Académique Documents
Professionnel Documents
Culture Documents
Morgan Anderson
Derek Carter
Stefany Cornejo
Joshua Causey
David Fujimoto
Paul McDonald
HIDING IN Victoria Rivas
Nick Salinas
Theodore Shull
I. INTRODUCTION 5
III. METHODOLOGY 12
IV. ANALYSIS 14
A. Organized Crime 14
1. Fall Semester 15
2. Spring Semester 16
3. Evaluation of Sources 16
i. University of Southern California Technology and Human Trafficking 16
ii. Kirsta Melton 17
iii. International Migration Policy and Law Analysis (IMPALA) Database 17
4. Sample Finding From Sources 18
5. Sample Conclusion 18
B. Violent Crime 18
1. Fall Semester Research 19
2. Spring Semester Research 20
3. Evaluation of Sources 21
i. Observatorio de Legislacin y Poltica Migratoria 22
ii. Insight Crime: Investigation and Analysis of Organized Crime 22
iii. John P. Sullivan 23
4. Sample Finding From Sources 24
5. Sample Conclusion 24
C. Terrorism 25
1. Fall Semester Research 25
2. Spring Semester Research 26
3. Evaluation of Sources 26
1
i. Terrorism financing 26
ii. A Comparison of Domestic and International Research Institutions 28
iii. Radicalization, Terrorism, and Government Response 30
iv. Current Efforts and the War of Ideas 32
v. Countering Violent Extremism 32
4. Sample Finding From Sources 34
5. Sample Conclusion 34
V. RECOMMENDATIONS 46
ANNEX A: DEFINITIONS 55
ANNEX D: BIBLIOGRAPHY 64
EXECUTIVE SUMMARY
The Federal Bureau of Investigation (FBI) evolved into an intelligence-
driven and threat-focused law enforcement agency as it faced continued
challenges in the ever-changing world. The FBI assumed more responsibility
as a member of the Intelligence Community and a law enforcement agency
2
at the turn of the 20th century . Since 2001, the FBI has worked tirelessly to
implement effective organizational changes to meet their new priorities. The
FBI Houston Field Office strives to be a leader in these changes and uses its
innovative intelligence analysts to support critical FBI Missions. The FBI
Houston Field Office worked with Texas A&M University to better determine
What open sources can help forecast criminal and national security targets
in the Houston Domain of the future?
The Texas A&M University capstone worked diligently to help the FBI
better develop their sources of open-source intelligence. We produced
actionable open sources in four of eight areas of investigative interest. We
fixated on widely available data and information, targeted commercial data,
individual experts, and gray literature in the field of organized crime,
violent crime, terrorism, and white collar crime because of the high-level of
value to the FBI Houston area of responsibility.
I. INTRODUCTION
The Federal Bureau of Investigation (FBI) is the primary law
enforcement agency tasked with enforcing federal laws and upholding the
Constitution of the United States. Prior to 1908, law enforcement was
primarily the responsibility of local jurisdictions. In the early 1900s Henry
4
Fords Model-T rolled off the production line in providing the opportunity for
criminals to travel between jurisdictions quickly, leaving law enforcement
disadvantaged. The Department of Justice (DOJ) quickly realized it had no
one to investigate these cross-jurisdictional crimes and needed to borrow
criminal investigators from the Department of Treasury (DOT). However,
these loaned DOT federal employees were not meeting the needs of
Attorney General, especially after the assassination of President McKinley.
The growth of criminal enterprises across vast geographic distances forced
the Theodore Roosevelt administration to lay T foundation for todays
modern FBI.
The FBI is responsible for investigating crimes that fall into nine
general areas of investigative interest. Each regional or City field office
receives guidance regarding investigations from the main FBI Headquarters,
located in Washington D.C. In addition to national priorities, the Houston
Field Office determines specific areas of investigation based on the types of
5
crimes that are prevalent in the Houston domain. To generate the quality of
analysis required by our client, our capstone determined that it was
necessary for each sub-group to focus their research on specific types of
crime within the general areas of investigative interest. These particular
crimes were either currently prevalent in the Houston domain or had the
potential to appear in the Houston domain in the future.
6
II. LITERATURE REVIEW
Through research, we developed a method for identifying open sources
that inform possible future trends in crime. First, the culture and historical
context of the FBI have shaped how their investigative role has evolved over
time. Second, the use of open source intelligence (OSINT) in the Intelligence
Community (IC) has grown, since the dawn of the Internet Age. Third, the
development of scenarios which provide possible futures can aid planning for
uncertain futures. Each of these components of our research--FBI culture and
history, open source intelligence and scenario planninghas contributed to
the development of our methodology to research crime in the future.
The role of the FBI has changed throughout the 21st Century. In his
7
book, The FBI, Ronald Kessler provides insight into the FBIs culture, roles,
and priorities before this transformation into an intelligence-driven
organization. The FBI was primarily an investigative, law enforcement agency
which prioritized domestic crimes and criminal justice, (Kessler 1994).
President George W. Bush expanded the Bureaus mission to include a new
priority: prevent terrorism (Nobel 2016). This instantly transformed a
reactionary agency into one that must take proactive measures to identify
and prevent future criminal opportunities and threats.
10
III. METHODOLOGY
The capstone utilized the first semester of the two-semester project to
narrowly define the scope of the research question. A weekly evaluation of
the teams progress was recorded to inform future FBI capstones on avenues
that have received at least cursory consideration. We believe that evaluating
the process of defining our method is of value for reproduction of our work
and reapplication to future threat environments.
IV. ANALYSIS
Introduction
A. Organized Crime
After deliberating over the FBI national priorities and the particular
interests in Houston, our sub-group chose organized crime as our
investigative area. We specifically focused our research on human trafficking
due to the high incidence of this crime in Houston. In 2016, the National
Human Trafficking Resource Center (NHTRC) received the second largest
number of human trafficking reports from Texas. NHTRC also received the
greatest number of reports from Houston out of any other city in the U.S.
(Ricke 2016). Houston is an area of criminal opportunity for human trafficking
for several reasons. The city has diverse nationalities, religions, and
13
socioeconomic statuses, allowing victims from other areas to go unnoticed
upon arrival in the area. Houston is also one of the fastest growing
metropolitan areas in the country, with an extensive transportation structure
serving as a facilitation platform for human trafficking.
1. Fall Semester
Over the course of the fall semester, we sought to answer the following
question: What sources have led us to the current understanding of sex
trafficking? Using this question as a basis for our research, we discovered the
importance of understanding the actors, facilitation platforms, and targets of
sex trafficking in the development of this industry. The following table
highlights these key points, garnered from sources located in the Annex D of
this paper. Definitions of the following terms are also found in the Annex A.
14
Using these findings, we were able to narrow our focus on the FBIs
topic of interest: targets. The actors and facilitation platforms are critical to
identifying the targets of sex trafficking. Our spring semester research
question was based on this understanding.
The FBI IPR concluded our first semester of research. From the IPR, we
gained insight to guide us in our future research. Members of the FBI
encouraged us to pursue creative ways of thinking about each of our areas of
interest. Although there were no FBI personnel specifically focused on sex
trafficking to provide feedback, we were reassured that there was significant
interest in the issue of sex trafficking.
2. Spring Semester
15
the FBIs understanding of the future of sex trafficking? The sources located
in the Annex D provide a greater understanding of how sex trafficking will
change in the next 10 to 15 years. The following four sources are amongst
the most important for the FBIs consideration.
3. Evaluation of Sources
Several different terms are used in the literature to describe the same
concept. The most common term used is human trafficking, and it was
used approximately 62 percent of the time in our research, followed by sex
trafficking at about 25 percent. Other terms such as trafficking,
trafficking in persons, and child labor trafficking were used at 8 percent,
4 percent, and 2 percent, respectively.
17
5. Sample Conclusion
B. Violent Crime
Once a viable source of violent crime was identified the next step was
to deliberate and focus on a plan of action. We created a research question
that supported the capstones framework of determining sources from the
past 10-15 years that described, predicted, and/or forecasted the current
disposition of MS-13: Are there any past sources that would describe the
establishment and growth of MS-13 in the city of Houston? This allowed our
sub-group to narrow our research to find open sources that could potentially
highlight forecasting of the establishment and growth of MS-13 in Houston.
Our research found that up to 15 years ago, scholars were writing specifically
about the increased immigration from Central America, including El Salvador.
From this research, the first step for the establishment of MS-13 within
the U.S. would be centered on personnel coming from El Salvador. The
sources identified during the first semester (see FTST) provided links to the
immigration of gang members from El Salvador and their use of immigration
policy at the time to relocate into the United States. Once established, the
gang members used extreme and violent tactics to embed into American
gang culture. Applying this pattern coupled with the predictions of Houstons
demographics allowed us to pinpoint the sources that described both the
establishment and growth of MS-13. In summary, our research found that the
first semester granted us enough insurance to continue to analyze MS-13s
contribution to Houstons violent crime.
3. Evaluation of Sources
20
After research, it was evident that each MS-13 set differed in every
region, with one exception. The United States and El Salvador are the only
two sets that have a correlation (Carlos Garcia 2016) This gave us the
opportunity to explore International sources written in either English or
Spanish due to the sub-groups bilingual capability. This vital asset provided
our sub-group a new outlet of sources and led us to answer our research
questions.
From the violent crime sub-groups long list of sources (see FTST), we
found only a select set of sources recurred in both our fall and spring
semester research.
21
an information system solely focused on collecting, reviewing, and analyzing
data on immigration policy, and human rights in the United States-Mexico-
Central American region (Acerca del Observatorio de Legislacion y Politica
Migratoria 2012). This project looks at these issues from the federal, state,
and local level in both Mexico and the United States, and at the national level
from Central American countries. This source of information is of value in
seeing immigration trends, motivational factors, and most importantly it
presents implications. Additionally, this source reviews immigration policy
implications not only in the United States but throughout the region that
directly impacts gang membership increase or decrease as stated in the
Texas Gang Threat Assessments.
23
5. Sample Conclusion
C. Terrorism
In the spring semester, after FBI guidance from the IPR, the terrorism
sub-group decided to conduct research in four primary investigative areas: 1)
Terrorism Financing, 2) A Comparison of Domestic and International Research
Institutions, and 3) Counter-Radicalization
25
Initiatives. The terrorism sub-group found terrorist financing research is done
through multiple international collaboration efforts, such as the Financial
Action Task Force, OECD, IMF, and the World Bank. CVE findings were
consistent across academic sources, government sources. Notably, they
recommend a soft-power approach and developing counter-narratives.
International research and think tanks proved to each have different research
perspectives on terrorism. Think Tanks such as CSIS and RAND provide a
large-scale foreign policy approach to countering terrorism. In contrast, many
research institutions abroad, such as in Europe, view counter-terrorism as a
more local, domestic concern.
3. Evaluation of Sources
i. Terrorism financing
With the rise in social media and Internet use, terrorist organizations
such as ISIL can expand their potential donor reach to everyday citizens and
26
individuals, through activities such as crowdsource funding, and sharing
terrorist cause-based links via social media. The Meir Amit Intelligence &
Terrorism Information Center (ITIC), located in Israel, elaborated on new
methods of terrorist financing, including the non-profit transfer of funds to
terrorist activities. Additionally, the report discussed foreign fighter financing
challenges and opportunities. While individuals are much more difficult to
trace through financial patterns, FAFT emphasized that law enforcement can
identify key indicators such as multiple travelers from hometowns departing
on the same day.
28
Many European terrorism think tanks and research groups focus either
the majority or all of their efforts on CVE. European nations have a much
larger number of foreign fighters who have joined ISIL, and multiple countries
have dedicated resources to researching methods to reduce radicalization.
Sweden, Germany, France, the Netherlands, and the United Kingdom are all
nations that have anti-Radicalization specific research institutes. The
University of Leidens Institute of Global and Security Affairs, in the
Netherlands, has a project which will become finalized this year, to counter
radicalization--titled PRIME: Predicting, Interdicting and Mitigating Extremism.
PRIME calls for an interdisciplinary approach to CVE. Within the PRIME
Project, Leiden Universitys Centre for Terrorism and Counterterrorism (CTC)
main responsibility is to oversee the development of a detailed script
outlining the manner in which lone actor extremists prepare for their attacks
(PRIME, 2017). Radicalization Research, a nonpartisan organization in the UK
also supports this interdisciplinary approach to CVE, calling for collaboration
between primary and secondary schools, local law enforcement, the judiciary
system, and international counter-terrorism organizations (Aims, 2017).
31
marginalization, and personal grievances that might push individuals to
extremist organizations; and individual characteristics like impulsiveness,
recklessness, and thrill seeking that skilled recruiters use to pull recruits
into their causes. Nevertheless, many Muslim millennials across the globe
suffer from a profound identity crisis. From Boston to Paris, Nairobi to
Dhaka, young Muslims are struggling to find purpose and questioning how
their Muslim faith fits into a globalized, connected world (Proctor and Green
2016).
33
5. Sample Conclusion
Our sub-group researched white collar crime and future crime during
this two-semester capstone. Unlike, our peer sub-groups, we transitioned
from one research area to another after we found that the majority of white
collar crimes in the past 15 years are in-part due to technological
disruptions. That is, criminal opportunities form at the intersection of
targets, actors, and platforms by way of leveraging criminal insights into
technology that law enforcement is unable to prevent due to inadequacies in
current laws, knowledge, or administration. Our intent is not to make precise
predictions, rather, to illuminate open sources that point to likely future
technological disruptions that are based on emerging technologies that are
vulnerable to criminal exploitation. As our research during the first semester
indicates, many of the technological disruptions that exist today were
foreseen by several different types of sources. This finding highlights the
value of looking to a diverse set of sources to investigate and prioritize future
criminal vulnerabilities to enable prevention by appropriate law enforcement
agencies.
34
Management, Enron, and WorldCom scandals gained the attention and
required the resources of the FBI. These crimes had nation-wide
consequences regarding lost jobs, lost pensions, devalued investments, and
the loss of trust in financial institutions. Houston also has the dubious
distinction of being ground zero for MEDICARE fraud and leads the nation
in prosecutions related to these types of crimes. As reported by the Houston
Chronicle, some of the largest frauds in the nation have been unearthed in
the Houston area, and greed and easy money drive the schemes, and the
Houston area has plenty of both (Banks 2016). In June of 2016, as part of a
nationwide sweep the Southern District of Texas (SDTX), the United States
Attorneys Office (USAO) and the Department of Justice Medicare Fraud Strike
Force charged 22 individuals in 11 cases involving over $136 million in the
alleged fraud (USAO, Southern Texas 2016). Its clear the Houston Domain
remains an area in which Healthcare fraud is a significant issue and will
continue to be so in the near future.
Over the course of the fall semester, our sub-group researched several
cases of Healthcare fraud. During this period of the capstone, our research
question was what open sources are currently reporting on, or who have
previously reported on, data, trends, and models regarding Healthcare Fraud
in the United States. During our research, we identified the Targets, Actors,
and Platforms involved in each healthcare fraud case and looked for patterns
among these cohorts. This method of the investigation led us to several
types of sources who were reporting on healthcare fraud, well beyond our
initial expectations. For example, we discovered that the Criminal Justice
Section of the American Bar Association (ABA) had a White Collar Crime
Institute which produced a newsletter and held annual conferences. Many of
the presentations included material on trends within a particular facet of
white collar crime, including healthcare fraud (ABA 2016). Another source of
information was the American Society of Criminology which also held annual
35
conferences and published articles like Todays White Collar Crime: What
Have We Learned in the Past 70 Years? (Brightman 2009). In summary,
there were many open sources of information regarding healthcare fraud that
were not produced by law enforcement agencies but those with a vested
interest in the field of study like law schools, industry groups, and various
academic and professional journals.
Our sub-group had three general findings during the fall semester. The
first is that changes in technology (platforms) have caused exponential
growth in the cases of healthcare fraud. The combination of electronic
medical records, computer-based patient information, internet based claims,
and the lack of fraud detection mechanisms (software) created a perfect
storm of vulnerabilities and opportunities for criminal actors. The second
finding is that there is an increasing number of providers and administrators
(those with access to patient information) who are willing to perpetrate
fraud. Within the last twenty years, doctors, nurses, pharmacists, ambulance
companies, nursing home employees, and medical supply company
employees are increasingly willing to perpetrate a relatively low-risk, high-
reward crime and place their greed above the care of patients. Our sub-
group's third finding is that academic and professional journals were both the
36
most numerous and best sources of information regarding information about
healthcare fraud. For example, every major law school in the U.S. produces a
regular newsletter or full journal. Unlike media reports, Academic journals go
beyond just reporting the facts they are peer-reviewed, often contain
sections on criminal cause and effect, and usually address the future
implications of trends or emerging aspects of criminal targets, actors or
platforms. For example, in June of 2014, the Notre Dame Journal of Law,
Ethics, and Public Policy published an article entitled White Collar Crime:
What It Is and Where Its Going. From the introduction:
This is just one example of open source information about the future of
crime contained in an Academic Journal. Industry or professional groups also
have a vested interest in the particular crimes which affect the lawful
conduct of their business. As such, they are willing to share information and
expose actors and platforms which undermine the credibility and faith in
their business models or bring unwanted scrutiny to their business practices.
This type of information is often published in trade-specific magazines,
newsletters, websites, blogs, and conferences.
37
models regarding the future of crime in the United States. Unlike crimes
already committed and prosecuted, there are much fewer open sources of
information that describe or predict future crimes. Individuals and groups
who specifically research future crimes are very limited; no one has a
formula or model for predicting and identify crimes 10-15 years in the future.
What these individuals normally do is describe trends, like those associated
with Social, Technological, Economic, Environmental or Political changes, that
may create different scenarios (or alternate futures) in which criminals may
emerge and/or find new opportunities. This discovery caused our sub-group
to refine its research focus towards specific drivers of change. Also, there will
be acts perpetrated by individuals that are not crimes today say groping or
robbing of individuals in Virtual Reality (VR) worlds or medical identity theft
through stealing of a DNA sequence that may be crimes in the future. The
one thing we can be certain of is this the future will contain some new
criminal targets, actors, and platforms, as well as different combinations of
these three elements which may or may not be the result of trends that are
visible today.
3. Evaluation of Sources
i. Bruce Schneier
A lecturer and fellow at the Harvards JFK School of Public Policy, Bruce
Schneier has been called the security guru by the Economist. Bruce is the
author of 13 books, hundreds of articles, academic papers, and has testified
before Congress on the criminal implications of internet security (Schneier,
About Bruce Schneier 2017).
40
private homes to initiate the largest denial service attack ever launched. The
attack affected internet users ability to access major social media and
shopping websites along the East Coast of the United States. Home
appliances, traffic infrastructure, the power grid, and even our water supply
are connected to the internettherefore vulnerable to attack by hackers. As
the internet of things becomes a more pervasive element in our society,
attacks like the October 21st attack are just the beginning. (Schneier, Click
Here to Kill Everyone 2017, O'Brien 2016)
3-D printers will increase in capability and use by society by the year
2025. Scientist and developers have already demonstrated less advanced
applications of 3-D printers by printing human cartilage. According to
Kurzweil, the 3-D printers will be sophisticated enough to print clothing and
organs like downloading an eBook with pre-packaged materials. (Howard
2015)
41
jawbones. Scientists are working diligently to achieve revolutionary
accomplishments that will change medicine forever and affect the illegal
medical change as well. (Ventola 2014)
42
Colombia are already using drones for the transportation of narcotics. In
Britain, drones have been used by gangs for the delivery of cell phones,
guns, and drugs to convicts in Prisons nine times in 2014 (Milmo 2016). ISIS
is also reportedly using small drones to drop bombs on Iraqi troops. Criminals
and terrorists could use mounted weapons on inexpensive drones and attack
targets just as easily as the intoxicated government employee that landed a
similar drone on the White House lawn in 2015the most protected house in
the United States (Sanchez 2015, Schogol 2017). Bank robbers, domestic
gangs, and other criminal elements may use drones to attack and surveil law
enforcement just as more sophisticated criminals could use drones to
conduct industrial espionage. (Goodman, A view from the unfriendly skies:
How criminals are using drones 2013)
As a celebrity speaker and futurist, Thomas Frey has written about the
implications of future advances in technology on society, and regularly
speaks to Fortune 500 companies like Boeing, GE, Pepsi, and Visa. Thomas
has also been featured in articles in publications such as Popular Science,
The New York Times, National Geographic, and Forbes. (Frey, Thomas Frey
Biography 2016)
v. Michio Kaku
Dr. Michio Kaku is a theoretical physicist and author that has written
several bestselling books on the future. Michio has also been featured on
several television programs on Discovery, Science, and BBC in addition to
being a contributor on the show CBS: This Morning. Dr. Kaku holds a B.S.
from Harvard and a doctorate from the University of California, Berkley.
(Kaku, About Dr. Michio Kaku 2017)
5. Sample Conclusion
V.
RECOMMENDATIONS
46
The Department of Justice should partner with
academics, government agencies, and nonprofit
organizations
47
13 sets begin to develop a consolidated structure, it will likely indicate
an evolution to organized crime.
C. Terrorism Sub-Group
48
perspective for (relevant stakeholders in terrorism research and
crafting responses to terrorism, improving the quality of research that
informs FBI and DOJ level policymaking to counter terrorism) both the
primary and tertiary contributors to terrorism research. Both
organizations share a common theme, and most law enforcement
agencies use the FBI definition which stresses methods over
motivations. For example, incidents may or may not be labeled
incidents of domestic terrorism or crime which could affect funding
availability and future responses. A common definition of both the
problem and the solution would allow for more collaboration, effective
measurement of response initiatives, and better indicators of potential
violations of civil liberties.
49
The Houston Field Office should contract fringe sources
(e.g. futurists like Marc Goodman) to work in
cooperation with a Houston research firm to
50
VI. FUTURE RESEARCH
Limited resources, including time and human capital, required the
capstone to develop a project scope which focused on four of the FBIs nine
areas of investigative interest. Our capstone team recognizes further
research must be completed in order to understand all of the available
sources related to future crime, and to develop effective methods to make
better use OSINT. Further research needs to be done in the following topic
areas: the utilization of the sources, information sharing, counter-messaging,
disinformation, trend analysis, red-teaming, and alternative future
scenarios. Accurate information is essential to provide the FBI and its
partners with actionable intelligence and the data required to prioritize
resources - all with the goal of staying one step ahead of criminal actors. All
of the suggested areas of study require the continued pursuit of healthy
relationships with community and inter-agency partners as well as the
integrity of information.
Our capstone team identified potentially untapped sources for the FBI
to include in its decision cycle. However, further research is needed in how
the FBI could utilize, disseminate and develop relationships to better serve
its mission. Building relationships, especially with organizations and
individuals identified in this report, is essential for the FBI to maintain a
competitive advantage in the current or future environment where criminal
actors have an advantage. The information needs to seamlessly flow or be
gathered from the source to the FBI and (potentially) vice-versa. Information
sharing mechanisms already exist, but there are obvious problems with the
dissemination of the information to all professional groups who have equity
in certain criminal activity. The Houston Field Offices FIG or another
capstone should analyze the information sharing mechanisms, and explore
how they could be better organized, marketed or improved. They could
51
research the barriers to communications and determine how to strategically
target information and the OSINT sources we have provided throughout this
report. Also, the FBI could contract an outside academic or professional
organization to conduct research on potential future criminal targets, actors,
and platforms within a specific area like financial crimes or human trafficking.
Studying the information sharing mechanisms, both between law
enforcement agencies and with private industry or academia is important
because the owners of critical infrastructure or business/industries have a
vested interest in ensuring the legal and regulated practice of commerce.
ANNEX A: DEFINITIONS
Academic Sources: Sources from an educational environment or
community concerned with the pursuit of research, education, and
53
scholarship.
54
communications, cultural, philanthropic, financial and non-government
sectors (Homeland Security Advisory Council 2016).
Conclusions
56
sector communication between different areas of study. It also
leads to a misunderstanding of the issue and a miscalculation of
the scale of the sex trafficking industry.
Conclusions
57
indicators present in current sources can offer a prediction of
future evolution.
Conclusions
Conclusions
59
3 Fringe sources like futurists are of value for the following
reasons:
1) Futurists are vested in thinking of the unthinkable or taking
the intellectual risk to think out of the box as their careers and
reputations depend on their ability to occasionally get it right.
2) They use the methods of red teaming to think and act like
potential criminals. Many futurists have spent decades
publishing and speaking on the future of technology and how it
may intersect with society.
60
ANNEX C: DEMOGRAPHIC CHANGES THROUGH 2050
61
62
ANNEX D: BIBLIOGRAPHY
"18 USC 16: Crime Of Violence Defined". 1984. U.S. Code.
http://uscode.house.gov/view.xhtml?
req=(title:18%20section:16%20edition:prelim)%20OR
%20(granuleid:USC-prelim-title18-
section16)&f=treesort&edition=prelim&num=0&jumpTo=true.
"About". 2017. Official Website Of Dr. Michio Kaku. Accessed March 19.
http://mkaku.org/home/about/.
Abrahms, Max. 2008. "What Terrorists Really Want: Terrorist Motives And
Counterterrorism Strategy". International Security 32 (4): 78-105.
doi:10.1162/isec.2008.32.4.78.
63
doi:10.5038/1944-0472.5.4.5.
Banks, Gabrielle. 2016. "Houston Area Seen As A Major Hub For Medicare
Fraud". Houston Chronicle.
http://www.houstonchronicle.com/news/houston-
texas/houston/article/Medicare-strike-team-targets-doctors-nurses-in-
8324174.php.
Benjamin, Daniel, and Steven Simon. 2016. "The Global Terror Threat In
2016: A Forecast". CTC Sentinel 9 (1): 1-4.
https://www.ctc.usma.edu/v2/wp-content/uploads/2016/01/CTC-
SENTINEL-Vol9Iss12.pdf.
Center for Strategic & International Studies,. 2016. Turning Point: A New
Comprehensive Strategy For Countering Violent Extremism. Washington,
D.C.: Center for Strategic & International Studies. https://csis-
ilab.github.io/cve/report/Turning_Point.pdf.
64
"Child Welfare Information Gateway". 2017. Accessed March 19.
https://www.childwelfare.gov/.
Cliff, Gerald, and Christian Desilets. 2014. "White Collar Crime: What It Is
And Where It's Going". Notre Dame Journal Of Law, Ethics & Public Policy
28 (2). http://scholarship.law.nd.edu/cgi/viewcontent.cgi?
article=1733&context=ndjlepp.
Crenshaw, Martha, and Gary LaFree. 2017. Countering Terrorism. 1st ed.
Washington, D.C.: Brookings Institution Press.
65
Fernandez, Alberto. 2016. "MEMRI Vice President Alberto Fernandez's
Testimony To Senate Committee On Homeland Security And
Governmental Affairs, July 6, 2016 - ISIS Online: Countering Terrorist
Radicalization And Recruitment On The Internet And Social Media". The
Middle East Media Research Institute.
https://www.memri.org/reports/memri-vice-president-alberto-fernandezs-
testimony-senate-committee-homeland-security-and.
Garcia, Carlos. 2017. "6 Common Misconceptions About The MS13 Street
Gang". http://www.insightcrime.org/news-analysis/6-common-
misconceptions-ms13-gang.
Goodman, Marc. 2013. "Criminals And Terrorists Can Fly Drones Too".
Time. http://ideas.time.com/2013/01/31/criminals-and-terrorists-can-fly-
drones-too/.
Goodman, Marc. 1997. "Why The Police Don't Care About Computer
Crime". Harvard Journal Of Law & Technology 10 (3): 465-494.
http://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech465.pdf.
Goodman, Marc. 2016. "Hacking The Human Heart". Blog. Big Think.
http://bigthink.com/future-crimes/hacking-the-human-heart.
66
Goodman, Marc. 2013. "A View From The Unfriendly Skies: How Criminals
Are Using Drones". Blog. Drones: Will They Save Us Or Destroy Us?.
http://ideas.ted.com/attack-of-the-drones-a-view-from-the-unfriendly-
skies/.
Howard, Jacqueline. 2015. "7 Top Futurists Make Some Pretty Surprising
Predictions About What The Next Decade Will Bring". The Huffington Post.
http://www.huffingtonpost.com/2015/05/12/futurists-next-10-
years_n_7241210.html.
Jenkins, Brian. 2016. "U.S. More Able Than Ever To Combat Terrorism".
Blog. The RAND Blog. http://www.rand.org/blog/2016/09/us-more-able-
than-ever-to-combat-terrorism.html.
67
"John P. Sullivan". 2017. Small Wars Journal. Accessed March 19.
http://smallwarsjournal.com/author/john-p-sullivan?page=1.
Kaku, Michio. 2013. "A Scientist Predicts The Future". The New York
Times. http://www.nytimes.com/2013/11/28/opinion/kaku-a-scientist-
predicts-the-future.html.
Kessler, Ronald. 1994. The FBI: inside the world's most powerful law
enforcement agency--by the award winning journalist whose
investigation brought down FBI director William S. Sessions. New York:
Pocket Books, 1994.
Laczko, Frank. 2002. "Human Trafficking: The Need For Better Data". The
Online Journal Of The Migration Policy Institute.
http://www.migrationpolicy.org/article/human-trafficking-need-better-
data.
Nobel, Carmen. 2016. "How The FBI Reinvented Itself After September
11." Forbes. Accessed October 11, 2016.
69
Ricke, Claire. 2016. "Houston Has Highest Number Of Human Trafficking
Victims Nation-Wide". KXAN. http://kxan.com/2016/03/28/houston-has-
highest-number-of-trafficking-victims-nation-wide/.
Schogol, Jeff. 2017. "ISIS Using Small Drones To Drop Bombs On Iraqis".
Military Times.
Schwartz, Peter. 2007. The art of the long view: planning for the future
in an uncertain world. Chichester: Wiley.
Segal, Adam. 2016. The Hacked World Order. 1st ed. New York, NY: Public
Affairs.
70
http://www.insightcrime.org/investigations/the-ms13.
The United States Attorney's Office for the Southern District of Texas,.
2016. 22 Charged In SDTX As Part Of Largest National Medicare Fraud
Takedown In History. https://www.justice.gov/usao-sdtx/pr/22-charged-
sdtx-part-largest-national-medicare-fraud-takedown-history.
71
"Who we are." About - Financial Action Task Force (FATF). 2017. Accessed
2017. http://www.fatf-gafi.org/about/.
72