Comprehensive University Study Notes on Federal Terrorism Law, Cyberwarfare, and Transnational Cartels

Federal Terrorism Statutes and Legislation

  • General Legality of Terrorism     - Terrorism is not a new legal concept; many terrorism-related statutes have existed for years.     - These laws often relate to specific violent acts associated with terror, including attacks on vessels, biological weapons, and nuclear materials.
  • Federal Laws and Codes     - Federal statutes are modified and expanded through the passage of various ‘Acts’.     - Statutory changes usually occur through small, incremental additions and modifications throughout the federal code rather than in large, singular shifts.
  • Antiterrorism and Effective Death Penalty Act of 19961996 (AEDPA)     - Note: Transcript lists date as 19981998, though context refers to the reactive nature of the legislation.     - Historical Catalyst: Reactive to the 19931993 World Trade Center bombing and the 19951995 Oklahoma City Bombing.     - Habeas Corpus: Primarily known for placing significant limits on the law of habeas corpus within the United States.     - Immigration Provisions:         - Established mandatory detention for certain non-citizens in government custody.         - Enforced provisions specifically targeting non-citizens possessing criminal histories.     - Terrorism-Specific Provisions:         - Provisions for victims of terrorism.         - Increased sentencing potential for convicted terrorists.         - Enhanced exclusion and removal processes for ‘alien terrorists’ and the denial of asylum to individuals so classified.         - Enhanced penalties for those conducting business or dealings with countries that support terrorism.         - Expanded prohibitions regarding nuclear, chemical, and biological materials.

Specific Federal Terrorism Statutes and Jurisdiction

  • Title 1818, Chapter 113B113B     - This specific section of the federal code focuses on:         - Weapons of mass destruction (WMDWMD).         - International terrorism.         - Missile systems.         - Bombings.         - Radiological dispersion devices.         - Nuclear terrorism.
  • Supporting Terror (Indirect Offenses)     - Chapter 113B113B also covers indirect criminal acts:         - Harboring or concealing terrorists.         - Providing material support to terrorists.         - Providing material support to designated terrorist organizations.     - Defining Organizations: Terrorist organizations are defined via the Immigration and Nationality Act (INAINA) and as designated by the Secretary of the Department of Homeland Security (DHSDHS).     - Financing: Explicitly criminalizes the sending of money to these organizations.
  • Rationale for Federal Prosecution     - Resources: The federal government generally possesses more resources than local jurisdictions.     - Sentencing: Federal convictions often result in longer sentences.     - Jurisdiction: For many terrorism offenses, the federal government maintains the only viable jurisdiction.
  • Constitutional Authority for Action     - Article 11, Section 88: Provides a limited list of authorities granted to Congress.     - The Commerce Clause: Serves as the primary ‘work-around’ for federal jurisdiction. It states Congress has authority to ‘Regulate commerce with foreign nations and among the several states and with the indian tribes.’
  • Authorization of Use of Military Force (AUMF)     - Passed: September 1818, 20012001.     - Mandate: Authorizes the President to use ‘all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 1111, 20012001, or harbored such organizations or persons.’     - Significance: The AUMFAUMF is the foundational authority for every U.S. military action since 9/119/11 in the ‘War Against Terror.’

The USA PATRIOT ACT

  • Full Name: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
  • Legislative History:     - Passed reactively after the September 1111th attacks.     - Senate Vote: Passed with only 11 dissenting vote.     - House Vote: Passed with 6666 votes (Note: likely refers to the margin or specific count in transcript context).     - Signed: By President G.W. Bush on October 2626, 20012001.     - Sunsets: Included sunset provisions for potentially controversial sections to allow for future Review.
  • Introduction of New Crimes:     - Terrorist attacks on mass transit.     - Biological weapons offenses.     - Harboring and providing support to terrorists (integrated into Title 1818 Chapter 113B113B).     - New money laundering offenses.     - Fraudulent charitable solicitation.     - Conducting interstate business in support of a terrorist organization.
  • Enhanced Criminal Penalties:     - New maximum penalties for terrorist acts.     - Increased penalties for terrorism conspiracies.     - Increased penalties for counterfeiting, cybercrime, and charity fraud.
  • Procedural and Investigative Changes:     - Increased rewards in terrorism-related cases.     - Expansion of exceptions to the Posse Comitatus Act.     - Sneak-and-Peek Warrants: Authorized delayed-notice search warrants.     - Title IIIIII Predicates: Increased the number of terrorism offenses that allow for wiretapping.     - Roving Wiretapping: Permitted wiretaps to follow a person rather than a specific device.     - Jurisdictional Expansions: Allowed search warrants to span multiple judicial districts.     - FISA Court Business Record Requests: Expanded the ability to request records via the Foreign Intelligence Surveillance Act court.

Surveillance, Metadata, and Privacy

  • Section 215215 of the PATRIOT Act     - Interpreted to include the collection of phone call metadata.     - Edward Snowden: Released information in 20132013 regarding the NSANSA program involved in capturing this metadata.     - Status: Section 215215 expired, was renewed in 20152015 as part of the USA FREEDOM Act, and finally expired after being passed by the House in 20202020.
  • Standards for Government Access     - Record Material: Requires a Subpoena.     - Content Material: Requires a Search Warrant.     - Live Capture of Record Material: Requires a Court Order.     - Electronic Intercept: Requires a Title IIIIII Order from the court.
  • Border Search Authority     - Customs law permits the search of all goods at crossings.     - Case law has extended this authority to digital media, though recent rulings have begun to place some limits on government access.

The Homeland Security Enterprise

  • Mitigation and Protection     - Private Sector: Primarily responsible for ‘hardening targets’ as they own most of the resources and infrastructure.     - Government Role: Focuses on coordination and establishing a culture of preparation.
  • Executive Branch Involvement     - Nearly every department has resources dedicated to counterterrorism.     - Example: The Department of Energy manages potential nuclear hazards.
  • Homeland Security Act of 20022002     - Restructured and moved 2222 federal agencies under the newly created Department of Homeland Security (DHSDHS).     - Dual mission: Overarching counterterrorism mandate while maintaining existing agency functions.
  • Preventative Resources     - CISA: Cybersecurity and Infrastructure Security Agency.     - Coordinating Councils: Use of Sector Coordinating Councils and Government Coordinating Councils.     - Agencies: Includes USSSUSSS (Secret Service), FEMAFEMA, and transportation security components.
  • Border Security and National Security     - 19031903 Immigration Act: Known as the Anarchist Exclusion Act.     - 19961996 Antiterrorism Act: Targeted criminal non-citizens for removal.     - Post-20012001: Targeted those in the U.S. illegally from countries with histories of fundamentalist terror.
  • Intelligence and Coordination     - Director of National Intelligence (DNI): Created post-9/119/11; notably remains separate from the DHSDHS.     - Fusion Centers: Federally funded but locally operated centers for DHS coordination.
  • Local Response     - Response is primarily a local function.     - Growth of specialized units and the militarization of law enforcement (influenced by attacks like the one in Mumbai).

Cyber Terrorism and Critical Infrastructure

  • The Threat Landscape     - High-level cyber attacks typically originate from nation-states or international criminal organizations rather than conventional ‘terror’ groups.     - Internet of Things (IOT): Connectivity in residential and commercial products has increased surface area for risks.
  • Defining Critical Infrastructure     - Assets, systems, and networks (physical or virtual) vital to the U.S. whose destruction would have a debilitating effect on security, economic security, or public health.
  • Technical Infrastructure     - SCADA (Supervisory Control and Data Acquisition): Software that interfaces between machinery and people, often via the internet.     - PLCs (Primary Logic Controllers): Computing devices that take measurements and permit the actual control of industrial machines.
  • Historical Incidents and Response     - 20082008 DOD Breach: The ‘Agent.btz’ worm spread via a thumb drive found in a Middle Eastern base parking lot.     - Operation Buckshot Yankee: The DOD response to the 20082008 breach.     - U.S. Cyber Command: Began operations in 20102010; coordinates military cyber efforts and interfaces with law enforcement and intelligence.

Major Cyber Operations and Actors

  • Stuxnet (20102010)     - Complex malware identified by a security firm in Belarus.     - Used 44 zero-day exploits and stolen Windows driver signatures from Taiwanese companies.     - Target: Natanz nuclear facility in Iran. Specifically targeted Siemens SCADA software to damage centrifuges.     - Operation Olympic Games: Alleged joint joint project between American and Israeli agencies.     - The Equation Group: Asset of the American NSANSA associated with the code.
  • The Shadow Brokers     - A hacking organization that leaked NSANSA-derived tools.     - Associated with Russian nationals; leaked information via Twitter and WikiLeaks.
  • APT Groups (Advanced Persistent Threats)     - Unique entities identified by patterns, such as the IP address of Command and Control (C2C2) services.
  • Russian Federation Actions     - APT 2828 and 2929: Known as ‘Fancy Bear’ and ‘Cozy Bear’; breached the DNCDNC network between July 20152015 and June 20162016.     - CyberBerkut: Pro-Russian hacktivist group involved in Ukrainian and NATONATO breaches.     - Notable Attacks: 20072007 Estonian attacks, 20152015 Ukrainian power grid attacks, and the 20172017 NotPetya ransomware.     - GRU Unit 7445574455: Officers indicted in 20182018 and 20202020 for attacks on the power grid, French elections, and the Sergei Skripal poisoning investigation.
  • Chinese Actions     - OPM Breaches: Involved the U.S. Office of Personnel Management in 20142014 and 20152015.     - Operation Aurora: Attacks on high-tech companies.     - PLA Unit 6139861398 (APT11): Active since at least 20062006; tied to industrial breaches paralleling Five-Year Plan goals. Five officers indicted in 20142014.
  • North Korean Actions     - Bureau 121121: Cyberwarfare element of intelligence services.     - Sony Hack (20142014): Carried out by ‘Guardians of Peace’; involved data wiping and threats regarding the film ‘The Interview’.     - Wannacry (20172017): Ransomware using the ‘Eternal Blue’ vulnerability. Stopped by a researcher registering a ‘kill switch’ domain.     - Park Jin Hyak: Indicted in 20182018; alleged member of Lab 110110.
  • Iraqi and Israeli Actions     - Iran: DDOSDDOS attacks against U.S. financial interests and manipulation of dam infrastructure in New York.     - Israel: Unit 82008200 of the IDFIDF; associated with Stuxnet and a 20072007 attack on Syrian air defenses.

Drug Cartels and the Phases of Development

  • Bunker and Sullivan (20102010) Phases     - 11st Phase: Aggressive, indiscriminately violent, hierarchical, and dependent on strong leadership (e.g., Medellin Cartel).     - 22rd Phase: Subtle, symbolic violence, cellular structure, focused on drug product, reliant on widespread corruption (e.g., Cali Cartel).     - 33rd Phase: The ‘Criminal State’ model where the criminal organization is completely enmeshed with the political entity.
  • The Medellin Cartel     - Led by figurehead Pablo Escobar; used brute force against the Colombian government.     - Focused on cocaine and successfully fought against extradition laws using the M19M-19 group.
  • The Cali Cartel     - Decentralized control; relied on corruption of state authorities rather than open warfare.
  • Mexican Drug Trafficking Organizations (DTOs)     - Guadalajara Cartel: Led by Miguel Felix-Gallardo. Murdered DEADEA Agent Enrique Camarena, leading to a massive U.S. crackdown.     - The Plazas: Following prosecution, the Guadalajara cartel was split into three ‘plazas’ or corridors for U.S. border passage.     - Major Groups:         - Sinaloa Cartel: LED by Joaquin ‘El Chapo’ Guzman and Ismael Zambada.         - Jalisco New-Generation Cartel (CJNGCJNG): Leader Ruben Oseguera-Cervantes (‘El Mencho’) killed in February 20262026. His son Ruben Oseguera-Gonzalez extradited to the U.S.         - Gulf Cartel: Spun off Los Zetas (initially enforcers).
  • Evolution toward Narcoterrorism     - Defined as the widespread use of fear to influence policy or public opinion.     - First Usage: President Belaunde of Peru in 19831983 regarding drug traffickers battling police and the ‘Shining Path’ group.     - FTO Designation: In January 20252025, several Mexican cartels were designated as Foreign Terrorist Organizations (FTOsFTOs).

Transnational Organized Crime

  • Globalization Impact     - Facilities of movement and communication have expanded criminal opportunities across borders.
  • Organizational Evolution (Zabyelina)     - Evolution through ‘Predatory’, ‘Parasitic’, and ‘Symbiotic’ stages with government.
  • Albanese (20122012) Categories     - Illicit Goods: Drugs, stolen property, counterfeiting.     - Illicit Services: Human trafficking, cybercrime/fraud, commercial vices.     - Infiltration: Extortion, racketeering, money laundering, corruption.
  • Human Smuggling vs. Trafficking     - Smuggling: Migrants finding their way to a destination for a fee (commercial endeavor).     - Trafficking: Involves coercion and exploitation (e.g., sex trafficking). Established in U.S. law via the Trafficking Victims Protection Act of 20002000.
  • International Agreements     - U.N. Convention against Transnational Organized Crime (20002000): Targets the multijurisdictional challenges of evidence and witnesses.

State Sponsorship of Terrorism

  • Advantages for Organizations     - Financial support, technical development, and government resources (safe houses, fake documents).     - Attacks supported by nation-states have been found to be 88 times deadlier in recent decades.
  • Tactical Utility for States     - Advanced foreign policy objectives with built-in plausible deniability.
  • U.S. State Sponsors of Terrorism List     - Iran     - Syria     - North Korea (added 20172017)     - Cuba (added 20212021)
  • Recent Removals     - Sudan: Announced for removal in October 20202020 after agreeing to compensate victims of the 19981998 U.S. Embassy bombings and recognizing Israel.
  • Political Ambiguity and Exclusions     - Pakistan: Not on the list despite pledges to dismantle organizations being incomplete.     - Lebanon: Presence of Hizballah in the government impedes action.     - Challenges: Inclusion is often driven by political implications rather than objective standards. Groups like Mujahedin-e Khalq (MEKMEK) complicate these definitions.