Congressional Legislation

By Neeley, Dequendre | Security Management, August 1998 | Go to article overview

Congressional Legislation


Neeley, Dequendre, Security Management


Terrorism. A hearing before the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information yielded significant lessons learned in the five years that have passed since the bombing of the World Trade Center in February 1993.

Several of the panelists were from federal agencies such as the U.S. Secret Service and FBI. They said that their partnership approach to combating terrorism, along with increased legislative powers, has helped the government make great strides in eliminating terrorist threats. The INS, for example, has obtained new authority under recent legislation and has opened up a new office to deal exclusively with counterterrorist activities at the nation's 200 entry points.

At the same time, however, government representatives and other panelists noted that terrorists take advantage of Western freedoms to raise funds and gain support for terrorist activities against the United States and other western countries. Citing Middle-Eastern terrorist activities in particular, many said the openness of American society has facilitated terrorist operations and provided safe havens for conspirators.

"The liberal policies of the West, primarily France, Germany, and the United States, allowed the extremists from the Middle East to establish bases of operation in their countries," said Omar Ashmawy, whose late father was a crusading Sunni Muslim who tried to preach the more moderate and tolerant side of Islam to the country through radio broadcasts, a self-funded newspaper, and congressional testimony.

"The easily obtained western technology and free open market offers them a better and more effective way to direct and finance their followers," he told Congress.

Richard Rohde, deputy assistant director of investigation for the U.S. Secret Service, shed light on the connection between financial and white collar crime and terrorist activities. He said it has been virtually impossible for investigators to determine a motive for a crime at the outset, as illustrated by several recent cases that started as financial crime investigations but led to the uncovering of terrorist operations.

Secret Service agents, he said, in one case thought they were investigating rings of counterfeit credit card producers but eventually discovered the group was connected to a Lebanese terrorist operation that was using the cards to build up money and purchase equipment.

Rohde also discussed a fund-raising technique used by many terrorist groups that takes advantage of an interpretation of the law. Group members obtain credit cards and send in payment checks before actual purchases are made. Because of the way a banking regulation is routinely interpreted, banks credit the account before the fraudulent checks clear, thereby making it appear that the account has a cash surplus available in addition o the established credit line. Then before the banks discover that the payment checks are fraudulent, the members take out large cash advances to purchase equipment or fund other operations, leaving the bank holding bad debt.

In another case, undercover agents from multiple federal agencies were investigating coupon fraud and met a man who owned several grocery stores. They discovered that he was a kingpin for an extremist Palestinian organization, and that his nephew was also a leader of a known terrorist group. They were submitting thousands of dollars worth of coupons, obtained by purchasing bulk recycled newspapers and clipping inserts, artificially aging them to look as if they had been used, and submitting them for payment.

Steven Emerson, documentarian and journalist, reminded subcommittee members that domestic terrorists use similar fund-raising operations as those described for foreign terrorists, and that new measures instituted to fight terrorism should not ignore the growing specter of the home-grown brand of terrorism. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited article

Congressional Legislation
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    New feature

    It is estimated that 1 in 10 people have dyslexia, and in an effort to make Questia easier to use for those people, we have added a new choice of font to the Reader. That font is called OpenDyslexic, and has been designed to help with some of the symptoms of dyslexia. For more information on this font, please visit OpenDyslexic.org.

    To use OpenDyslexic, choose it from the Typeface list in Font settings.

    OK, got it!

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.