The Beginning Of A Research Paper

U.S. POLICIES ON TWO TRANSNATIONAL CRIMES, ILLICIT DRUG

TRAFFICKING AND CYBER-LAUNDERING, WILL NOT SECURE THE

HOMELAND FROM TERRORIST THREATS

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

A Master Thesis

Submitted to the Faculty

of

American Public University

by

First Name Last Name

In Partial Fulfillment of the

Requirements for the Degree

of

Master of Arts

April 2012

American Public University

Charles Town, WV

 

 

 

 

1

Research Question:

Are there vulnerabilities in current US Government policies targeting transnational crime on

illicit drug trafficking and cyber-laundering that will increase homeland security threats from

terrorist organizations?

Purpose Statement:

The purpose of this paper is to explore US Government policies targeting illicit drug

trafficking and cyber-laundering while identifying vulnerabilities within the policies (if any) and

its impact on threats from terrorist organizations. Transnational crime, narcotics, and terrorism

financing are not geographical concerns. All three can be linked specifically by having potential

effect across national borders. Transnational Organized Crime (TOC) has established a

significant and increasing threat to national and international security, with dire implications for

public safety, public health, democratic institutions, and economic stability across the globe

(Finckenauer 2006, 124). The US Government have many Presidential Directives (PD) and

policies that target these areas, but are they really having an impact? Without a shadow of a

doubt, drug trafficking has resulted in funding that has supported terrorism and in some cases

such as the Madrid bombing, drugs were being utilized as the currency. The same scenario can

happen in any small or large city in America. US Government policies must be able to

compliment or supplement other Nations policies in the fight against transnational crime.

Because of varies religious beliefs and political views of western nations, the tasking will be

equivalent to finding a cotton ball in the field of snow.

Cybercrime is such a lucrative criminal adventure because anyone can be anyone and

anywhere in a digital environment. The utilization of electronic funding transactions

domestically and or internationally can create difficult detective efforts for any government, not

 

 

 

2

just the US. In a world where there appear to be an increase in ordinary criminals, extremist

groups, and or terrorist organizations seeking to conduct their business through cyber means, US

policies must be specific to be effective. Additionally, policies must not infringe upon civil

liberties that may expose an area of opportunity for terrorist threats. Despite US initiatives to

combat transnational crimes, the relationship between transnational crime, narcotics, and

terrorism financing seemingly has continued to expand.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3

Bibliography

Bahgat, G. (1999) Iran and Terrorism: The Transatlantic Responses. Studies in Conflict &Terrorism. 22(2), 141-152. doi:10.1080/105761099265801

Costanza, W. (2001) Hizballah and its Mission in Latin America. Cyber Laundering: The Risks to On-line Banking and E-Commerce Companies.

Retrieved May 29, 2008 from Stop money laundering! International conference (London, February, 2002) Web site: http://www.antimoneylaundering.ukf.net/papers/solicitor.htm

Ephron, D., Reno, J., Sparks, J., & Hosenball, M. (2006) Hezbollahs Men Inside

America. Newsweek, 148(7), 24-25 Filipowski, W. (2008). Cyber laundering: An analysis of typology and techniques.

International Journal of Criminal Justice Sciences, Vol 3(Issue 1), 15 – 27. doi: ISSN: 0973-5089

Finckenauer, J., and K. Chin. “Asian Transnational Organized Crime and Its Impact on

the United States.” Final report for the National Institute of Justice, Washington, DC: U.S. Department of Justice, National Institute of Justice, 2006, NCJ 213310. 120-134

Rollins, J., & Wyler, L. (2013). Terrorism and transnational crime: Foreign

policy issues for congress. Retrieved from http://fas.org/sgp/crs/terror/R41004.pdf Snow, G. (2011). Federal Bureau of Investigation: The cybersecurity threat.

Retrieved from http://www.fbi.gov/news/testimony/cybersecurity-responding-to- the-threat-of-cybercrime-and-terrorism

Solicitor General Canada (1998). Electronic Money Laundering: An

Environmental Scan. Retrieved May 29, 2008 from the Department of Justice (Canada) Retrieved from: http://www.justice.gc.ca/eng/pi/rs/rep- rap/1998/wd98_9-dt98_9/wd98_9.pdf

The White House. (2010). Cyberspace Policy Review: Assuring a trusted and resilient

information and communications infrastructure. Retrieved from http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.p df