Criminal Enterprise Investigation by Trier Thomas A

Criminal Enterprise Investigation by Trier Thomas A

Author:Trier, Thomas A. [Неизв.]
Language: eng
Format: epub
Publisher: CRC Press LLC


14

Vulnerabilities

This chapter concentrates on identifying the vulnerabilities of the targeted criminal enterprise.

Where is the organization weak? Where are the openings for investigators to infiltrate the organization? Where can we develop witnesses or informants? Is there a criminal activity that has been punished at one level be exploited? For example, as stated earlier, early in the NLR investigation, a felon with a gun on parole was a six-month violation at the state level. But research and application soon discovered an applicable federal statute to a felon in possession of a firearm. The federal charge carried a 10-year penalty without a chance for parole. This was a substantial difference that we were able to use to our advantage in the NLR investigation.

Are there elements of the organization that can be infiltrated? Where are the opportunities to utilize sophisticated investigative techniques?

For example, investigation showed that NLR members were utilizing three-way calls from prison to conduct NLR criminal activity in and out of prison. We found an NLR associate operated a three-way calling base for NLR members and compiled a $21,000 phone bill in a five-month period. We discovered vulnerabilities that we exploited. Here is how the three-way calling investigation played out.

The FBI and SSU conducted a parole search on the three-way caller’s residence. The three-way caller had been indemnified through contact with incarcerated NLR members. Her sister was on state parole. Both of them had NLR contacts. We searched the house to obtain intelligence and evidence. Two NLR members have been arrested at that residence based on cooperating witness information. Other telephone targets were identified. Their telephone numbers were being targeted for pen registers with a goal of obtaining court-ordered electronic surveillance.

To exploit this identified vulnerability, FBI case agents utilized prepaid cellular telephones, which were handed off to worthy NLR targets to conduct drug and NLR business. Case agents handed off the phone through credible cooperating witness sources to NLR members, in an attempt to obtain a pen register and develop probable cause for a Title III wiretap.

The NLR was exposed and vulnerable by utilizing the three-way calling system. We developed a vast amount of intelligence from the three was calling network; it was worthy of the resources we devoted to exploit the vulnerability.

One of the most fruitful vulnerabilities that we pursued in the NLR investigation was targeting old girl friends of NLR members and developing them as informants and cooperating witnesses.

Every one of the NLR members we investigated was on state parole. The SSU had access to past and real-time intelligence on the NLR from all the state prisons across California. The NLR communication methods included word of mouth and written notes smuggled out of prison by trusted NLR members and associates. Once we identified a communication method, it was immediately evaluated for exploitation.

When investigating your criminal enterprise ask yourself this question. How can you get into their communications stream unnoticed and monitor their most secret communications?

Identifying vulnerabilities in a targeted criminal enterprises finances and communication systems can be critical pathways to a successful investigation.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.