Forensics Journal - Stevenson University 2013 | Page 43

STEVENSON UNIVERSITY Are You Funding Terrorism? Identity Theft’s Role in Terrorist Financing & a Comprehensive Approach for Prevention Philippa Nash The ease with which terrorists can obtain funds from fraudulent activity has lowered the cost of carrying out large scale terror plots. The estimated cost of the USS Cole bombing in 2000 was between $5,000-$10,000, the cost of the London bombings in 2005 was $15,600, and the 9/11 attacks in New York, Washington, D.C., and Pennsylvania in 2001 cost terrorists between $400,000-$500,000 (Perri, 29). Relative to the estimated $3.3 trillion dollars spent on the post-9/11 response and subsequent wars, the cost to orchestrate these events was extremely low. (Sanger). Terrorist financing has become more complex and difficult to detect, therefore, a comprehensive plan with a division of responsibility among international agencies, law enforcement, and the public and private sectors is needed. pieces to find the weakest links, was proposed by Bruce Schneier, a world renowned security expert, who considers this “divide-todefend” strategy as the best way to prevent terrorism (Schneier, 107-108). With the proliferation of personal information on the Internet and other databases, it is not surprising that identity theft has been a precursor crime to a significant number of terrorist plots. Per the Code of Federal Regulations, identity theft is described as, “fraud committed or attempted using the identifying information of another person without permission” and includes details such as social security numbers, dates of birth, passport contents, and electronic and biometric data (fingerprints, iris and retina scans, voice print) in its definition of identifying information (Finklea, 2). Identity theft occurs in a significant number of fraud schemes and terrorists have found it to be a successful technique in attaining funds. Low-budget operations have led terrorists to obtain funding under the radar of American law enforcement and intelligence agencies who predominantly scrutinize larger transactions. Terrorists steal identities or private information from unsuspecting citizens and then forge and create documents needed to enter the United States, take out credit in the victim’s name, and commit other fraudulent activities (Kane and Wall, 1). The anonymous nature of fraud makes it a common tool for terrorists to obtain funding for, “weaponry, but also for training, travel, and living expenses” (Kane and Wall, 1). Given that identity theft is often a precursor to further criminal and terrorist activity, it is necessary to assess the threat of wide spread identity theft and take comprehensive measures to minimize it at the global, national, state, and local levels. According to Judith Collins, an expert at the Michigan State University Identity Theft Crime and Research Lab, every terrorist act against the United States has involved identity theft in some manner and five percent of all identity theft cases are connected to terrorism (Perri, 30). With 9.9 million cases of identity theft in the United States in 2008, approximately 495,000 were related to terrorist activities (Finklea, 9). A 2006 study indicated that $15.6 billion United States dollars were lost due to identity theft in one year (Synovate, 9). Since most identity thefts are used to commit further criminal acts, the losses are probably higher if time and effort by victims trying to recover their identities and restore their credit histories are accounted for in the calculation. The attention and funding spent on reducing identity theft will not only make it more difficult for terrorists to plan attacks, but will also reduce other crimes commonly affiliated with identity theft. Detecting impending threats and taking better measures to protect against them are critical to reducing the risk of terrorism. According to the United Nations Counter-T