Paper Details  
 
   

Has Bibliography
11 Pages
2740 Words

 
   
   
    Filter Topics  
 
     
   
 

Security Threat Groups

gangs are the Aryan Brotherhood of Texas, Aryan Circle, Barrio Aztecas, Bloods, Crips, La Hermanos De Pistoleros Latinos, Mexican Mafia, Raza Unida, Texas Chicano Brotherhood, Texas Mafia, and Texas Syndicate. The above listed security threat group’s are divided mainly among racial lines. The Aryan Brotherhood of Texas originated in the Texas Department of Criminal Justice in the early 1980’s. The geographic location is confined strictly to Texas and does not recruit members outside of Texas. It is based on the same ideas of the Aryan Brotherhood, but is not a faction of the group and lays no claim to affiliation of its members. “The gang is comprised of mostly white racist inmates”(F.B.P., 1994, p. 30). Members of this gang practice the ideas of “White Power” and “the advance of the supreme white race”. The gang utilizes a council that oversees operations and issues orders for organized crime or violent activities. The council is made up of certain offenders from prison units across the state and each member of the council acts as the liaison for the members of their respective unit. The identifying marks that some members choose are relics of the German Nazi type symbols, such as a swastika inside a circle or a shield with two swords crossed with a swastika in the middle. Two lightning bolts side by side are also characteristic of Aryan Brotherhood of Texas members, but must not be confused with the similar use of the same tattoo by the white knights. Its enemies consist of gangs such as the Mandingo Warriors, La Nuestra Familia, Black Guerilla Family, and other black groups. At this current time the enemies of the Texas Aryan Brotherhood are not classified as security threat groups because of their small number of members.The bloods originated as a street gang in Compton, California with the primary goal to protect its members against the Crips Street Gang. Factions of the ...

< Prev Page 3 of 11 Next >

    More on Security Threat Groups...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA