2013: the FBI Story

Total Page:16

File Type:pdf, Size:1020Kb

2013: the FBI Story U.S. Department of Justice Federal Bureau of Investigation 2013 An examiner with the Terrorist Explosive Device Analytical Center (TEDAC)—a multi-agency operation established by the FBI in 2003—photographs parts used in an improvised explosive device. 2013 Hostage Rescue Team members debrief after a training exercise at their facility in Quantico, Virginia. 2013 The FBI Story I II 2013 The FBI Story A Message from FBI Director James B. Comey This past year, the FBI and its partners again addressed a wide range of national security and criminal threats. Together, we responded to numerous crisis incidents, such as the terrorist bombings of the Boston Marathon and the shootings at the Navy Yard in Washington, D.C. We confronted a continued surge of cyber attacks against targets ranging from everyday citizens to our largest and most successful businesses. And we stopped those who would strike at the heart of our communities—from violent gangs and white-collar criminals to child predators and corrupt public officials. A glimpse of the challenges we faced—and what we achieved together—can be found in this latest edition of The FBI Story, our annual collection of news and feature articles from the Bureau’s public website. Here you can read about some of our most successful recent major investigations and operations. These include a three-day nationwide sweep targeting child prostitution in which we identified and rescued more than 100 young victims and arrested more than 150 pimps; the rescue of a 5-year-old boy held captive in a heavily armed bunker in Alabama; and the uncovering of the largest domestic bribery and bid-rigging scheme in the history of federal contracting cases—one that siphoned more than $30 million dollars of taxpayer money. This edition of The FBI Story also highlights some of the Bureau’s remarkable capabilities. You will find a multi-part series on our elite Hostage Rescue Team—which marked its 30th anniversary this past year—and a feature on the Terrorist Explosive Device Analytical Center (TEDAC)—an FBI-established, multi- agency operation that celebrated its 10th anniversary in 2013. For the FBI, 2013 was a year of transition, as my predecessor, Robert S. Mueller, III, completed his extraordinary 12-year tenure at the helm of the Bureau. Director Mueller guided the FBI in the aftermath of the September 11th attacks and spearheaded the Bureau’s transformation into an intelligence- driven, threat-focused agency capable of confronting today’s global security threats. Director James Comey delivers remarks at the White House following his nomination to lead the FBI on June 21, 2013. Director Comey was sworn in on September 4. Following Bob Mueller is both a great challenge (White House Photo) and a tremendous privilege. In my first months as Director, I have been meeting with our partners in the law enforcement and intelligence communities both in the United States and abroad. I want to ensure that we maintain open lines of communication about the work we are doing in our respective communities so that we can continue to build strong relationships to carry us into the future. Those same open and honest lines of communication are equally crucial for our private sector partners and the citizens we serve. I look forward to working with all of you in the months and years to come. Thank you for your continued trust and support of the FBI, which we need to keep our country safe from harm. 2013 The FBI Story III IV 2013 The FBI Story January 4, 2013 Stopping a Suicide Bomber Jihadist Planned Attack on U.S. Capitol After months of consideration, a target was picked and a date was set: On February 17, 2012, Amine Mohamed El-Khalifi would strap on a bomb-laden vest and—in the name of jihad—blow himself up at an entrance to the U.S. Capitol. If anyone tried to stop him, he would shoot them with a MAC-10 assault weapon. That’s how the 29-year-old Northern Virginia resident During meetings with our undercover agent, El-Khalifi believed events would unfold that Friday morning handled weapons and explosives and said he would use when he emerged from his car—suicide vest on and a gun to kill people face-to-face. Finally, in January weapon by his side—in a parking garage near the 2012, after a test explosion in a West Virginia quarry Capitol. (carefully monitored by the JTTF), El-Khalifi decided to attack the Capitol building. It would be a suicide “He totally believed he was going to die in the attack, mission. and he seemed very much at peace with it,” said a special agent on our Joint Terrorism Task Force (JTTF) who Over the next month, the would-be bomber visited the investigated the case. “The day of the attack, he was Capitol building several times to conduct surveillance. happy.” On the morning of February 17, El-Khalifi drove to the parking garage and put on the suicide vest. As he walked What El-Khalifi didn’t know was that “Yusuf,” the toward the Capitol, he was quickly arrested. supposed al Qaeda operative he was conspiring with, was actually an undercover FBI agent—and the would-be Four months later, El-Khalifi pled guilty to attempted terrorist’s every move was being monitored by members of use of a weapon of mass destruction. In September, he our Washington Field Office JTTF. Although El-Khalifi was sentenced to 30 years in prison. believed he was going to kill many people that day in the “This case ended well, thanks to the work of the JTTF,” name of jihad, the explosives in his vest and the assault our agent said. “All our JTTF partners, including state weapon had been rendered inoperable by FBI technicians. and local law enforcement, played a key role. It’s scary to A Moroccan citizen who came to the U.S. more than consider this guy’s intentions,” the agent added. “He was a decade ago, El-Khalifi initially embraced Western totally rational. There was no disconnect from reality— culture. But in 2010 he began posting radical jihadist he was going to kill people and he felt that was the right messages online and expressed an interest in joining the way to express his religious beliefs.” mujahedeen to fight in Afghanistan. “As far as we know,” The agent noted that one of El-Khalifi’s original plans said the special agent who investigated El-Khalifi, “he was to take an automatic weapon to a shopping mall and became radicalized online.” shoot as many people as possible. “It’s frightening to think In January 2011, El-Khalifi met with individuals in what might have happened if he had not shown up on the a Washington suburb where jihad was endorsed and FBI’s radar.” weapons were displayed. By the end of 2011—after he had been introduced to our undercover agent—El-Khalifi was actively seeking to join an armed extremist group, and he suggested bombing attacks on targets ranging from a local synagogue to a restaurant frequented by U.S. military officials. 2013 The FBI Story 1 January 8, 2013 Left: One of six CART mobile labs with state-of-the-art capabilities for acquiring, processing, and analyzing digital evidence…even while the vehicle is in motion. terabytes of data. To put that last figure into perspective, it’s widely believed that the total printed content in the Library of Congress is equal to about 10 terabytes of data. CART examiners are experts at extracting data from digital media…even when the media is damaged by the forces of nature or by defendants attempting to prevent data from being recovered. The cases that CART examiners work span the gamut of FBI program areas: from cyber crimes and computer Piecing Together intrusions to violent crimes, financial crimes, organized crime, and national security matters. And once they have Digital Evidence finished their forensic work, CART examiners are also available to testify in court as expert witnesses on their The Computer Analysis findings. Response Team Because we come across computers and other digital media so often in the course of our investigative work, In a case involving the round-up of dozens of suspects our CART examiners can’t possibly handle every piece of indicted on public corruption and other charges, media. That’s why CART created a basic digital evidence investigators were faced with processing large numbers training course and developed easy-to-use examination of seized cell phones, desktop computers, and laptops tools for field investigators—to give them the technical belonging to the suspects. In another case, key evidence and legal knowledge they need to process simpler and against a terror suspect arrested for attempted use of a more basic digital evidence from their cases without weapon of mass destruction included data found on his altering or damaging the data—which allow CART computer. And after a U.S. congresswoman was wounded examiners to focus on more technically complex cases. and six people killed in Arizona, vital evidence was found on security camera footage, computers, and cell phones. CART on the go. While much of CART’s work is done in stationary facilities in the field or back at our national Reflecting a trend that has become increasingly Headquarters, we also have six mobile CART laboratories commonplace for law enforcement, all three of these around the country. These mobile labs are especially cases involved the need to recover digital evidence. And valuable when time is of the essence, enabling digital our Computer Analysis Response Team, or CART, is the evidence to be examined on the spot.
Recommended publications
  • FBI Academy Training Facility A&E Study………………………………
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II. Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification…………………………………………………... 4-1 A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes B. Counterterrorism/Counterintelligence ……………………………………… 4-14 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes C. Criminal Enterprises and Federal Crimes…………………………………… 4-36 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes D. Criminal Justice Services…………………………………………………….. 4-59 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes V. Program Increases by Item………………………………………………… 5-1 Domain and Operations Increases Comprehensive National Cybersecurity Initiative………………………... 5-1 Intelligence Program………………………………………………….…... 5-6 National Security Field Investigations……….………………………….... 5-13 Mortgage Fraud and White Collar Crime………………………………… 5-15 WMD Response………………………………………………………..…. 5-19 Infrastructure Increases
    [Show full text]
  • 80 Years of Print December 2012 Volume 81 Number 12
    December 2012 %#-7)9;4-5;6.<:;1+-+- 767D3>GD73GA8 @H7EF;93F;A@93F;A@ December 2011 Employee Wellness May 2011 September 2001 Addressing School Violence 80 Years of Print December 2012 Volume 81 Number 12 United States Department of Justice Federal Bureau of Investigation Washington, DC 20535-0001 Robert S. Mueller III Director Contributors’ opinions and statements Features should not be considered an endorsement by the FBI for any policy, program, or service. The attorney general has determined Vigilance Fatigue in Policing Personnel tasked with processing large that the publication of this periodical By Meredith Krause amounts of data, identifying risks, and is necessary in the transaction of the 3 responding to perceived threats can lose public business required by law. Use of funds for printing this periodical has focus as a result of information overload been approved by the director of the and performance-related pressure. Office of Management and Budget. The FBI Law Enforcement Bulletin Armored Car Industry Agencies have an important role in (ISSN-0014-5688) is published monthly by the Federal Bureau of Reciprocity Act and Local ensuring that armored car crew members Investigation, 935 Pennsylvania 19 carry weapons legally and as needed. Avenue, N.W., Washington, D.C. Law Enforcement 20535-0001. Periodicals postage paid By Jeffrey T. Wennar at Washington, D.C., and additional mailing offices. Postmaster: Send address changes to Editor, FBI Law Enforcement Bulletin, FBI Academy, Quantico, VA 22135. Departments Editor John E. Ott Associate Editors 1 Bulletin History 18 Leadership Spotlight Eric A. D’Orazio Linda L. Fresh Doing the “Right Thing” David W.
    [Show full text]
  • Case 3:07-Cr-00057-MRK Document 6 Filed 03/21/2007 Page 1 of 9
    Case 3:07-cr-00057-MRK Document 6 Filed 03/21/2007 Page 1 of 9 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA : Case No: : : VIOLATIONS: : : 18 U.S.C. § 2339A (Providing Material v. : Support to Terrorists) : : 18 U.S.C. § 793(d) (Communicating : National Defense Information to Persons not : Entitled to Receive it) HASSAN ABUJIHAAD, : a/k/a PAUL R. HALL : 18 U.S.C. § 2 I N D I C T M E N T The Grand Jury charges that: INTRODUCTION 1. From on or about December 20, 1997, through on or about January 25, 2002, HASSAN ABUJIHAAD, a/k/a PAUL R. HALL (“ABUJIHAAD”), was an enlisted member of the United States Navy. From on or about July 1, 1998, through on or about January 10, 2002, ABUJIHAAD was assigned to a United States Navy destroyer named the U.S.S. Benfold, where his primary position was Signalman. In March and April 2001, the U.S.S. Benfold was part of a United States Navy Battle Group directed to transit from California to the Persian Gulf region. 2. On January 6, 1998, in connection with his duties in the United States Navy, ABUJIHAAD was approved by the Department of the Navy Central Adjudication Facility (“DONCAF”) for access to information classified at the “Secret” level pursuant to Executive Order 12,958, as amended by Executive Order 13,292. Case 3:07-cr-00057-MRK Document 6 Filed 03/21/2007 Page 2 of 9 3. Pursuant to Executive Order 12,958, as amended by Executive Order 13,292, national security information may be classified as, among other things, “Secret.” The designation “Secret” applies to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security.
    [Show full text]
  • I a DYNAMO of VIOLENT STORIES: READING the FEMINICIDIOS of CIUDAD JUÁREZ AS NARRATIVES
    A DYNAMO OF VIOLENT STORIES: READING THE FEMINICIDIOS OF CIUDAD JUÁREZ AS NARRATIVES by Roberto Ponce-Cordero Bachelor in History, Literature, and Media Theory, University of Hamburg, 2003 Master of Arts in Hispanic Languages and Literatures University of Pittsburgh, 2009 Submitted to the Graduate Faculty of the Kenneth P. Dietrich School of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Hispanic Languages and Literatures University of Pittsburgh 2016 i UNIVERSITY OF PITTSBURGH KENNETH P. DIETRICH SCHOOL OF ARTS AND SCIENCES DEPARTMENT OF HISPANIC LANGUAGES AND LITERATURES This dissertation was presented by Roberto Ponce-Cordero It was defended on December 8, 2016 and approved by Hermann Herlinghaus, Ph.D., University of Freiburg Juan Duchesne-Winter, Ph.D., University of Pittsburgh John Beverley, Ph.D., University of Pittsburgh Dissertation Director: Áurea María Sotomayor-Miletti, Ph.D., University of Pittsburgh ii Copyright © by Roberto Ponce-Cordero 2016 iii A DYNAMO OF VIOLENT STORIES: READING THE FEMINICIDIOS OF CIUDAD JUÁREZ AS NARRATIVES Roberto Ponce-Cordero, Ph.D. University of Pittsburgh, 2016 Over the past twenty-three years, several hundreds of women have been kidnapped, tortured and murdered with absolute impunity in Ciudad Juárez, an urban Moloch on the Mexican- American border. Because of these crimes, the city has become a symbol for all of what is wrong with globalization, transnational exploitation and the Latin American form of masculine domination known as machismo. Terms like femicidios or feminicidios have been coined in order to express that women, far from being this crime wave’s collateral damage, are rather their specific target, and that their sex is the factor that gives this vortex of violence its inner logic and coherence.
    [Show full text]
  • Eastwood, Dicaprio Try to Capture First FBI Director's Life in 'J. Edgar'
    09 November 2011 | voaspecialenglish.com Eastwood, DiCaprio Try to Capture First FBI Director's Life in 'J. Edgar' AP From left, Leonardo DiCaprio, Armie Hammer and director Clint Eastwood at the premiere of "J. Edgar" last week in Los Angeles (You can download an MP3 of this story at voaspecialenglish.com) DOUG JOHNSON: Welcome to AMERICAN MOSAIC in VOA Special English. (MUSIC) I’m Doug Johnson. Today we play music from American Idol winner Scotty McCreery ... And we answer a question about American whiskey ... But first, it is history at the movie theater where a new film opens about former law enforcement chief J. Edgar Hoover. "J. Edgar" DOUG JOHNSON: The movie "J. Edgar" opens across America today. The film is about J. Edgar Hoover, the first director of the Federal Bureau of Investigation. Hoover was a complex and powerful man. He helped develop the FBI into an efficient and effective crime solving agency. However, in later years, many people 2 questioned the methods used by Hoover and his investigators. Bob Doughty tells more about the man and the movie. BOB DOUGHTY: Clint Eastwood directed the movie "J. Edgar." He grew up in the time when, in his words, "Hoover was always top cop." Eastwood said he had heard different stories about the former FBI director. Some of them were very critical. But Eastwood said anybody who stays in a job as long as Hoover did is going to create some enemies. J. Edgar Hoover was the leader of the FBI and the agency it developed from for almost fifty years.
    [Show full text]
  • Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution
    William & Mary Bill of Rights Journal Volume 9 (2000-2001) Issue 3 Article 7 April 2001 Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution Karan R. Singh Follow this and additional works at: https://scholarship.law.wm.edu/wmborj Part of the Law Enforcement and Corrections Commons Repository Citation Karan R. Singh, Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution, 9 Wm. & Mary Bill Rts. J. 673 (2001), https://scholarship.law.wm.edu/wmborj/vol9/iss3/7 Copyright c 2001 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmborj TREADING THE THIN BLUE LINE: MILITARY SPECIAL-OPERATIONS TRAINED POLICE SWAT TEAMS AND THE CONSTITUTION The increasing use of SWAT teams and paramilitaryforce by local law enforcement has been thefocus of a growingconcern regardingthe heavy-handed exercise of police power. Critics question the constitutionality ofjoint-training between the military and civilian police, as well as the Fourth Amendment considerationsraised by SWAT tactics. This Note examines the history, mission, and continuing needfor police SWAT teams, addressingthe constitutionalissues raisedconcerning training and tactics. It explains how SWATjoint-training with the military is authorized by federal law and concludes that SWAT tactics are constitutionallyacceptable in a majority of situations. Though these tactics are legal andconstitutionally authorized, this Note acknowledges the validfearscritics have regarding the abuse of such police authority, and the limitations of constitutionaltort jurisprudence in adequately redressingresulting injuries. INTRODUCTION Americans awoke on the morning of April 23,2000 to news images seemingly taken from popular counterterrorist adventure movies.
    [Show full text]
  • Long-Term Missing Child Guide for Law Enforcement
    Long-term missing child guide for law enforcement: Strategies for finding long-term missing children Long-term missing child guide for law enforcement: Strategies for finding long-term missing children 2016 Edited by Robert G. Lowery, Jr., and Robert Hoever National Center for Missing & Exploited Children® www.missingkids.org 1-800-THE-LOST® or 1-800-843-5678 ORI VA007019W Copyright © 2016 National Center for Missing & Exploited Children. All rights reserved. This project was supported by Grant No. 2015-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. This document is provided for informational purposes only and does not constitute legal advice or professional opinion about specific facts. Information provided in this document may not remain current or accurate, so recipients should use this document only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. CyberTipline®, National Center for Missing & Exploited Children®, 1-800-THE-LOST® and Project ALERT® are registered trademarks of the National Center for Missing & Exploited Children. LONG-TERM MISSING CHILD GUIDE FOR LAW ENFORCEMENT - 2 Contents Acknowledgments.....10 Letter from John Walsh.....15 Foreword by Patty Wetterling.....16 Chapter 1: Introduction by Robert G. Lowery, Jr......18 Quick reference.....18 We are finding more long-term missing children now.....19 Are we doing enough?.....21 Chapter 2: Overview of missing children cases by Robert G.
    [Show full text]
  • High Court Judgment Template
    Case No: CO/5160/2014 Neutral Citation Number: [2015] EWHC 2354 (Admin) IN THE HIGH COURT OF JUSTICE QUEEN'S BENCH DIVISION ADMINISTRATIVE COURT Royal Courts of Justice Strand, London, WC2A 2LL Date: 07/08/2015 Before: THE HONOURABLE MR JUSTICE CRANSTON - - - - - - - - - - - - - - - - - - - - - Between: THE COMMISSIONER OF THE POLICE OF THE Claimant METROPOLIS - and - SYED TALHA AHSAN Defendant - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mr Tom Little (instructed by the Metropolitan Police Legal Service) for the Claimant Mr Daniel Squires (instructed by Birnberg Peirce & Partners) for the Defendant Hearing dates: 24/07/2015 - - - - - - - - - - - - - - - - - - - - - Judgmen tMr Justice Cranston: Introduction: 1. This is an application by the Commissioner of Police of the Metropolis (“the Commissioner”) for an order to impose notification requirements for a period of 15 years on Syed Talha Ahsan (“Mr Ahsan”) under the Counter-Terrorism Act 2008 (“the 2008 Act”). In 2013, he was convicted in the United States of conspiracy to provide material assistance for terrorism through his involvement in a website. He has now returned to the United Kingdom. The notification order will require him for that period to attend police stations to provide, and update, information about his living arrangements and to provide details about his travel plans, for which permission can be refused. Breach of the requirements is punishable with imprisonment of up to 5 years. 2. Notification requirements have been imposed in many cases when persons have been convicted in the UK of terrorist-related offences. This is the first case in which a notification order has been contested in respect of a person convicted outside the UK of a corresponding foreign offence.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Federal Bureau of Investigation Hearing
    FEDERAL BUREAU OF INVESTIGATION HEARING BEFORE THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION JULY 26, 2007 Serial No. 110–86 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 37–010 PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 11:11 Jul 09, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 H:\WORK\FULL\072607\37010.000 HJUD1 PsN: DOUGA COMMITTEE ON THE JUDICIARY JOHN CONYERS, JR., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ROBERT C. ‘‘BOBBY’’ SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California WILLIAM D. DELAHUNT, Massachusetts CHRIS CANNON, Utah ROBERT WEXLER, Florida RIC KELLER, Florida LINDA T. SA´ NCHEZ, California DARRELL ISSA, California STEVE COHEN, Tennessee MIKE PENCE, Indiana HANK JOHNSON, Georgia J. RANDY FORBES, Virginia BETTY SUTTON, Ohio STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona
    [Show full text]
  • Behavioral Science Unit
    Behavioral Science Unit Behavioral Science Unit (BSU) was one of the original instructional components of the FBI's Training Division at Quantico, Virginia. Its mission was to develop and provide programs of training, research, and consultation in the behavioral andsocial sciences for the Federal Bureau of Investigation and law enforcement community that would improve or enhance their administration, operational effectiveness, and understanding of violent crime. The BSU was established in 1972 at the FBI Academy, and was disbanded in 2014. Through its legacy of training, research, and consultation activities, the BSU developed techniques, tactics, and procedures that have become a staple of behavioral-based programs that support the law enforcement, intelligence, and military communities. It is here where the term "serial killer" was coined and where criminal investigative analysis and "profiling" were developed. Many of these programs eventually developed into stand-alone programs, units, and centers such as the National Center for the Analysis of Violent Crime (NCAVC), Behavioral Analysis Unit (BAU), Undercover Safeguard Unit, Crisis Negotiation Unit, Hostage Rescue Team, and Employee Assistance Unit. The mission of the BSU was to be the premier unit for developing and facilitating relevant programs of training, research, and consultation in the behavioral sciences for the FBI workforce, including the law enforcement, intelligence, and military communities that will improve their effectiveness in furtherance of the strategic priorities of the FBI. This is accomplished through the creation of innovative bodies of knowledge in specialty areas and applied research on significant behavioral science issues for use in training and consultation in support of academic, program, and operational matters.
    [Show full text]
  • Sports Sports
    FREE PRESS Page 8 Colby Free Press Monday, August 1, 2005 SSSPORTSPORTS Ready for a clean sweep TV LISTINGS sponsored by the COLBY FREE PRESS WEEKDAYS AUGUST 2 - AUGUST 8 6AM 6:30 7 AM 7:30 8 AM 8:30 9 AM 9:30 10 AM 10:30 11 AM 11:30 KLBY/ABC Good Morning Good Morning America The Jane Pauley The View Million- News Hh Kansas Show aire KSNK/NBC News Cont’d Today Live With Regis Paid Paid Lj and Kelly Program Program KBSL/CBS News Cont’d News The Early Show The 700 Club The Price Is Right The Young and the 1< NX Restless K15CG BBC Yoga Body Caillou Beren. Barney- Sesame Street Dragon Beren. Mister Teletub- d World Electric Bears Friends Tales Bears Rogers bies ESPN SportsCenter SportsCenter Sports- Varied SportsCenter SportsCenter Baseball NFL Live O_ Center Tonight USA Coach Coach Movie Varied Programs P^ TBS Saved Saved Movie Varied Programs Dawson’s Creek Dawson’s Creek Becker Becker P_ by Bell by Bell WGN Chang- Believer Happy Happy Hillbil- Hillbil- Matlock Rockford Files Magnum, P.I. Pa ing Voice Days Days lies lies TNT The Pretender Angel Charmed ER ER Judging Amy QW DSC Paid Paid Paid Paid Varied Programs Surprise by Design Go Ahead, Make QY Program Program Program Program My Dinner A&E Varied Programs Third Watch Varied Programs Investigative City Confidential Q^ Reports HIST Varied Programs Q_ NICK Oddpar- Oddpar- Spon- Spon- Dora the Blue’s Backyar- Dora the Blue’s Lazy- Rugrats Chalk- Rl ents ents geBob geBob Explorer Clues digans Explorer Clues Town Zone DISN Breakfast With Higgly- JoJo’s The Charlie Rolie Koala Doodle- The Higgly- JoJo’s R] Bear town Circus Wiggles & Lola Polie Brothers bops Wiggles town Circus FAM Battle B- Spider- Power Power Two of a Living The 700 Club Gilmore Girls Full Full R_ Daman Man Rangers Rangers Kind the Life House House HALL New Paid The Waltons Dr.
    [Show full text]