Comprehensive University Study Notes on Federal Terrorism Law, Cyberwarfare, and Transnational Cartels
Federal Terrorism Statutes and Legislation
- General Legality of Terrorism
- Terrorism is not a new legal concept; many terrorism-related statutes have existed for years.
- These laws often relate to specific violent acts associated with terror, including attacks on vessels, biological weapons, and nuclear materials.
- Federal Laws and Codes
- Federal statutes are modified and expanded through the passage of various ‘Acts’.
- Statutory changes usually occur through small, incremental additions and modifications throughout the federal code rather than in large, singular shifts.
- Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA)
- Note: Transcript lists date as 1998, though context refers to the reactive nature of the legislation.
- Historical Catalyst: Reactive to the 1993 World Trade Center bombing and the 1995 Oklahoma City Bombing.
- Habeas Corpus: Primarily known for placing significant limits on the law of habeas corpus within the United States.
- Immigration Provisions:
- Established mandatory detention for certain non-citizens in government custody.
- Enforced provisions specifically targeting non-citizens possessing criminal histories.
- Terrorism-Specific Provisions:
- Provisions for victims of terrorism.
- Increased sentencing potential for convicted terrorists.
- Enhanced exclusion and removal processes for ‘alien terrorists’ and the denial of asylum to individuals so classified.
- Enhanced penalties for those conducting business or dealings with countries that support terrorism.
- Expanded prohibitions regarding nuclear, chemical, and biological materials.
Specific Federal Terrorism Statutes and Jurisdiction
- Title 18, Chapter 113B
- This specific section of the federal code focuses on:
- Weapons of mass destruction (WMD).
- International terrorism.
- Missile systems.
- Bombings.
- Radiological dispersion devices.
- Nuclear terrorism.
- Supporting Terror (Indirect Offenses)
- Chapter 113B also covers indirect criminal acts:
- Harboring or concealing terrorists.
- Providing material support to terrorists.
- Providing material support to designated terrorist organizations.
- Defining Organizations: Terrorist organizations are defined via the Immigration and Nationality Act (INA) and as designated by the Secretary of the Department of Homeland Security (DHS).
- Financing: Explicitly criminalizes the sending of money to these organizations.
- Rationale for Federal Prosecution
- Resources: The federal government generally possesses more resources than local jurisdictions.
- Sentencing: Federal convictions often result in longer sentences.
- Jurisdiction: For many terrorism offenses, the federal government maintains the only viable jurisdiction.
- Constitutional Authority for Action
- Article 1, Section 8: Provides a limited list of authorities granted to Congress.
- The Commerce Clause: Serves as the primary ‘work-around’ for federal jurisdiction. It states Congress has authority to ‘Regulate commerce with foreign nations and among the several states and with the indian tribes.’
- Authorization of Use of Military Force (AUMF)
- Passed: September 18, 2001.
- Mandate: Authorizes the President to use ‘all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons.’
- Significance: The AUMF is the foundational authority for every U.S. military action since 9/11 in the ‘War Against Terror.’
The USA PATRIOT ACT
- Full Name: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
- Legislative History:
- Passed reactively after the September 11th attacks.
- Senate Vote: Passed with only 1 dissenting vote.
- House Vote: Passed with 66 votes (Note: likely refers to the margin or specific count in transcript context).
- Signed: By President G.W. Bush on October 26, 2001.
- Sunsets: Included sunset provisions for potentially controversial sections to allow for future Review.
- Introduction of New Crimes:
- Terrorist attacks on mass transit.
- Biological weapons offenses.
- Harboring and providing support to terrorists (integrated into Title 18 Chapter 113B).
- New money laundering offenses.
- Fraudulent charitable solicitation.
- Conducting interstate business in support of a terrorist organization.
- Enhanced Criminal Penalties:
- New maximum penalties for terrorist acts.
- Increased penalties for terrorism conspiracies.
- Increased penalties for counterfeiting, cybercrime, and charity fraud.
- Procedural and Investigative Changes:
- Increased rewards in terrorism-related cases.
- Expansion of exceptions to the Posse Comitatus Act.
- Sneak-and-Peek Warrants: Authorized delayed-notice search warrants.
- Title III Predicates: Increased the number of terrorism offenses that allow for wiretapping.
- Roving Wiretapping: Permitted wiretaps to follow a person rather than a specific device.
- Jurisdictional Expansions: Allowed search warrants to span multiple judicial districts.
- FISA Court Business Record Requests: Expanded the ability to request records via the Foreign Intelligence Surveillance Act court.
- Section 215 of the PATRIOT Act
- Interpreted to include the collection of phone call metadata.
- Edward Snowden: Released information in 2013 regarding the NSA program involved in capturing this metadata.
- Status: Section 215 expired, was renewed in 2015 as part of the USA FREEDOM Act, and finally expired after being passed by the House in 2020.
- Standards for Government Access
- Record Material: Requires a Subpoena.
- Content Material: Requires a Search Warrant.
- Live Capture of Record Material: Requires a Court Order.
- Electronic Intercept: Requires a Title III Order from the court.
- Border Search Authority
- Customs law permits the search of all goods at crossings.
- Case law has extended this authority to digital media, though recent rulings have begun to place some limits on government access.
The Homeland Security Enterprise
- Mitigation and Protection
- Private Sector: Primarily responsible for ‘hardening targets’ as they own most of the resources and infrastructure.
- Government Role: Focuses on coordination and establishing a culture of preparation.
- Executive Branch Involvement
- Nearly every department has resources dedicated to counterterrorism.
- Example: The Department of Energy manages potential nuclear hazards.
- Homeland Security Act of 2002
- Restructured and moved 22 federal agencies under the newly created Department of Homeland Security (DHS).
- Dual mission: Overarching counterterrorism mandate while maintaining existing agency functions.
- Preventative Resources
- CISA: Cybersecurity and Infrastructure Security Agency.
- Coordinating Councils: Use of Sector Coordinating Councils and Government Coordinating Councils.
- Agencies: Includes USSS (Secret Service), FEMA, and transportation security components.
- Border Security and National Security
- 1903 Immigration Act: Known as the Anarchist Exclusion Act.
- 1996 Antiterrorism Act: Targeted criminal non-citizens for removal.
- Post-2001: Targeted those in the U.S. illegally from countries with histories of fundamentalist terror.
- Intelligence and Coordination
- Director of National Intelligence (DNI): Created post-9/11; notably remains separate from the DHS.
- Fusion Centers: Federally funded but locally operated centers for DHS coordination.
- Local Response
- Response is primarily a local function.
- Growth of specialized units and the militarization of law enforcement (influenced by attacks like the one in Mumbai).
Cyber Terrorism and Critical Infrastructure
- The Threat Landscape
- High-level cyber attacks typically originate from nation-states or international criminal organizations rather than conventional ‘terror’ groups.
- Internet of Things (IOT): Connectivity in residential and commercial products has increased surface area for risks.
- Defining Critical Infrastructure
- Assets, systems, and networks (physical or virtual) vital to the U.S. whose destruction would have a debilitating effect on security, economic security, or public health.
- Technical Infrastructure
- SCADA (Supervisory Control and Data Acquisition): Software that interfaces between machinery and people, often via the internet.
- PLCs (Primary Logic Controllers): Computing devices that take measurements and permit the actual control of industrial machines.
- Historical Incidents and Response
- 2008 DOD Breach: The ‘Agent.btz’ worm spread via a thumb drive found in a Middle Eastern base parking lot.
- Operation Buckshot Yankee: The DOD response to the 2008 breach.
- U.S. Cyber Command: Began operations in 2010; coordinates military cyber efforts and interfaces with law enforcement and intelligence.
Major Cyber Operations and Actors
- Stuxnet (2010)
- Complex malware identified by a security firm in Belarus.
- Used 4 zero-day exploits and stolen Windows driver signatures from Taiwanese companies.
- Target: Natanz nuclear facility in Iran. Specifically targeted Siemens SCADA software to damage centrifuges.
- Operation Olympic Games: Alleged joint joint project between American and Israeli agencies.
- The Equation Group: Asset of the American NSA associated with the code.
- The Shadow Brokers
- A hacking organization that leaked NSA-derived tools.
- Associated with Russian nationals; leaked information via Twitter and WikiLeaks.
- APT Groups (Advanced Persistent Threats)
- Unique entities identified by patterns, such as the IP address of Command and Control (C2) services.
- Russian Federation Actions
- APT 28 and 29: Known as ‘Fancy Bear’ and ‘Cozy Bear’; breached the DNC network between July 2015 and June 2016.
- CyberBerkut: Pro-Russian hacktivist group involved in Ukrainian and NATO breaches.
- Notable Attacks: 2007 Estonian attacks, 2015 Ukrainian power grid attacks, and the 2017 NotPetya ransomware.
- GRU Unit 74455: Officers indicted in 2018 and 2020 for attacks on the power grid, French elections, and the Sergei Skripal poisoning investigation.
- Chinese Actions
- OPM Breaches: Involved the U.S. Office of Personnel Management in 2014 and 2015.
- Operation Aurora: Attacks on high-tech companies.
- PLA Unit 61398 (APT1): Active since at least 2006; tied to industrial breaches paralleling Five-Year Plan goals. Five officers indicted in 2014.
- North Korean Actions
- Bureau 121: Cyberwarfare element of intelligence services.
- Sony Hack (2014): Carried out by ‘Guardians of Peace’; involved data wiping and threats regarding the film ‘The Interview’.
- Wannacry (2017): Ransomware using the ‘Eternal Blue’ vulnerability. Stopped by a researcher registering a ‘kill switch’ domain.
- Park Jin Hyak: Indicted in 2018; alleged member of Lab 110.
- Iraqi and Israeli Actions
- Iran: DDOS attacks against U.S. financial interests and manipulation of dam infrastructure in New York.
- Israel: Unit 8200 of the IDF; associated with Stuxnet and a 2007 attack on Syrian air defenses.
Drug Cartels and the Phases of Development
- Bunker and Sullivan (2010) Phases
- 1st Phase: Aggressive, indiscriminately violent, hierarchical, and dependent on strong leadership (e.g., Medellin Cartel).
- 2rd Phase: Subtle, symbolic violence, cellular structure, focused on drug product, reliant on widespread corruption (e.g., Cali Cartel).
- 3rd Phase: The ‘Criminal State’ model where the criminal organization is completely enmeshed with the political entity.
- The Medellin Cartel
- Led by figurehead Pablo Escobar; used brute force against the Colombian government.
- Focused on cocaine and successfully fought against extradition laws using the M−19 group.
- The Cali Cartel
- Decentralized control; relied on corruption of state authorities rather than open warfare.
- Mexican Drug Trafficking Organizations (DTOs)
- Guadalajara Cartel: Led by Miguel Felix-Gallardo. Murdered DEA Agent Enrique Camarena, leading to a massive U.S. crackdown.
- The Plazas: Following prosecution, the Guadalajara cartel was split into three ‘plazas’ or corridors for U.S. border passage.
- Major Groups:
- Sinaloa Cartel: LED by Joaquin ‘El Chapo’ Guzman and Ismael Zambada.
- Jalisco New-Generation Cartel (CJNG): Leader Ruben Oseguera-Cervantes (‘El Mencho’) killed in February 2026. His son Ruben Oseguera-Gonzalez extradited to the U.S.
- Gulf Cartel: Spun off Los Zetas (initially enforcers).
- Evolution toward Narcoterrorism
- Defined as the widespread use of fear to influence policy or public opinion.
- First Usage: President Belaunde of Peru in 1983 regarding drug traffickers battling police and the ‘Shining Path’ group.
- FTO Designation: In January 2025, several Mexican cartels were designated as Foreign Terrorist Organizations (FTOs).
Transnational Organized Crime
- Globalization Impact
- Facilities of movement and communication have expanded criminal opportunities across borders.
- Organizational Evolution (Zabyelina)
- Evolution through ‘Predatory’, ‘Parasitic’, and ‘Symbiotic’ stages with government.
- Albanese (2012) Categories
- Illicit Goods: Drugs, stolen property, counterfeiting.
- Illicit Services: Human trafficking, cybercrime/fraud, commercial vices.
- Infiltration: Extortion, racketeering, money laundering, corruption.
- Human Smuggling vs. Trafficking
- Smuggling: Migrants finding their way to a destination for a fee (commercial endeavor).
- Trafficking: Involves coercion and exploitation (e.g., sex trafficking). Established in U.S. law via the Trafficking Victims Protection Act of 2000.
- International Agreements
- U.N. Convention against Transnational Organized Crime (2000): Targets the multijurisdictional challenges of evidence and witnesses.
- Advantages for Organizations
- Financial support, technical development, and government resources (safe houses, fake documents).
- Attacks supported by nation-states have been found to be 8 times deadlier in recent decades.
- Tactical Utility for States
- Advanced foreign policy objectives with built-in plausible deniability.
- U.S. State Sponsors of Terrorism List
- Iran
- Syria
- North Korea (added 2017)
- Cuba (added 2021)
- Recent Removals
- Sudan: Announced for removal in October 2020 after agreeing to compensate victims of the 1998 U.S. Embassy bombings and recognizing Israel.
- Political Ambiguity and Exclusions
- Pakistan: Not on the list despite pledges to dismantle organizations being incomplete.
- Lebanon: Presence of Hizballah in the government impedes action.
- Challenges: Inclusion is often driven by political implications rather than objective standards. Groups like Mujahedin-e Khalq (MEK) complicate these definitions.