Professional Documents
Culture Documents
Volume 76
Number 12
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
Robert S. Mueller III
Director
Contributors opinions and statements
should not be considered an
endorsement by the FBI for any policy,
program, or service.
The attorney general has determined
that the publication of this periodical
is necessary in the transaction of the
public business required by law. Use
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget.
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
monthly by the Federal Bureau of
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
Enforcement Bulletin, FBI Academy,
Madison Building, Room 201,
Quantico, VA 22135.
Editor
John E. Ott
Features
Countering Violent
Islamic Extremism
By Carol Dyer, Ryan E. McCoy,
Joel Rodriguez, and
Donald N. Van Duyn
Operation Smokescreen
By Robert Fromme and
Rick Schwein
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris
12
20
This
case
illustrates
that terrorists
Smaller
law
enforcement
agencies can
do
not
operate
onlycrime
in major
citiesreports
reap
bene
ts from
analysis
but
in similar
small towns.
andalso
maps
to those derived by
larger ones.
28
Departments
Art Director
Denise Bennett Smith
Assistant Art Director
Stephanie L. Lowe
Staff Assistants
Cynthia H. McWhirt
Gabriel E. Ryan
Arlene F. Smith
This publication is produced by
members of the Law Enforcement
Communication Unit, Training Division.
Issues are available online at
http://www.fbi.gov.
E-mail Address
leb@fbiacademy.edu
Cover Photo
Digital Stock
Send article submissions to Editor,
FBI Law Enforcement Bulletin,
FBI Academy, Madison Building,
Room 201, Quantico, VA 22135.
ISSN 0014-5688
64207.indd 4
10 Book Review
Bomb and Bombings
18 Unusual Weapon
Plastic Spike
26 Bulletin Reports
Computer-Based Training
Crime Victims
Juvenile Justice
Education
19 Leadership Spotlight
Fellowship
Editors Note:
Due to the special contents of this issue, the 2007 subject and author
indexes, which usually would appear in the December issue, will be in our
January 2008 issue. Also, the second part of the article, Program Evaluations:
Improving Operational Effectiveness and Organizational Efciency, will be
moved to our January issue.
This issue includes our last book review. As of our January 2008 issue,
we no longer will publish book reviews.
USPS 383-310
10/20/2007 2:02:25 AM
Photos.com
Focus on Terrorism
or the past decade, al Qaeda has been the driving force of terrorismmoving
thousands of people through training camps in Afghanistan and providing the
motivation, the money, and the management of worldwide attacks. Since the
terrorist attacks on September 11, 2001, U.S. and foreign services have made tremendous progress in weakening al Qaeda. Yet, the group has been resilient at rebuilding
its leadership and creating new safe havens, and, just as dangerous, its message of
violence also has inspired followers with no formal links to the group. We have increasingly seen the emergence of individuals and groups inspired by al Qaeda that will
carry out attacks on their own soil.
Homegrown terrorists or extremists, acting in concert with other like-minded individuals or as lone wolves, have become one of the gravest domestic threats we face.
Largely self-recruited and self-trained, these terrorists may have no direct connection
to al Qaeda or other terrorist groups.
Identifying these individuals and groups is a tremendous challenge, and the role of
our partners in state and local law enforcement is critical in these efforts. Local police
ofcers, who are out on the streets, are on the frontline of the war on terrorism. They
often may be the rst to detect potential terrorists. The vast jurisdiction of state, local,
and tribal ofcers brings invaluable access to millions of people and resources, which
can help protect the nation and its citizens. The information gathered on the street and
in our communities is one of the most powerful tools we have.
Understanding the radicalization process also proves vital to our efforts of identifying terrorists. What are the early indicators of those who demonstrate a potential
for violence? How does an individual become a radical extremist, and how does an
extremist then become a terrorist?
To help answer these questions, the International Association of Chiefs of Police
(IACP) Committee on Terrorism requested that this issue of the FBI Law Enforcement Bulletin be devoted to terrorism. With the foresight to focus on terrorism before
it came to the forefront of American concerns, the committee rst undertook this effort in the March 1999 issue of the magazine. Because the terrorist threat has evolved
dramatically during the past 8 yearsespecially in the wake of September 11the
committee determined that it was time to publish another focus issue and enhance our
understanding of emerging terrorist threats by focusing on homegrown terrorism and
radicalization. We hope that these four articles, contributed by IACP Committee on
Terrorism members, will give readers a clear understanding of the challenges posed
by homegrown terrorism and the importance of a coordinated response to the terrorist
threats we face.
December 2007 / 1
64207.indd 5
10/20/2007 2:02:55 AM
64207x.indd 2
11/2/2007 4:33:03 PM
Countering Violent
Islamic Extremism
A Community Responsibility
By CAROL DYER, RYAN E. MCCOY, JOEL RODRIGUEZ,
and DONALD N. VAN DUYN
December 2007 / 3
64207.indd 7
10/20/2007 2:03:36 AM
Acceptance
seeking, a form of
extrinsic conversion,
is a fundamental
human motivation.
64207.indd 8
10/20/2007 2:03:54 AM
Ronald Jeffers
December 2007 / 5
64207.indd 9
10/20/2007 2:04:15 AM
Motivation/Conversion
Jilted believer
Acceptance seeker
Protest conversion
Faith reinterpretation
Stimulus
Self
Other
Opportunity
Mosque
Internet
School
Employment
Prison
Conferences
INDOCTRINATION
Intensied group
bonds
Social
Terrorist
Increased vetting
opportunities
Training camp
Surveillance
Finance
Individual convinced
that action is required
to support the cause.
ACTION
Individual knowingly
engages in extremist
activity.
Operational
activities of
Facilitation
Recruitment
Financing
include:
Preparation
Planning
Execution
CONVERSION/
REINTERPRETATION
ACCEPTANCE
CONVICTION
TERRORISM
NO ACTION
PROPENSITY FOR
ACTION
IMPLEMENT ACTION
Identication
In this stage, individuals
identify themselves with a particular extremist cause and accept a radicalized ideology that
justies violence or other criminal activity against perceived
enemies. Accepting the cause
leads people to become increasingly isolated from their former lives. New converts often
seek and follow guidance from
imams, more senior followers,
on how to live every detail of
the religion, becoming more
committed to the newfound
64207x.indd 6
11/2/2007 4:34:40 PM
Recruitment
plays an important
role in any terrorist
organization.
Action
The nal stage consists of
supporting or engaging in terrorist activities. Although this
action can be violent or nonviolent (e.g. nancing), it always
intends to inict damage on the
enemy. Some individuals who
reach this stage will attempt to
participate in a terrorist attack.
Every action has three
stages: preparation, planning,
and execution. During any of
these, recruits can try to stop
participating. However, they
may be so caught up in the
groups activities that they will
engage in behaviors they otherwise would not consider. Attack
preparations can include target
selection, casing, nancing, and
December 2007 / 7
64207.indd 11
10/20/2007 2:04:54 AM
Any successful
effort must involve
a multifaceted
approach.
64207.indd 12
10/20/2007 2:05:30 AM
Endnotes
1
The model the authors present in this
article was derived from both classied
and open source information and academic
literature and reects events that occurred
up until April 2006.
2
Greater Syria encompasses the present-day states of Jordan, Israel, Lebanon,
and Syria before those states were formed;
retrieved from http://lcweb2.loc.gov/frd/cs/
syria/sy_glos.html.
3
Andrew Kohut and Bruce Stokes,
America Against the World: How We Are
Different and Why We Are Disliked (New
York, NY: Times Books, 2006).
4
http://pewglobal.org/reports/display.
php?ReportID=253
5
The Institute for Intelligence and Special Operations, otherwise known as the
Mossad, has been appointed by Israel to
collect information, analyze intelligence,
and perform special covert operations
The Bulletins
E-mail Address
Digital Vision
he FBI Law Enforcement Bulletin staff invites you to communicate with us via e-mail. Our Internet
address is leb@fbiacademy.edu.
We would like to know your
thoughts on contemporary law enforcement issues. We welcome your
comments, questions, and suggestions
about the magazine. Please include
your name, title, and agency on all
e-mail messages.
Also, the Bulletin is available for
viewing or downloading on a number
of computer services, as well as the
FBIs home page. The home page
address is http://www.fbi.gov.
December 2007 / 9
64207x2.indd 9
11/5/2007 1:56:21 PM
Book Review
64207.indd 14
10/20/2007 2:06:17 AM
Various types of initiators, detonators, switches, timing devices, and booby traps, as well as
time, action, motion, command, and remotecontrol detonation methods are discussed. As
a bomber may employ just about any type of
mechanical or electrical switching method, the
material in this book proves invaluable to any
professional that may come into contact with
such a device. The book also covers bomb
threats and their consequences, along with
protection of individuals, buildings, vehicles,
public and private conveyances, planes, trains,
and ships.
Subscribe Now
Order Processing
Toll Free:
Code:
bookstore.gpo.gov
DC Area:
3491
Fax:
866 5121800
202 5121800
202 5122104
YES, please send ______ subscriptions to the FBI Law Enforcement Bulletin. (FBIEB) at $53.00
each ($74.20 foreign) per year. Price includes regular shipping and handling and is subject to change.
The total cost of my order is $___________.
Check method of payment:
Personal name
Company name
VISA
MasterCard
Discover/NOVUS
American Express
Street address
(expiration date)
AUTHORIZING SIGNATURE
03/07
December 2007 / 11
64207.indd 15
10/20/2007 2:06:35 AM
Photos.com
64207.indd 16
10/20/2007 2:06:58 AM
of the faithful.8 Combat represents one of the central metaphors of the history of early
Islam, as the Prophet Muhammad and his followers battled
and ultimately triumphed over
those they considered idolaters
and unbelievers.9 The canon
of Islamic teachings stresses
that all Muslims must defend
dar al-islam (the land of Islam)
from moral or spiritual corruption originating in dar al-harb
(the land of war) where Islamic
law does not prevail.10 Despite
this, Islamic law and tradition
always have favored defensive
over offensive war; the importance of mercy to enemies; and
the inviolability of women,
children, and noncombatants.11
Additionally, Islamic teachings
often stress the importance of
the greater (spiritual) jihad over
the lesser (physical) jihad.12
In determining
appropriate
terminology, we
must remain mindful
of words and their
nuances.
December 2007 / 13
64207x.indd 13
11/2/2007 4:35:47 PM
To correctly
name enemies,
we must learn more
about them.
If both interpretations of
jihad are correct, they prove
highly problematic from policing and intelligence viewpoints.
If we use the term jihad to
describe either terrorist activity
or the terrorist mind-set, we
risk alienating those Muslims
for whom jihad describes
either a highly personalized
internal struggle or an effort to
effect positive change within
or beyond the Muslim community. We effectively brand
them as dangerous radicals, if
not as terrorists, perpetuating
stereotypes that equate Islam
and its adherents with terrorism.
On the other hand, the combination of jihad with violence in
the name of faith (or a political
creed disguised as faith) is
also a reality. But, by referring
to extremists as jihadisa
positive component of the
Muslim historical and cultural
experiencewe also recognize
their actions as being in the
path of God and, therefore,
legitimate.15 In opposing jihad
and its practitioners, we again
risk characterizing ourselves as
the enemies of Islam. Not only
does this empower extremists
but it also conveys a strong
message that we are engaged in
a strugglenot with extremism
but to suppress Islam itself.
Identifying Accurate
Terminology
To correctly name enemies,
we must learn more about them:
64207.indd 18
10/20/2007 2:07:33 AM
December 2007 / 15
64207.indd 19
10/20/2007 2:07:52 AM
An understanding
of the nuances
of concepts like
jihad is critical.
Seeking
Alternatives
An understanding of the
nuances of concepts like jihad is
critical. However, any attempt
to promote one understanding
or interpretation over another
may be futile because classical
texts do not necessarily speak
for contemporary Muslims, and
individual Muslims ultimately
will make up their own minds.24
With the extremist mind-set, we
address a cultural and emotional
64207.indd 20
10/20/2007 2:08:10 AM
Photodisc
December 2007 / 17
64207x.indd 17
11/2/2007 4:37:54 PM
16
25
Unusual Weapon
Plastic Spike
Law enforcement officers
should be aware of this plastic
spike (dagger). Offenders may attempt to use this unusual weapon.
And, magnetometers cannot detect it because of its composition.
64207x.indd 18
11/2/2007 4:38:29 PM
Leadership Spotlight
December 2007 / 19
64207x2.indd 19
11/5/2007 1:57:07 PM
Photos.com
Operation
Smokescreen
A Successful
Interagency Collaboration
By ROBERT FROMME and RICK SCHWEIN, M.A.
64207.indd 24
10/20/2007 2:09:45 AM
December 2007 / 21
64207x.indd 21
11/2/2007 4:48:15 PM
Each organization
worked the aspects
of the investigation
uniquely suited
to their areas of
expertise.
The Collaboration
By the time Detective
Fromme had the fateful meeting
with the FBI agents in 1999, the
agencies with mutual investigative interests in the subjects had
begun formally sharing information. At that point, the scope
of the investigation clearly was
so large that no single organization or agency could effectively
piece everything together. What
emerged was an unprecedented
collaborative effort involving
more than 16 separate local,
state, federal, and international
law enforcement agencies and
intelligence services. Each organization worked the aspects of
64207.indd 26
10/20/2007 2:10:49 AM
December 2007 / 23
64207.indd 27
10/20/2007 2:11:07 AM
64207.indd 28
10/20/2007 2:11:24 AM
Ultimately,
the investigation led
to the indictment of
26 individuals.
Endnotes
1
December 2007 / 25
64207.indd 29
10/20/2007 2:11:43 AM
Bulletin Reports
Computer-Based Training
The National Institute of Justice offers Incident Commander: A Training Simulation for Public Safety Personnel, a CD-ROM that provides simulation training for
public safety incident commanders in developing action plans and implementing
them in various crisis scenarios through resource allocation and the assignment of
tasks. The training can be done alone or with up to 16 players. Each participant can
choose to manage squads from one or more agencies; take control of one or more
incident command sections; or be an observer. After a tutorial on how to manage an
emergency-response scenario through the provided software and computer tools,
crisis situations are addressed from the perspective of the Incident Commander System. The scenarios portrayed include a school hostage situation, a courthouse bomb
threat, a chemical spill, and a severe storm. Each situation offers different challenges
to the players. Some scenarios emphasize law enforcement. In others, reghting is
the greatest challenge. Some may confront players with downed power lines, watermain breaks, noxious chemicals, and the media. Recognizing the greatest threats and
dealing with them by effective use of the Incident Command System and appropriate
deployment of responders are the keys to success and a high score in the training. Crisis scenarios are managed through detailed maps displayed on the computer screen.
These maps include icons that can be selected and moved to perform certain tasks
at various locations. Copies of
the program can be obtained by
contacting the National CrimiCrime Victims
nal Justice Reference Service
The Ofce for Victims of Crime presents Serving
at 800-851-3420 or http://www.
Crime
Victims with Disabilities, a DVD containing two
ncjrs.gov. Also, authorized
popular
award-winning videos originally produced in Depublic safety agencies can
cember 2002 and no longer available in VHS form. The
register to receive the software
Time Is Now helps crime victim service providers reach
free of charge at http://www.
out and serve people with disabilities. Meet Us Where
incidentcommander.net/.
We Are presents rst-person accounts of how crime
affects people with disabilities and educates disability
service providers and people with disabilities about crime
victims rights and resources. These videos, along with
transcripts, and DVD copies can be obtained by contacting
the National Criminal Justice Reference Service at 800851-3420 or http://www.ncjrs.gov.
64207.indd 30
10/20/2007 2:12:02 AM
Juvenile Justice
The Ofce of Juvenile Justice and Delinquency Prevention introduces Tool Kit
for Creating Your Own Truancy Reduction Program, which serves as a resource
for communities striving to address the problem. The rst chapter provides an
overview of the issue, as well as information pertaining to the national problem of
truancy, including the extent of the issue, its short- and long-term consequences,
contributing factors, and the types of efforts that have helped to improve school
attendance. The next chapter examines how truancy programs are dened, as
well as the elements of evaluation design and data collection methods. This is
followed by guidelines for program development. The third chapter begins with
school policies that engage students and families. Those discussed range from
modifying school grading policies related to attendance to creating alternatives to
out-of-school suspension and expulsion. The fourth, and nal, chapter provides
practical ideas for managing truancy cases, improving school attendance, increasing parent and community involvement, creating alternatives to juvenile detention, and working with other agencies to keep kids in school. This report is available online at http://ojjdp.ncjrs.gov/publications/truancy_toolkit.html or through
the National Criminal
Justice Reference Service at 800-851-3420 or
Education
http://www.ncjrs.gov.
Addressing Shortfalls in Forensic Science Education, a
fact sheet presented by the National Institute of Justice, describes the benets of an accredited forensic science education program. Many crime labs nd that new graduates from
these programs are not properly trained. A committee led by
the American Academy of Forensic Science has developed
an evaluation and accreditation process to help universities
improve their curriculum. An accredited curriculum gives employers, such as crime lab directors, standard criteria to assess
whether an applicant is qualied. This report is available at
http://www.ncjrs.gov/pdfles1/nij/216886.pdf or by contacting
the National Criminal Justice Reference Service at 800-8513420 or http://www.ncjrs.gov.
December 2007 / 27
64207x.indd 27
11/2/2007 4:52:41 PM
Photodisc
64207.indd 32
10/20/2007 2:12:38 AM
DEFINITION OF
A FUSION CENTER
A fusion center is a collaborative effort of two or
more agencies that provide
resources, expertise, and information to the center with the
goal of maximizing their ability
to detect, prevent, investigate,
and respond to criminal and
terrorist activity.2 Although
fusion centers may vary from
state to state, most include
state and local law enforcement
departments, public health and
safety organizations, and federal
agencies, such as the FBI, U.S.
Department of Homeland Security, and the Bureau of Alcohol,
Tobacco, Firearms, and Explosives. Bridging the gap between
state and local agencies and the
federal government, fusion centers facilitate real-time information sharing. Together, ofcers,
agents, and intelligence analysts
work side by side collecting
intelligence, analyzing criminal
trends and terrorist threats, and
disseminating information.
But, fusion centers provide
more than just timely intelligence. They allow agencies to
see both the macro and micro
view of the threat environment.
Understanding the connections beyond state and national
borders enhances the ability to
predict and prevent crime and
terrorism, rather than just reacting to such incidents. It also
helps narrow the gaps between
A fundamental part
of these efforts
and a focal point for
sharing information
are state fusion
centers.
Colonel Johnson, deputy superintendent in charge of eld command for the New
York State Police, currently serves as the vice chair of the U.S. Department of
Justices Global Justice Information Sharing Initiative Advisory Committee.
December 2007 / 29
64207.indd 33
10/20/2007 2:13:04 AM
A key to the
success of an
intelligence fusion
center is the
support of
stakeholders.
64207.indd 34
10/20/2007 2:13:26 AM
December 2007 / 31
64207x.indd 31
11/2/2007 4:53:09 PM
Technology
Update
he FBIs Criminal
Justice Information
Services (CJIS) Division
announced the creation
of the Law Enforcement
Onlines (LEO) 100,000th
vetted member account
on July 2, 2007. LEO was
created in July 1995 when
the FBI entered into a
cooperative agreement with
Louisiana State University
in Baton Rouge, Louisiana.
LEO continues to provide
an advanced technological
resource to further the state
of the art in law enforcement communications
capabilities, technologies,
and procedures to the international law enforcement
community. LEO functions
as a conduit for FBI sensitive but unclassied (SBU)
intelligence information,
which supports all of the
FBIs missions, strategic
goals, and objectives. LEO
forms a cornerstone of the
FBIs Information Sharing
Initiative. The LEO network
provides an Internet link
to international, federal,
state, local, and tribal police
departments and agencies
throughout the world. LEO
is a certied and accredited
system approved for the
dissemination of SBU intelligence information.
64207x.indd 32
11/2/2007 4:53:53 PM
Sergeant Land
Officer McKay
Officer Rastetter
64207.indd 37
10/20/2007 2:14:54 AM
Periodicals
Postage and Fees Paid
Federal Bureau of Investigation
ISSN 0014-5688
Ofcial Business
Penalty for Private Use $300
Patch Call
64207.indd 2
Incorporated in 1772, the town of Hillsborough, New Hampshire, is named after Colonel
John Hill. The patch of its police department
displays one of the stone arch bridges featured in
the town, which boasts the largest number in New
England. The one pictured spans Gleason Falls.
Hillsborough is the birthplace of Franklin Pierce,
the 14th president of the United States. His home,
built in 1804, today serves as a living museum.
10/20/2007 2:30:18 AM