03.09.2014 Views

Investigating Terrorism and Criminal Extremism - Bill St. Clair's ...

Investigating Terrorism and Criminal Extremism - Bill St. Clair's ...

Investigating Terrorism and Criminal Extremism - Bill St. Clair's ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Il l u m i n at i: An intellectual society <strong>and</strong> social club formed by a<br />

university professor, Adam Weishaupt (1748–1811), in southern<br />

Germany in the 1770s in the spirit of the Enlightenment. It was<br />

suppressed by Bavarian authorities in the 1780s. Weishaupt<br />

spent the rest of his life writing about the Illuminati. People who<br />

believe Illuminati conspiracy theories believe the society never<br />

died away but lived on, run by people intent on controlling the<br />

world through devious means.<br />

In f o r m at io n: Pieces of raw, unanalyzed data that identify<br />

persons, evidence, or events or illustrate processes that<br />

indicate the incidence of a criminal event or witnesses or<br />

evidence of a criminal event.<br />

I<br />

In f o r m at io n Sh a r in g Sy s t e m: An integrated <strong>and</strong> secure<br />

methodology, whether computerized or manual, designed to<br />

efficiently <strong>and</strong> effectively distribute critical information about<br />

offenders, crimes, <strong>and</strong>/or events in order to enhance prevention<br />

<strong>and</strong> apprehension activities by law enforcement.<br />

In f o r m at io n Wa r fa r e: Synonymous with cyberwarfare,<br />

information warfare is the offensive <strong>and</strong> defensive use of<br />

information <strong>and</strong> information systems to deny, exploit, corrupt,<br />

or destroy an adversary’s information, information-based<br />

processes, information systems, <strong>and</strong> computer-based networks<br />

while protecting one’s own. Such actions are designed to<br />

achieve advantages over military or business adversaries.<br />

In f o r m at io n/In t e l l i ge n c e Sh a r in g: See National <strong>Criminal</strong><br />

Intelligence Sharing Plan.<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!