Discussion:
Funding Terrorism Worksheet
Watch the "Counterfeits: Funding Terrorism" video located on the student website.
Complete the table by including the following:
• Left column: Identify 2 or 3 funding strategies used by terrorists or terrorist organizations to fund their activities.
• Middle column: Identify the threat the funding strategy poses to homeland security and to legitimate businesses.
• Right column: Identify strategies used in counterterrorism to combat the funding strategy.
Funding Strategy
|
Threat
|
Counterterrorism Strategy
|
Cigarettes
|
Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.
|
Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.
|
Watches
|
Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.
|
Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.
|
Shoes
|
Using the stolen money is a means to fund terrorist activity within the American borders and businesses lose customers and may get a bad rep.
|
Track terrorist activities though information sorting, coordinating intelligence, expanding surveillance/search tools and implementing interrogation techniques to gain more information.
|
Create a 350- to 700-word summary, in the space below, about the funding and counterterrorism strategies listed in the table. Include the following in your summary:
• Identify the threats that funding strategies pose to legitimate businesses.
• Describe counterterrorism actions taken that affect the terrorist funding strategy.