preview

Racketeer Influence And Corrupt Organization (RICO)

Decent Essays

The Bureau uses the Racketeer Influence and Corrupt Organization (RICO) Act to expand criminal accountability for a number of “predicate offenses,” and to expand a single offense across multiple members of a criminal enterprise. Unlike typical investigations, which target a single criminal act, this multi-pronged approach allows the FBI to disrupt or dismantle the entire enterprise. The project was called Central Research Monographs and produced extensive analyses of Communist Party ideological statements designed to track the party’s changing policies and better inform agents working to recruit party members. Studies of groups like the Ku Klux Klan, the LCN, the Black Panthers and others were similarly aimed at ensuring up-to-date knowledge …show more content…

Immigration and Customs Enforcement (ICE); the Drug Enforcement Administration (DEA); U.S. Internal Revenue Service (IRS); the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); U.S. Secret Service (USSS); U.S. Postal Inspection Service (USPIS); U.S. Department of State, Bureau of Diplomatic Security (DS); U.S. Department of Labor, Office of the Inspector General (DOL-OIG); and the U.S. Department of Justice (DOJ), Criminal Division (Office of Public Affairs, 2009). The FBI and their partner agencies joined together in a task force setting to combine data gathered, and produce actionable intelligence leads for the end consumers to execute their mission objectives nationwide to combat international organized crime. Within the collaboration the coordination of the IOC-2 results in prosecutions and further multi-jurisdictional investigations. All in all the utilization of resources and intelligence gathered by the nine U.S. law enforcement agencies, as well as federal prosecutors, to collectively combat the threats posed by international criminal organizations to domestic safety and …show more content…

The framework for this analysis is straightforward. The FBI must define the information security environment it wants to create by identifying information policies, specific threats, and secure usage assumptions. The Bureau must assess threats that existing security countermeasures do not counter and information security policies that are not being enforced. The FBI can then select programs, tools, and technologies to sustain its security environment (Fox,

Get Access