cigarette-smuggling inves- 2006). partner but the CSIS operatives tigation would help form the 3 David E. Kaplan, “Homegrown Ter- seemed genuinely interested in foundation of an unprecedented rorists: How a Hizballah Cell Made Mil- partnership among local, state, lions in Sleepy Charlotte,” U.S. News and my perspective and opinion as a World Report, March 10, 2003, 31. 7 local police offi cer.” federal, and foreign law en- 4 Daniel Pipes, Militant Islam Reaches forcement offi cials and intelli- America (New York, NY: W.W. Norton Conclusion gence offi cers. By sharing infor- and Company, 2003), 198. At its heart, Operation mation and joining forces, such 5 For additional information, see Dean Smokescreen remains an ex- collaborative efforts represent T. Olson, “Financing Terror,” FBI Law Enforcement Bulletin, February 2007, 1-5. cellent example of the kind of a unifi ed approach that aptly 6 Michael Crowley, “Blood Money,” interagency collaboration and symbolizes America’s stalwart Reader’s Digest, February 2004, 200. cooperation necessary to ef- determination to remain strong 7 Detective Ken DeSimone, interview fectively combat transnational in the face of serious threats. by author, June 19, 2007.

December 2007 / 25 Bulletin Reports

Computer-Based Training The National Institute of Justice offers Incident Commander: A Training Simula- tion for Public Safety Personnel, a CD-ROM that provides simulation training for public safety incident commanders in developing action plans and implementing them in various crisis scenarios through resource allocation and the assignment of tasks. The training can be done alone or with up to 16 players. Each participant can choose to manage squads from one or more agencies; take control of one or more incident command sections; or be an observer. After a tutorial on how to manage an emergency-response scenario through the provided software and computer tools, crisis situations are addressed from the perspective of the Incident Commander Sys- tem. The scenarios portrayed include a school hostage situation, a courthouse bomb threat, a chemical spill, and a severe storm. Each situation offers different challenges to the players. Some scenarios emphasize law enforcement. In others, fi refi ghting is the greatest challenge. Some may confront players with downed power lines, water- main breaks, noxious chemicals, and the media. Recognizing the greatest threats and dealing with them by effective use of the Incident Command System and appropriate deployment of responders are the keys to success and a high score in the training. Cri- sis scenarios are managed through detailed maps displayed on the computer screen. These maps include icons that can be selected and moved to perform certain tasks at various locations. Copies of the program can be obtained by contacting the National Crimi- nal Justice Reference Service Crime Victims at 800-851-3420 or http://www. The Offi ce for Victims of Crime presents Serving ncjrs.gov. Also, authorized Crime Victims with Disabilities, a DVD containing two public safety agencies can popular award-winning videos originally produced in De- register to receive the software cember 2002 and no longer available in VHS form. “The free of charge at http://www. Time Is Now” helps crime victim service providers reach incidentcommander.net/. out and serve people with disabilities. “Meet Us Where We Are” presents fi rst-person accounts of how crime affects people with disabilities and educates disability service providers and people with disabilities about crime victims’ rights and resources. These videos, along with transcripts, and DVD copies can be obtained by contacting the National Criminal Justice Reference Service at 800- 851-3420 or http://www.ncjrs.gov.

26 / FBI Law Enforcement Bulletin Juvenile Justice The Offi ce of Juvenile Justice and Delinquency Prevention introduces Tool Kit for Creating Your Own Truancy Reduction Program, which serves as a resource for communities striving to address the problem. The fi rst chapter provides an overview of the issue, as well as information pertaining to the national problem of truancy, including the extent of the issue, its short- and long-term consequences, contributing factors, and the types of efforts that have helped to improve school attendance. The next chapter examines how truancy programs are defi ned, as well as the elements of evaluation design and data collection methods. This is followed by guidelines for program development. The third chapter begins with school policies that engage students and families. Those discussed range from modifying school grading policies related to attendance to creating alternatives to out-of-school suspension and expulsion. The fourth, and fi nal, chapter provides practical ideas for managing truancy cases, improving school attendance, increas- ing parent and community involvement, creating alternatives to juvenile deten- tion, and working with other agencies to keep kids in school. This report is avail- able online at http://ojjdp.ncjrs.gov/publications/truancy_toolkit.html or through the National Criminal Justice Reference Ser- vice at 800-851-3420 or Education http://www.ncjrs.gov. Addressing Shortfalls in Forensic Science Education, a fact sheet presented by the National Institute of Justice, de- scribes the benefi ts of an accredited forensic science educa- tion program. Many crime labs fi nd that new graduates from these programs are not properly trained. A committee led by the American Academy of Forensic Science has developed an evaluation and accreditation process to help universities improve their curriculum. An accredited curriculum gives em- ployers, such as crime lab directors, standard criteria to assess whether an applicant is qualifi ed. This report is available at http://www.ncjrs.gov/pdffi les1/nij/216886.pdf or by contacting the National Criminal Justice Reference Service at 800-851- 3420 or http://www.ncjrs.gov.

December 2007 / 27 A Look at Fusion Centers Working Together to Protect America By BART R. JOHNSON

© Photodisc he tragic terrorist at- of these efforts and a focal point “We are working toward an era tacks on September 11, for sharing information are state of increasing collaboration, and 2001, highlighted the fusion centers. An overview fusion centers are a great ex- T ample of how partnerships can inadequacy of information shar- of these facilities, along with a achieve great success.” ing among many law enforce- case example of how the New ment and intelligence agencies. York State Intelligence Cen- —Secretary Michael Chertoff, Since then, the law enforcement ter develops a comprehensive U.S. Department of 1 and intelligence communities view of the threat environment, Homeland Security have worked to combine their illustrates how fusion centers resources, experience, and ex- play an integral role in assist- pertise to pursue terrorists and ing law enforcement agencies gather intelligence to thwart fur- achieve their mission to protect ther attacks. A fundamental part the citizens they serve.

28 / FBI Law Enforcement Bulletin DEFINITION OF potential threats and the ability Although the more than 40 A FUSION CENTER to meet those threats. existing fusion centers share A fusion center is “a col- Because fusion centers also a common mission, they also laborative effort of two or look at information from local- have unique characteristics. more agencies that provide level criminal activity, they can The Fusion Center Guidelines resources, expertise, and infor- analyze it to determine whether were created to ensure that each mation to the center with the any connection exists between facility is established and oper- goal of maximizing their ability seemingly typical low-level ated consistently.3 They respect to detect, prevent, investigate, crime and terrorist activity. the individual qualities while and respond to criminal and For example, in the summer of enabling the centers to operate terrorist activity.”2 Although 2005, a group of men in Tor- within a common framework— fusion centers may vary from rance, California, engaged in similar to the construction of a state to state, most include a series of gas station robber- group of buildings where each state and local law enforcement ies. Although on the surface is unique, yet a standard set departments, public health and these appeared to be typical of codes and regulations are safety organizations, and federal local crime scenes, they helped adhered to regardless of the agencies, such as the FBI, U.S. fi nance a larger terrorist plot to size or shape of the structure. Department of Homeland Secu- attack military and Jewish fa- The guidelines and related rity, and the Bureau of Alcohol, cilities. As this case illustrates, materials provide assistance to Tobacco, Firearms, and Explo- no neat lines divide criminal centers as they prioritize and sives. Bridging the gap between and terrorist activities. This address threats posed in their state and local agencies and the shows why fusion centers are so specifi c jurisdictions for all federal government, fusion cen- vital in helping agencies gain a crime types, including terror- ters facilitate real-time informa- more comprehensive picture of ism. In addition, the guidelines tion sharing. Together, offi cers, the threats they face. help administrators develop agents, and intelligence analysts work side by side collecting intelligence, analyzing criminal trends and terrorist threats, and disseminating information. But, fusion centers provide more than just timely intelli- “A fundamental part gence. They allow agencies to of these efforts see both the macro and micro and a focal point for view of the threat environment. sharing information Understanding the connec- are state fusion tions beyond state and national centers. borders enhances the ability to predict and prevent crime and terrorism, rather than just react- Colonel Johnson, deputy superintendent in charge of fi eld command for the New ing to such incidents. It also York State Police, currently serves” as the vice chair of the U.S. Department of helps narrow the gaps between Justice’s Global Justice Information Sharing Initiative Advisory Committee.

December 2007 / 29 policies, manage resources, and Force (JTTF) to investigate services to the entire New York evaluate services associated further. With access to criminal law enforcement community with the jurisdiction’s fusion and intelligence information in an all-crimes environment center. Overall, these guidelines throughout the state, the fusion through state, federal, public, facilitate enhanced coordination center connected these seem- and private information data- efforts, stronger partnerships, ingly unrelated incidents. bases. Offi cers who suspect and improved crime-fi ghting The NYSIC serves as a terrorist links can investigate and antiterrorism capabilities. nerve center for all calls com- those leads and contribute ing into the statewide terrorism information regarding suspi- EXAMPLE OF A tip line. Those with a suspected cious activities. Additionally, FUSION CENTER nexus to terrorism are forward- the NYSIC compiles data and How do all of these poli- ed to the JTTF for further in- disseminates intelligence and cies and functions translate into vestigation through the NYSIC advance warnings to law en- practice? A case example from Counterterrorism Center, which forcement agencies statewide the New York State Intelligence regarding possible terrorist and Center (NYSIC) shows a fusion criminal incidents. center in action.4 In July 2004, the NYSIC received an anony- Stakeholder Support mous call about a suspicious A key to the success of university student in upstate A key to the an intelligence fusion center New York. The caller indicated “success of an is the support of stakeholders that the student, a senior who intelligence fusion in regional law enforcement headed the Muslim Student center is the organizations. As a multia- Association, on several occa- support of gency endeavor, the NYSIC has sions had expressed his hatred stakeholders…. received the full support of the for America and was only in New York State Association of the country to teach Islamic Chiefs of Police, the New York religion. While researching the State Sheriffs’ Association, and case, a New York State trooper many federal and state agencies. found a link between this stu- is designed to expand counter- The ability of organizers to dent and a report concerning terrorism efforts by providing” encourage the participation and two Middle Eastern males who real-time information exchange cooperation of multiple agen- claimed to be Israeli nationals of terrorism threats, indicators, cies represents another highly inquiring about the location of and warnings. This reciprocal infl uential factor. Located near a nearby synagogue because initiative has proven instrumen- the state’s capital, the NYSIC they were musicians hired for tal in improving investigative pools the resources of the New a wedding occurring there. A and reporting efforts by law York State Police; the New license plate check of their ve- enforcement offi cers statewide. York State Offi ce of Homeland hicle linked the registrant to the The center actively develops Security; and a number of other same house as the suspicious and disseminates law enforce- federal, state, and local law en- university student. The NYSIC ment-sensitive intelligence forcement organizations to gath- forwarded this information to products and supplies terror- er data in a centralized location. the FBI’s Joint Terrorism Task ism and criminal intelligence Agencies throughout New York

30 / FBI Law Enforcement Bulletin not only submit information to 7 days a week. It provides both point is provided by the various the NYSIC and make requests analytical services and general components, thereby facilitating for case assistance but contrib- case support, which allows law the exchange of criminal intel- ute personnel to staff the center. enforcement offi cers throughout ligence and information. Having both sworn and the state to save costly person- In close cooperation with civilian personnel with knowl- nel hours and investigative steps its law enforcement partners, edge and expertise in a variety in their criminal cases. Because the NYSIC has undertaken of designated areas of respon- of the diverse agencies repre- an initiative recognized as an sibility, the NYSIC acts as a sented, the NYSIC functionally important component of the in- centralized and comprehensive operates as part of a statewide telligence process. To that end, criminal intelligence resource intelligence network. Access the NYSIC has developed intel- available to assist law enforce- to an extensive array of data- ligence collection requirements ment agencies 24 hours a day, bases through a single contact for terrorism, gangs, narcotics,

10 Simple Steps for Information Sharing 1. Recognize your responsibilities and lead by example. 2. Establish a mission statement and a policy to address developing and sharing information and intelligence data within your agency. 3. Connect to your state criminal justice network and regional intelligence databases and participate in information sharing initiatives. 4. Ensure privacy issues are protected in policy and practice. 5. Access law enforcement Web sites, subscribe to law enforcement Listservs, and use the Internet as an information resource. 6. Provide your agency members with appropriate training on the criminal intelligence process. 7. Become a member of your in-region Regional Information Sharing Systems® (RISS) center. 8. Become a member of the FBI’s Law Enforcement Online (LEO) system. 9. Partner with public and private infrastructure sectors. 10. Participate in local, state, and national intelligence organizations.

Source: U.S. Department of Justice (DOJ), Offi ce of Justice Programs, Bureau of Justice Assistance, in collaboration with DOJ’s Global Justice Information Sharing Initiative, 10 Simple Steps to Help Your Agency Become a Part of the National Criminal Intelligence Sharing Plan; retrieved from http://it.ojp.gov/documents/ Ten_Steps.pdf for complete document.

December 2007 / 31 Technology guns, and money laundering. supervisors, and line offi cers Through these established pro- regarding the topic of informa- Update cedures, pertinent information tion collection and exchange. is collected, allowing for it to With the realization that ter- be analyzed and disseminated to rorists and those who support he FBI’s Criminal the appropriate stakeholders. them were operational in and T Justice Information moving freely about the United Services (CJIS) Division Future Initiatives States, departments recognized announced the creation Worthwhile information they no longer could afford of the Law Enforcement sharing depends on more than to operate without standards Online’s (LEO) 100,000th just interagency cooperation; it and procedures regarding the vetted member account also requires a shared techno- identifi cation of indicators on July 2, 2007. LEO was logical standard that enhances and warnings of terrorist and created in July 1995 when the interchange among different criminal activity. In addition, the FBI entered into a computer systems. Participating intelligence and law enforce- cooperative agreement with agencies currently have access ment agencies recognized that Louisiana State University to a collective intelligence sys- a centralized collection and in Baton Rouge, Louisiana. tem, which stores information analysis point must be estab- LEO continues to provide about criminal or terrorist activ- lished to ensure that criminal an advanced technological ity. Data mining of multiple intelligence is exchanged in a resource to further the state systems is a capability that the timely, coordinated, and effec- of the art in law enforce- NYSIC has examined at length. tive manner. The establishment ment communications This evolving intelligence sys- of state fusion centers has been capabilities, technologies, tem will be accessible not only vital to meeting these real-time and procedures to the inter- to all agencies at the NYSIC but information-sharing needs. national law enforcement throughout the entire state. community. LEO functions as a conduit for FBI sensi- Since the NYSIC began in Endnotes August 2003, its role, responsi- tive but unclassifi ed (SBU) 1 bilities, and integration into the Offi ce of the Director of National intelligence information, Intelligence News Release No. 07-07, which supports all of the operations of agencies across Keynote Address, First Annual National the state have greatly increased. Fusion Center Conference, March 2007, FBI’s missions, strategic Other new programs and initia- Sandestin, Florida. goals, and objectives. LEO tives have expanded and will 2 U.S. Department of Justice (DOJ), Of- forms a cornerstone of the continue to increase the role of fi ce of Justice Programs, Bureau of Justice FBI’s Information Sharing Assistance, in collaboration with DOJ’s the NYSIC in law enforcement Global Justice Information Sharing Initia- Initiative. The LEO network operations throughout New tive and the U.S. Department of Homeland provides an Internet link York. Security, Fusion Center Guidelines: Law to international, federal, Enforcement Intelligence, Public Safety, state, local, and tribal police CONCLUSION and the Private Sector; retrieved from departments and agencies http://www.iir.com/global/guidelines.htm. September 11, 2001, 3 Ibid. throughout the world. LEO changed the thought process of 4 Previously called the Upstate New is a certifi ed and accredited law enforcement agency heads, York Regional Intelligence Center. system approved for the dissemination of SBU intel- ligence information.

32 / FBI Law Enforcement Bulletin The Bulletin Notes

Law enforcement officers are challenged daily in the performance of their duties; they face each challenge freely and unselfishly while answering the call to duty. In certain instances, their actions warrant special attention from their respective departments. The Bulletin also wants to recognize those situations that transcend the normal rigors of the law enforcement profession.

One evening, Sergeant Jamie Land of the Elizabethtown, Kentucky, Police Department responded to an emergency call involving a possible drowning at a local fi tness center. Several juveniles had climbed a fence and begun swimming in the outdoor pool. Upon arrival, Sergeant Land determined that one of the youths was at the bottom of the 14-foot deep end. Quickly, he removed his duty belt and dove into the pool. Because of the boy’s body weight, Sergeant Land could not retrieve him on the fi rst dive. However, he was successful on the second attempt. By that time, emergency medical technicians and another offi cer had arrived, and the additional personnel helped remove the boy from the water. Sergeant Land Sergeant Land continued with CPR until the juvenile was transported. Unfortunately, the young man died approximately 2 weeks later.

While on patrol, Offi cers Michael McKay and Michael Rastetter of the Canton, Ohio, Police Depart- ment observed a large amount of smoke. Subsequent- ly, they determined that the third fl oor of a home was fully engulfed in fl ames. After getting no response at the door, the offi cers forced entry. They evacuated four people from the fi rst fl oor and returned to rescue two teenagers asleep on the second fl oor. Because of the quick actions of Offi cers McKay and Rastetter, no one was seriously injured. Officer McKay Officer Rastetter

Nominations for the Bulletin Notes should be based on either the rescue of one or more citizens or arrest(s) made at unusual risk to an officer’s safety. Submissions should include a short write-up (maximum of 250 words), a separate photograph of each nominee, and a letter from the department’s ranking offi cer endorsing the nomination. Sub- missions should be sent to the Editor, FBI Law Enforcement Bulletin, FBI Academy, Madison Building, Room 201, Quantico, VA 22135. U.S. Department of Justice Periodicals Federal Bureau of Investigation Postage and Fees Paid Federal Bureau of Investigation FBI Law Enforcement Bulletin ISSN 0014-5688 935 Pennsylvania Avenue, N.W. Washington, DC 20535-0001

Offi cial Business Penalty for Private Use $300

Patch Call

The patch of the Nye County, Nevada, Sheriff’s Incorporated in 1772, the town of Hillsbor- Offi ce features part of the U.S. fl ag; 9 of the stars ough, New Hampshire, is named after Colonel and the 11 stripes are in memory of the infamous John Hill. The patch of its police department attacks. The remaining stars represent the heroes displays one of the stone arch bridges featured in of fl ight 93 and the three terrorist targets. The black the town, which boasts the largest number in New background behind some of the lettering honors England. The one pictured spans Gleason Falls. peace offi cers who have given their lives. The four Hillsborough is the birthplace of Franklin Pierce, rays of the sun in the state seal symbolize mining, the 14th president of the United States. His home, agriculture, industry, and scenery. built in 1804, today serves as a living museum.