Tag Archive for Naval Criminal Investigative Service

Air Force Office of Special Investigations Publishes Report on Military Sextortion Scams

The U.S. Air Force Office of Special Investigations (AFOSI) is warning military personnel to avoid becoming victims of online sextortion scams using “sexual images (obtained either through enticement or malicious code)” to extort money from unsuspecting victims. “Cyber sextortion” is described as a growing problem among the military services with incidents being reported by “all Military Criminal Investigative Organizations” involving service members located at bases all over the world. The AFOSI report, released in February on a restricted basis, was recently posted online on the document-sharing website Scribd.

NCIS Interviewing and Interrogating Militant Islamists Guide

Law enforcement personnel at all levels serve on the front line of America’s Global War on Terrorism (GWOT). In the interest of national security and public safety, law enforcement investigators frequently must question persons, either for purposes of intelligence gathering, for collecting evidence that may lead to prosecution and take immediate action that may be in the interest of the public safety/force protection. The objective of these interviews/interrogations is to gather accurate and reliable information that furthers security, safety, intelligence, and law enforcement interests. The current threat environment, however, poses some new challenges for professionals conducting terrorism investigations.

(U//FOUO//LES) NCIS Guide to Developing Islamic Extremist Counterterrorism Sources

Following the events of September 11, 2001, the US intelligence and law enforcement communities began a fundamental shift in counterterrorism strategy to enhance national safety and security by changing from a reactive to a proactive posture. The communities have actively moved to identify potential threats and develop intelligence on specific terrorist targets. The core objective of these newly concentrated efforts is to reduce risks and manage potential threats by interrupting forward motion before an attack (Borum, 2004a). The ongoing Global Struggle Against Violent Extremism intensified the need for persons and agencies with counterterrorism responsibilities to understand the commitment, connections, capability, and intentions of Islamic extremists – including the Al-Qa’ida affiliated network – so that viable operations targeting terrorist cells can be developed. Ideally, these efforts involve source operations in which someone willing to provide information to US authorities penetrates an operational cell, or where someone with access to the cell is recruited to work for US authorities.