Publications
2007 Law Enforcement Bulletins
FBI Home Page
Privacy Policy

February 2007
Volume 76
Number 2

United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001

Robert S. Mueller III
Director

Staff Assistant
Cynthia H. McWhirt

This publication is produced by members of the Law Enforcement Communication Unit, Training Division.

Internet Address leb@fbiacademy.edu

Send article submissions to Editor,
FBI Law Enforcement Bulletin,
FBI Academy, Madison Building,
Room 201, Quantico, VA 22135.

Features

Financing Terror
By Dean T. Olson
From stolen baby formula to intellectual property theft, terrorist groups employ a variety of criminal schemes to raise funds.

Dealing with Hawala
By James Case
The hawala concept can pose a challenge for investigators experienced in more traditional financial crimes.

Diamond and Jewelry
Industry Crime
By Kelly Ross
This growing problem presents new challenges to all law enforcement agencies.

Regulating Matters of Appearance
By Lisa A. Baker
Managers must balance the departmental interests of appearance standards and the religious or personal beliefs of individual employees.

Departments

Focus on Technology
Communicated Threat
Assessment Database

Legal Brief
Warrants for Tracking Devices

Leadership Spotlight
Let Actions Be Your Legacy

Technology Update
National Dental Image Repository

Bulletin Reports
Offenders
Community Relations
Juvenile Justice
Officer Census Report

ViCAP Alert
Missing Person

Crime Data
Law Enforcement Officers
Killed and Assaulted, 2005

Financing Terror
By DEAN T. OLSON, M.A.

Photographs of Moneny changing hands in the sale of a computer C D, credit cards, and lines of cocaine and a rolled-up dollar bill Photograph of money changing hands in the sale of a computer C D Photograph of credit cards Photograph of lines of cocaine and a rolled-up dollar bill

 

'The frequency and seriousness of international terrorist acts are often proportionate to the financing that terrorist groups might get.”1 Terrorist organizations must develop and maintain robust and low-key funding sources to survive. Domestic and international terrorist groups raise money in the United States to exploit the nation’s market-based economy and democratic freedoms for profits that they send overseas or use locally to finance sleeper cells. Raising funds on American soil fulfills complementary goals by undermining the economy, introducing counterfeit and often unsafe or adulterated products and pharmaceuticals into the consumer market, and increasing the social costs of substance abuse by feeding the demand for illicit drugs.

The terrorists who attacked the World Trade Center in New York City in 1993 originally planned to use a larger bomb to bring down both towers by toppling one into the other.2 They also wanted to amplify the carnage by augmenting their vehicle-borne improvised explosive device with a chemical or biological weapon to increase casualties and hamper rescue efforts. Their goal, however, went awry because they ran out of money.

Similarly, lack of funds limited the plans of another group that conspired in 2003 to simultaneously bomb the Egyptian, American, and other Western embassies in Pakistan.3 Inadequate monetary resources forced the group to focus on attacking only the Egyptian embassy. “A short time before the bombing of the [Egyptian] embassy the assigned group... told us that they could strike both the Egyptian and American embassies if we gave them enough money. We had already provided them with all that we had and we couldn’t collect more money.”4

A major source of terrorist funding involves criminal activities. Groups use a wide variety of low-risk, high-reward crimes to finance their operations. Those most likely encountered by local law enforcement involve six primary areas.

Photograph of Captain OlsonCaptain Olson serves with the Douglas County, Nebraska, Sheriff’s Department.

Illicit Drugs

“If we cannot kill them with guns, so we will kill them with drugs.”5 Documented links exist between terrorist groups and drug trafficking, notably the smuggling of pseudoephedrine, a precursor used to manufacture methamphetamine. After purchasing the substance in multiton quantities, smugglers associated with one terrorist group moved truckloads of it into the United States to feed methamphetamine labs in California and neighboring southwestern states.

In three major drug investigations, DEA arrested more than 300 people and seized over $16 million in currency and enough pseudoephedrine to manufacture 370,000 pounds of methamphetamine. To put this quantity into context, the average annual seizure of methamphetamine throughout the United States in 2002 was 6,000 pounds.6

Fraud

Frauds perpetrated by terrorist groups include identity theft for profit and credit card, welfare, social security, insurance, food stamp, and coupon fraud. Industry experts estimate that $3.5 billion in coupons are redeemed annually.7 About 10 percent, or $3.5 million, is fraudulent.

In 1987, authorities disrupted a large coupon fraud ring involving more than 70 participants.8 The conspirators were accused of sending a portion of the proceeds to Palestine Liberation Organization (PLO) bank accounts in the Middle East and Europe. A Palestinian operating several grocery stores in the North Miami, Florida, area was the key player in a nationwide money laundering and financing operation for the PLO. The investigation discovered that 72 individuals from throughout the United States gathered in Hollywood, Florida, to further the fraudulent coupon distribution network. One person was identified as a cell leader of a terrorist network. Members of the group also were involved in hijacking trucks and selling stolen food stamps and property.9

In 1994, New York City officials identified the head of a coupon fraud ring who had established a network of stores by targeting those owned and controlled by Middle Eastern businessmen willing to participate in schemes that defrauded American commercial enterprises.10 Most of the time, a small store that normally submitted $200 to $300 in coupons monthly would suddenly begin sending in tens of thousands of dollars worth of them after joining the network. The store owners never saw the coupons; they only received the redemption checks. In many cases, the owners borrowed money or agreed to lease stores for a monthly fee set by the network. They used coupons to pay the debt on these loans, which sometimes required 49 percent interest per month.11

Stolen Baby Formula

In another scheme in the late 1990s, investigators in Texas discovered that organized shoplifting gangs paid drug addicts and indigent people $1 per can to steal baby formula. The groups repackaged the products in counterfeit cardboard boxes before shipping the bootleg formula to unsuspecting stores across the United States. One of the largest rings at the time netted $44 million in 18 months.12

As the terrorist attacks on September 11 unfolded, a Texas state trooper pulled over a rental van and found an enormous load of infant formula inside. Police later identified the driver as a member of a terrorist group and linked him to a nationwide theft ring that specialized in reselling stolen infant formula and wiring the proceeds to the Middle East.13 The investigation led to felony charges against more than 40 suspects, about half of them illegal immigrants.

Police also seized $2.7 million in stolen assets, including $1 million worth of formula. This investigation was only the beginning. In the years after September 11, police discovered and disrupted several regional and national theft rings specializing in shoplifted baby formula. At least eight of the major cases involved individuals of Middle Eastern descent or who had ties to that region.14

Intellectual Property Theft

According to media reports, the terrorists who bombed the World Trade Center in 1993 allegedly financed their activities with counterfeit textile sales from a store in New York City.15 A raid on a souvenir shop led to the seizure of a suitcase full of counterfeit watches and the discovery of flight manuals for Boeing 767s, some containing handwritten notes in Arabic. A subsequent raid on a counterfeit handbag shop yielded faxes relating to the purchase of bridge inspection equipment. While investigating an assault on a member of an organized crime syndicate 2 weeks later, police found fake driver’s licenses and lists of suspected terrorists, including the names of some workers from the handbag shop, in the man’s apartment.16

Pirated software constitutes a tremendous source of funds for transnational criminal syndicates, as well as terrorist groups. It is not difficult to see why software piracy has become attractive. A drug dealer would pay about $47,000 for a kilo of cocaine and then sell it on the street for approximately $94,000, reaping a 100 percent profit. But, for the same outlay of $47,000 and substantially less risk, an intellectual property thief could buy 1,500 bootleg copies of a popular software program and resell them for a profit of 900 percent.17 To put these numbers into context, the September 11 attacks cost approximately $500,000, or $26,000 per terrorist. One successful large-scale intellectual property crime easily could fund multiple terrorist attacks on the scale of those of September 11, 2001.

Items Common to Illegal Hawala Operations

  • Spiral notebooks, scraps of paper, or diaries listing information for numerous financial transactions, which generally include the date, payer name, amount received, exchange rate, and payment method or remittance code

  • An unusually high number of phone lines at a residence or business; short incoming calls and lengthy overseas calls

  • Fax transmittal logs/receipts, which may contain name of sender, beneficiary, or a code

  • Wire transfer receipts/documents

  • Phone records/documents; multiple calling cards

  • Multiple financial ledgers (one for legitimate transfers, one for criminal activity, and one possibly for settling accounts)

  • Bank account information, particularly multiple accounts, under same name

  • Multiple identification (false ID for the subject or for several other individuals)

  • Third-party checks

  • Evidence of other fraud activity

Cigarette Smuggling

Exploiting a considerable tax differential, smugglers bought van loads of cigarettes for cash in North Carolina and transported them to Michigan.18 According to prosecutors, each trip netted $3,000 to $10,000. In 1 year, the recipient of the profits, who had links to a terrorist group, had deposited over $735,000 in bank accounts while paying for houses, luxury cars, and other goods with cash. The group sent items, such as night-vision goggles, cameras and scopes, surveying equipment, global positioning systems, and mine and metal detection equipment, to other terrorists abroad.19 The ringleader was sentenced to 155 years in prison, and his second in command received a 70-year prison sentence.

Informal Value Transfer Systems

Informal value transfer and alternative remittance systems play a significant role in terrorism financing. One example, hawala, involves the transfer or remittance of money from one party to another, normally without the use of such formal financial institutions as banks or money exchanges. International financial institutions estimate annual hawala transfers at approximately $2 trillion dollars, representing 2 percent of international financial transactions.20

Because these systems operate below legal and financial radars, they are susceptible to abuse by criminal elements and terrorists.21 Moreover, few elements of this informal transfer system are recorded, making it difficult to obtain records of the transmitters and the beneficiaries or to capture the scale and magnitude of such transfers. Although operators keep ledgers, their records often are written in idiosyncratic shorthand and maintained only briefly.

Conclusion

From stolen baby formula to intellectual property theft, terrorist groups employ a variety of criminal schemes to raise funds. And, as with other homeland security matters, countering terrorist financing is fundamentally a local law enforcement responsibility. The more familiar officers are with the criminal enterprises used by these groups to raise money, the more effective they will be in finding ways to counter such activities.

Countermeasures must disrupt terrorist financing and starve such groups of the money necessary to sustain their organizations and to perpetrate attacks. Without the financial means to carry out their missions, terrorists will find it increasingly difficult to continue their wanton acts of death and destruction.

Endnotes

1 Interpol, Terrorism: The Financing of Terrorism (2005); retrieved July 2005 from http://www.interpol.int/Public/Terrorism/ financing.asp.

2 Loretta Napoleoni, Modern Jihad: Tracing the Dollars Behind the Terror Networks (Sterling, VA: Pluto, 2003), 4.

3 Nick Kochan, The Washing Machine (New York, NY: Thompson, 2005), 34.

4 Ibid., 32.

5 Rachel Ehrenfeld, Funding Evil: How Terrorism Is Financed and How to Stop It (Seattle, WA: National Press, 2003), 123.

6 Drug Enforcement Administration, More than 100 Arrested in Nationwide Methamphetamine Investigation, Federal News Service, January 10, 2002; retrieved July 2005 from http://www.usdoj.gov/dea/ major/me3.html.

7 B. Jacobson, Coupon Fraud, Testimony before the U.S. Senate Select Committee on Intelligence, Washington, DC, 1997.

8 Ibid.

9 “U.S. Grocery Coupon Fraud Funds Middle Eastern Terrorism,” New American 13, no. 5 (March 13, 1997); retrieved July 2005 from http://www.thenewamerican. com/tna/1997/vo13no05/vo13no05_ coupon.htm.

10 Ibid.

11 Ibid.

12 Mark Clayton, “Is Black Market Baby Formula Financing Terrorism?” Christian Science Monitor, June 29, 2005; retrieved August 2005, from http://www. usatoday.com/news/nation/2005-06-28baby-formula_x.htm.

13 Ibid.

14 Ibid.

15 John Nurton, “Why Counterfeiting Is Not So Harmless,” Managing Intellectual Property, September 2002, 43.

16 Kathleen Millar, “Financing Terror: Profits from Counterfeit Goods Pay for Attacks,” Customs Today, retrieved June 2005, from http://www.customs.gov/xp/ CustomsToday/2002/November/interpol. xml.

17 Jennifer L. Schenker, “Busting Software Pirates,” Time 2002, 54.

18 Patrick Fleenor, “Cigarette Taxes, Black Markets, and Crime,” Policy Analysis, 2003, 13.

19 Ibid., 57.

20 Larry Lambert, “Underground Banking and National Security,” Sapra India Bulletin, February/March 1996; retrieved July 2005, from http://www.subcontinent. com/sapra/bulletin/96feb-mar/si960308. html.

21 Supra note 1, 37.

Wanted: Notable Speeches

The FBI Law Enforcement TBulletin seeks transcripts of presentations made by criminal justice professionals for its Notable Speech department. Anyone who has delivered a speech recently and would like to share the information with a wider audience may submit a transcript of the presentation to the Bulletin for consideration.

As with article submissions, the Bulletin staff will edit the speech for length and clarity, but, realizing that the information was presented orally, maintain as much of the original flavor as possible. Presenters should submit their transcripts typed and double-spaced on 8 ½- by 11-inch white paper with all pages numbered. An electronic version of the transcript saved on computer disk should accompany the document. Send the material to:

Editor, FBI Law
Enforcement Bulletin
FBI Academy
Madison Building
Room 201
Quantico, VA 22135
telephone: 703-632-1952,
e-mail: leb@fbiacademy.edu

Focus on Technology

The FBI’s Communicated Threat Assessment Database
History, Design, and Implementation

By James R. Fitzgerald

Photograph of mailbox full of mail inside of a computer monitor

In January 1999, a gunshot pierced the window of a Pennsylvania house and killed the female resident. Her estranged husband, a wealthy doctor, was the prime suspect, but investigators did not have enough evidence to convict him. Early in the investigation, his attorney received two separate anonymous letters attempting to exculpate the husband. The investigators requested an authorial attribution analysis (i.e., an attempt to determine common authorship between two or more sets of communications) of the two anonymous letters and numerous ones written by the husband. Comparing these with the more than 1,000 letters contained at that time in the FBI’s Communicated Threat Assessment Database (CTAD) strengthened the distinctive quality of the two sets of letters and their author. Investigators determined that the husband had sent the recent ones in an attempt to misdirect the investigation. During the interim, he had moved to Washington, and, in December 2002, authorities arrested him and returned him to Pennsylvania for trial. In 2004, FBI personnel provided expert testimony at the husband’s trial as to the results of their analyses and the findings derived from CTAD. After a first-degree murder conviction, the judge sentenced him to life without parole.

Overview

The FBI’s Behavioral Analysis Unit-1 (BAU1) of the Critical Incident Response Group is a component of the National Center for the Analysis of Violent Crime at the FBI Academy and focuses its efforts on counterterrorism, threat assessment, and other forensic linguistics services. BAU-1 personnel offer services, including behaviorally oriented investigative assistance in counterterrorism matters, threat assessment/textual analysis, WMD, extortions, product tampering, arson and bombing matters, and stalking cases, to the FBI; other international, federal, state, and local law enforcement and intelligence agencies; and the military. In conjunction with these responsibilities, the unit implemented CTAD to serve as the primary repository for all communicated threats and other criminally oriented communications (COCs) within the FBI. It assists with categorizing, analyzing, assessing, and maintaining all communications falling into these two areas.

Some communicated threats and COCs are sent to their respective recipients for personal reasons, whereas others relate directly to criminal enterprises, such as extortion, kidnapping, and other crimes. Some fall under the domain of national security and have intelligence potential contained therein. For example, a communication to a corporation or a government entity could be an attempt to threaten, or actually violate, the security of the company or the United States.

All communicated threats and COCs received at the FBI are entered into CTAD, categorized accordingly, analyzed, and assessed for their respective threat potential. Then, BAU-1 agents search for similarities with other existing communications within the database, make a possible determination of authorship, and notify the submitting agency of their findings.

History

An increase from only several dozen per year in the mid-1990s to approximately 400 in 2005 alone aptly illustrates the significant rise in the number of threatening communications and COCs received by BAU-1 during the past several years. The advent of e-mail, with its ease of use and accessibility, has played an important role in this growth. Also, the terrorist attacks of September 11, 2001, and the anthrax mailings shortly thereafter, among other cases, have demonstrated the need for the FBI to monitor all of these communications. The agency, therefore, determined that a database would aid in coordinating this expanding number of communications and the requests for BAU-1 personnel to assess and analyze them.

During the early stages of planning, unit members envisioned a corpus with a word capacity exceeding 100 million, an extensive search potential, detailed categorization and classification parameters, and report-writing capabilities. Most important, they wanted a linguistically oriented database, as well as a behaviorally oriented one. If language in a particular communication suggested potentially deadly action, behavioral markers within the text would be identified, cross-checked with other communications, and evaluated. Such a design would combine both linguistic- and behavioral-based concepts in an attempt to not only assess the possibility of a threatened action being undertaken but also assist in the identification of the anonymous author.

Design

Currently, CTAD contains almost 2,500 communicated threats or other COCs that vary in length from several sentences to 20 or more pages. The database divides these into 24 categories of either a general nature, such as terrorism, or a more specific genre, such as WMD, sexual, or militia. The overall theme of a communication denotes the primary category selected, while other ancillary factors, such as the mechanism of a threatened action itself, can place it into a secondary one. For example, the author of an anonymous communication may claim allegiance to a known terrorist group and threaten a city with a radiological device. In that case, the primary category would be terrorism with WMD as the secondary one.

CTAD is divided into four sections. The first, Administrative, includes file numbers, keywords, case title, FBI division information, investigator details, and similar data. The second section, Case Facts, contains information related to the case, including the form of the threat, author-ship (if so indicated), means of delivery, target, demands, details about the victim/recipient, media coverage, and other relevant details. The third,Linguistic Profile, requires advanced training and experience in the fields of criminal behavior and forensic linguistics. This section incorporates assessments based on a behavioral and linguistic analysis of the communication, including indications of capabilities, commitment, deception, biographical information (e.g., sex, age, race/ethnicity, education, and native language), and, if necessary, the level of threat (e.g., low, moderate or high). The last section is Case Facts Confirmed and is completed only when the author of a threatening communication or COC has been identified, making biographical and descriptive data available. This section assists in the identification of anonymous writers of other threatening communications and COCs in CTAD, which may not have been previously linked

The search component constitutes one of CTAD’s most important elements. BAU-1 personnel can restrict searches to the database itself or other directories within the system. When working on specific authorial attribution projects, employees can create separate directories of the known and the questioned documents and search only

Terms Defined

  • Communicated threat: verbalized, written, or electronically transmitted message that states or suggests potential harm to the recipient, someone or something associated with the recipient, or specified or nonspecified other individuals.1

  • Threat assessment: detailed examination of the elemental parts of a verbal or written threat to estimate in terms of high, medium, or low probability the genuineness and overall viability of the expression of intent to do harm.2

  • Criminally oriented communication (COC): verbalized, written, or electronically transmitted message, usually anonymous, not necessarily threatening a specific action or event but relating to an existing or potential crime.

  • Post-offense manipulation of investigation communication (POMIC):3 communications received by the media or criminal justice entities after the commission of a crime, often a high-profile case. Invariably anonymous, POMICs assert that the person publicly accused, under investigation, in custody, or standing trial for a certain crime is innocent. The author usually claims responsibility for the crime or knows the “real” offender who always remains unnamed. Such communications attempt (usually unsuccessfully) to convince the public, the media, the investigators, or the jury that the accused, the arrested, or the defendant did not commit the crime. As in the case study at the beginning of this article, investigations of POMICs usually reveal that the person accused of the original crime or someone close to that individual authored the letter. In some jurisdictions, writing a COC may constitute obstruction of justice. However, even without separate charges based on POMICs, their presence may serve to strengthen the prosecution of the original crime.

 

Implementation

When a new threatening communication case arrives at BAU-1 via an FBI office or a local or state law enforcement agency, an analyst accesses CTAD and obtains all relevant information related to it, including how many threats have been received in the last year in that specific category and whether any similarities exist between the linguistic features in the current communication and others in the database. At this point, based on the receipt of all of the relevant information available at that time, agents can complete their assessment and analysis and provide the most salient opinion as to the potential of the threatened action being carried out and the personality characteristics of the author.

A recent case offers an example of how CTAD can aid investigators. For several years, agents in the FBI’s Cleveland office have been investigating a series of threatening and racially insensitive anonymous letters received by numerous people, including college and professional athletes and other celebrities, throughout the United States. Using the database, BAU-1 personnel linked all of the letters to the same author. Subsequently, agents in the Las Vegas office began investigating the receipt of a threatening and racially insensitive anonymous letter to a particular victim. Through a linguistic- and behavioral-based search of the letter, BAU-1 members determined that it originated from the author of the letters in the Cleveland case. While the author remains unidentified, CTAD’s advanced search capabilities have ensured that agents will work the case as one investigation, thereby improving the chance of a successful resolution.

Future plans include continually upgrading CTAD in an effort to make it as effective a tool as possible, including an online capability throughout the FBI. Moreover, CTAD offers endless research potential in terms of undertaking studies to determine the type of anonymous individual who composes and sends threatening communications and COCs. From a sociolinguistic perspective, researchers could examine features, such as age, sex, ethnic background, and education level, in these types of communications and determine commonalities among the authors. Follow-up interviews of identified authors may reveal a great deal about them, including those who were “only” threatening, those who really meant what they wrote, and those who actually carried out a threatened action.

Conclusion

The Communicated Threat Assessment Database is a new item within the FBI’s arsenal of tools in its effort to combat crime and terrorism. While it has historical precedence in both the government and academic communities, CTAD is unique in its design and purpose.

The database will continue to enhance the threat assessment and textual analysis process within the FBI. Its creators hope that as CTAD and its corpus and capabilities grow, so too will the services provided to those requesting assistance with these critical matters.

Endnotes

1 Eugene A. Rugala and James R. Fitzgerald, “Workplace Violence: From Threat to Intervention,” in Clinics in Occupational and Environmental Medicine, eds. Carol Wilkinson and Corrinne Peek-Asa (Philadelphia, PA: W.B. Saunders, 2003), 778.

2 Ibid., 780.
3 BAU-1 personnel coined this term.

Special Agent Fitzgerald serves in the Critical Incident Response Group, Behavioral Analysis Unit-1, at the FBI Academy.

 

Dealing with Hawala Informal Financial Centers in the Ethnic Community

By JAMES CASEY, M.A. © PhotoDisc

Photograph of serveral forms of international currency

In the immediate aftermath of September 11, 2001, many experienced intelligence officers did not understand the concept of hawala, and few knew what it actually represented in the context of money laundering and terrorism financing. Then, as today, hawala constitutes an important economic aspect of life in America’s Middle Eastern and Southeast Asian communities.1 Law enforcement officers

who work in these locations or investigate white-collar crime or terrorism financing should know about and understand how to deal with hawala and other nontraditional financial centers.

How Hawala Works

Hawala comprises one type of the informal value transfer system (IVTS) used mostly by members of an ethnic community to send money around the world. Other forms of IVTS, which also can be elements of hawala, include physically transporting (smuggling) currency and stored-value transfers (chits). Hawala does not involve the immediate movement of any negotiable instrument nor are actual funds immediately transmitted anywhere. An ancient system that actually predates banking, it works in an analogous manner to a more formal system of “wiring” money.2 When individuals wire money, they contact a legitimate money-wiring service and provide an amount of funds they wish to send to another party plus a fee. If they send money overseas, they generally pay a recognized margin or exchange rate at which they purchase funds in that country’s currency. Of course, funds are not actually “wired” to the other person, and nobody physically sends money anywhere at that time. Instead, one vendor accepts the cash from the sender, and another gives the same amount to the recipient. Then, the two vendors settle at a later time.

In more legitimate operations, these settling transactions almost always involve the transfer of funds from one account to another at banking institutions. With hawala, however, either a transfer of funds to a bank or a number of less formal settling transactions may occur. Hawaladars (i.e., operators) may travel overseas on a regular basis to settle accounts in person with their contacts. They may have other business interests with these intermediaries that involve inventory and merchandise, which they can manipulate to reflect the hawala transactions. For example, hawaladars can trade premium goods, such as phone cards, at a discount to represent the value of earlier transactions.

Just like legitimate money-wiring operations, hawala often is contained within another community business, such as an ethnic market or travel agency, or run by freelancers who operate autonomously in the community. The global scope of IVTS and hawala is impossible to calculate. An International Monetary Fund/ World Bank estimate puts worldwide IVTS transfers on the order of tens of billions of dollars annually.3

Money Laundering

Hawala is not necessarily synonymous with money laundering or even white-collar crime or terrorism financing. Money laundering, by its very nature, involves attempting to make “dirty” money, often via drug activity or organized crime wherein criminals generate sums of wealth (usually cash) that cannot be easily explained or managed, “clean.” So, they transfer the money in and out of different accounts, banks, and various legitimate and partially legitimate businesses. This supposedly creates ambiguity as to its origin and lends legitimacy to otherwise criminal proceeds. It is significant to recall that money laundering, per se, generally is not, in and of itself, a criminal act.4 Most money-laundering statutes require evidence of a specific underlying enterprise, such as drug trafficking or other criminal activity, to successfully prosecute the money-laundering offense.

Photograph of Special Agent Casey

Casey heads the Eurasia Section
in the FBI’s Counterintelligence Division.

Terrorism Financing

An interesting paradox surrounds the financing of terrorism. First, cash proves as important, if not more so, to successful terrorist operations as it does to any other prosperous venture, legal or otherwise. But, at the opposite end of the equation, terrorist operations are not prohibitively expensive. After all, a teenage terrorist who straps on explosives and detonates himself in a Tel Aviv restaurant killing dozens costs little, yet his actions prove effective.

Ahmed Ressam, an Algerian loosely affiliated with al Qaeda, had lived illegally in Canada for several years when he tried to enter the United States with explosives in the trunk of his car. He was destined for Los Angeles International Airport where he intended to set off an explosion as part of a larger New Year’s millennium terrorism plot. His overseas handlers had instructed him to finance himself by burglarizing hotel rooms, stealing credit cards, and committing other petty offenses.5 Timothy McVeigh and Terry Nichols used the proceeds from several home burglaries and gun show sales to buy farm-grade fertilizer they mixed with fuel oil to bomb the Murrah Federal Building in Oklahoma City.

According to the 9/11 Commission, the entire cost of the September 11 plot was between $400,000 and $500,000. Considering that close to two dozen individuals (the 19 hijackers plus overseas support elements) were likely involved over an 18-month to 2-year period, the funds needed for significant international travel, terrorist-camp training, flight school, and living expenses only approximated $12,000 per person, per year.

The 9/11 Commission also found no evidence of any foreign government knowingly helping to finance the operation; instead, most of the funds were derived from donations to charity. While some media sources have claimed Saudi Arabia was responsible for providing a large amount of terrorism funding in general and particularly for the September 11 plot, a specific dollar-for-dollar nexus does not exist. While the royal family in Saudi Arabia maintains a complex relationship with both its citizens and conservative religious clerics and charities in the country, proving the government provided funds to these religious leaders and charities knowing that the money would eventually finance terrorism never has been established.6 Moreover, while the 9/11 Commission found that al Qaeda used hawala to move money in and out of Afghanistan, it also determined that the group did not employ hawala in any way to fund the 19 hijackers or the events surrounding the September 11 attacks.7

Hawala in the Community

People use hawala for any number of reasons; many of these are legitimate, while others are not. Investigators must understand that in the Middle Eastern community, the importance of family and other trusted relationships cannot be overemphasized. Often, a member of the community refers to another as belonging to a particular family when, in fact, the relationship is so distant that it is legally insignificant. These family and clan relationships perhaps are more significant than in any other ethnic community in the United States. At the same time, many members have relatives in their home countries they support financially.

Within these Middle Eastern and Southeast Asian communities, members trust local businessmen, including the hawaladar, a great deal. That trust is one element that invites the use of hawala. A fictional example of a member of the community employed in violation of his tourist or student visa can help illustrate the system. The young man does not have a social security number and wishes to send money to his homeland, a country where currently it is unlawful to do so, to support relatives. He has four immediate incentives to use a local hawaladar, rather than a traditional bank or money-wiring service.

1) He is violating the terms of his visa by working in the United States.

2) He does not have a social security number and may be working without paying taxes.

3) Treasury regulations do not allow him to legally send money to his country.

4) A hawaladar probably is more economical than other more legitimate means of moving money because of lower finance charges and exchange rates.

Passed in 2001, the United and Strengthening of America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act8 called on the U.S. Department of the Treasury to determine whether Congress should stiffen laws relating to IVTS in the United States. The report to Congress concluded that although law enforcement had tools at its disposal for dealing with IVTS (hawala), further education was a key element. “The U.S. approach of regulating informal value transfer activity is preferable to outlawing the activity altogether, a course chosen by some nations. Attempting to outlaw the IVTS ultimately deprives law enforcement of potentially valuable information and drives the informal remittance providers further ‘underground.’ Outlawing the activity also deprives the mostly law-abiding IVTS customers of the primary channel through which they transfer funds.”9

© PhotoDisc Photograph of Dollar sign

Techniques for Law Enforcement

As with any crime problem, a keen understanding of who is who in the community constitutes one of the keys to successfully dealing with hawala. Officers and investigators need to use their sources of information to determine which merchants and individuals in the community act as IVTS brokers. When suspicion arises that these entities are employing IVTS to facilitate drug trafficking, terrorism financing, or money laundering, law enforcement can exploit a host of local, state, and federal offenses these enterprises are committing.

Regardless of how well-meaning or “community oriented” hawaladars are, they violate technical infractions each time they engage in a financial transaction. The federal Bank Secrecy Act (BSA)10 requires any person or group acting as a money-services business (MSB) to adhere to numerous reporting and record-keeping requirements, most or all of which hawaladars routinely ignore. Additionally, these businesses, by law, must register with the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN), which, again, they usually disregard. Furthermore, MSBs are required by law to produce suspicious activity reports (SARs) for transactions over $2,000 that appear, or should appear to them, to involve illegal activity. Finally (although not all-inclusively), investigators should note that Title 18 of the U.S. Code makes it a crime to operate an MSB in the absence of compliance with applicable state licensing requirements.11 Undoubtedly, these enterprises also do not appropriately follow these regulations.

A misperception exists that hawaladars do not keep records; this is false. Many keep extensive documentation because the settling of accounts often takes place well into the future. What investigators need to look for are unconventional records or ones kept in a language other than English. Also, because hawaladars barter in other than cash products, investigators should check for large transactions involving food stamps, lottery tickets, and phone cards, all of which can be alternate forms of currency in the community.12 Of course, phone records and those from Internet service providers, as well as legitimate bank documents, can be valuable because they show who the hawaladar has dealt with. Investigators should focus on contacts and transactions that involve Great Britain,13 Switzerland, and Dubai as these comprise major financial centers with strict financial secrecy laws.14 Moreover, even when hawaladars are not knowingly involved in serious illegal activity, their nonconforming business practices put them in positions where they could assist law enforcement with the real criminal element in a community, especially those dealing in narcotics, laundering money, or financing terrorism.

Conclusion

The hawala concept is not prohibitively complicated. Its deviance from conventional banking and financial institutions, together with its place in the Middle Eastern and Southeast Asian communities, can pose a challenge for investigators experienced in more traditional financial crimes, including money laundering and terrorism financing. However, employing some specific techniques, coupled with a solid community intelligence base, should assist them with hawala and nontraditional financial centers.

Endnotes

1 These locales often include individuals of Indonesian, Indian, Palestinian, and Egyptian nationalities.

2 Patrick M. Jost and Harjit Singh Sandhu, Interpol General Secretariat, The Hawala Alternative Remittance System and Its Role in Money Laundering (Lyon, January 2000).

3 Secretary of the U.S. Department of the Treasury, Report to the Congress in Accordance with Section 359 of the USA PATRIOT ACT.

4 While transferring money between different accounts and banks may not constitute money laundering per se, investigators are encouraged to look carefully at all federal, state, and municipal laws and regulations and consult with financial crimes prosecutors as activities, such as “structuring” and improper record keeping, in fact, may constitute specific criminal conduct sufficient to establish money-laundering charges.

5 National Commission on Terror Attacks Upon the United States, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States (Washington, DC, 2004), 175.

6 Ibid., 170-171.

7 Ibid., 499 (note 131 to chapter 5).

8 PL 107-56, October 26, 2001, 115 Stat 272.

9 Supra note 3.

10 See 31 USC 5311.

11 Supra note 3.

12 Recently, some companies have begun issuing traditional credit cards that can be legally obtained anonymously. Customers prepay a fixed amount for the cards then use them at retailers (currently, online auctions), which accept the card anonymously as payment.

13 For additional information, see Marc D. Ferbrache, “Offshore Financial Centers: The Channel Islands and the Isle of Man,” FBI Law Enforcement Bulletin, February 2001, 10-15.

14 Supra note 2.

Legal Brief
New Federal Rule of Criminal Procedure Addresses Warrants for Tracking Devices

On December 1, 2006, Federal Rule of Criminal Procedure 41 was substantially revised. The modifications set forth the procedure for federal law enforcement officers and agents to obtain, process, and return warrants to install and use tracking devices to include global positioning system (GPS) technology.1 The new rule does not address whether law enforcement officers need a warrant to install or monitor a tracking device. Whether a warrant is required to install a tracking device, or track a vehicle or other object, revolves around expectations of privacy. If an intrusion into an area where there is a privacy expectation is necessary to install the device,2 or the vehicle or object will be tracked in an area where one has a privacy expectation, a warrant is required. If there is no such intrusion or tracking the device will not infringe on privacy, a warrant is not required. Agents and officers are encouraged to read the text of the change at http://www.uscourts.gov/ rules/supct1105/CR_Clean.pdf. Highlights of due changes include the following: