The Beginning Of A Research Paper
U.S. POLICIES ON TWO TRANSNATIONAL CRIMES, ILLICIT DRUG
TRAFFICKING AND CYBER-LAUNDERING, WILL NOT SECURE THE
HOMELAND FROM TERRORIST THREATS
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowA Master Thesis
Submitted to the Faculty
of
American Public University
by
First Name Last Name
In Partial Fulfillment of the
Requirements for the Degree
of
Master of Arts
April 2012
American Public University
Charles Town, WV
1
Research Question:
Are there vulnerabilities in current US Government policies targeting transnational crime on
illicit drug trafficking and cyber-laundering that will increase homeland security threats from
terrorist organizations?
Purpose Statement:
The purpose of this paper is to explore US Government policies targeting illicit drug
trafficking and cyber-laundering while identifying vulnerabilities within the policies (if any) and
its impact on threats from terrorist organizations. Transnational crime, narcotics, and terrorism
financing are not geographical concerns. All three can be linked specifically by having potential
effect across national borders. Transnational Organized Crime (TOC) has established a
significant and increasing threat to national and international security, with dire implications for
public safety, public health, democratic institutions, and economic stability across the globe
(Finckenauer 2006, 124). The US Government have many Presidential Directives (PD) and
policies that target these areas, but are they really having an impact? Without a shadow of a
doubt, drug trafficking has resulted in funding that has supported terrorism and in some cases
such as the Madrid bombing, drugs were being utilized as the currency. The same scenario can
happen in any small or large city in America. US Government policies must be able to
compliment or supplement other Nations policies in the fight against transnational crime.
Because of varies religious beliefs and political views of western nations, the tasking will be
equivalent to finding a cotton ball in the field of snow.
Cybercrime is such a lucrative criminal adventure because anyone can be anyone and
anywhere in a digital environment. The utilization of electronic funding transactions
domestically and or internationally can create difficult detective efforts for any government, not
2
just the US. In a world where there appear to be an increase in ordinary criminals, extremist
groups, and or terrorist organizations seeking to conduct their business through cyber means, US
policies must be specific to be effective. Additionally, policies must not infringe upon civil
liberties that may expose an area of opportunity for terrorist threats. Despite US initiatives to
combat transnational crimes, the relationship between transnational crime, narcotics, and
terrorism financing seemingly has continued to expand.
3
Bibliography
Bahgat, G. (1999) Iran and Terrorism: The Transatlantic Responses. Studies in Conflict &Terrorism. 22(2), 141-152. doi:10.1080/105761099265801
Costanza, W. (2001) Hizballah and its Mission in Latin America. Cyber Laundering: The Risks to On-line Banking and E-Commerce Companies.
Retrieved May 29, 2008 from Stop money laundering! International conference (London, February, 2002) Web site: http://www.antimoneylaundering.ukf.net/papers/solicitor.htm
Ephron, D., Reno, J., Sparks, J., & Hosenball, M. (2006) Hezbollahs Men Inside
America. Newsweek, 148(7), 24-25 Filipowski, W. (2008). Cyber laundering: An analysis of typology and techniques.
International Journal of Criminal Justice Sciences, Vol 3(Issue 1), 15 – 27. doi: ISSN: 0973-5089
Finckenauer, J., and K. Chin. “Asian Transnational Organized Crime and Its Impact on
the United States.” Final report for the National Institute of Justice, Washington, DC: U.S. Department of Justice, National Institute of Justice, 2006, NCJ 213310. 120-134
Rollins, J., & Wyler, L. (2013). Terrorism and transnational crime: Foreign
policy issues for congress. Retrieved from http://fas.org/sgp/crs/terror/R41004.pdf Snow, G. (2011). Federal Bureau of Investigation: The cybersecurity threat.
Retrieved from http://www.fbi.gov/news/testimony/cybersecurity-responding-to- the-threat-of-cybercrime-and-terrorism
Solicitor General Canada (1998). Electronic Money Laundering: An
Environmental Scan. Retrieved May 29, 2008 from the Department of Justice (Canada) Retrieved from: http://www.justice.gc.ca/eng/pi/rs/rep- rap/1998/wd98_9-dt98_9/wd98_9.pdf
The White House. (2010). Cyberspace Policy Review: Assuring a trusted and resilient
information and communications infrastructure. Retrieved from http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.p df