ABSTRACT

As witnessed in the previous chapter regarding money-laundering methodology, we routinely underestimate the sophistication of criminals and terrorists. The things we use, they use. They also have the right people on the payroll to interpret and find work-arounds to the law. Often, they will investigate and exploit vulnerabilities in software and devices. Whether driven by a radical ideology or the lure of money and drugs, criminals and terrorists are persistent and will change tactics and evolve until their goal is achieved. They are also working in the same “space,” either together or through parallel activities.