Qualifiers and Caveats James J.F. Forest, Ph.D. Monterey Terrorism Research and Education Program Conference on the The Nexus Between Terrorism and Trafficking.

Slides:



Advertisements
Similar presentations
GV 506-week 7 1.Types of intrastate wars 2.Causes of intrastate wars 3.Are intrastate wars fundamentally different from interstate wars?
Advertisements

Presented by Supply Management By: Leigh Podolak Presented by Source One Management Services, LLC Lesson 1 Roles.
Global Problems, Global Solutions.  The fast, interdependent spread of open society, open economy, and open technology infrastructure.  Globalization.
Lets look at developmental states Some Definitions of the Developmental State Fritz and Menocal (2007: 533), for example, “understand a developmental.
Evolution of Terrorism and Counter Terrorism Measures Mike Vdovin First Annual IIS/IDL Student Conference International Security in a Changing World October.
DIRTY ENTANGLEMENTS Illicit Links between Organized Crime, Corruption and Terrorism Louise Shelley, Hirst Chair and Director of Terrorism, Transnational.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
T he C ombating T errorism C enter A t w est p oint EAPC/PfP Workshop on Threat Convergence, Zurich, 5 March 2007 James J.F. Forest Director of Terrorism.
Strategy in the Global Environment
Developed by Cool Pictures and MultiMedia Presentations Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed.
The New Security Agenda Transnational Organised Crime and International Security Derek Lutterbeck, PhD GCSP.
The Global Environment
ECP 6701 Competitive Strategies in Expanding Markets
21st Century Customs Solution
Working Group 4: Urban Governance for Risk Reduction: Mainstreaming Adaptation into Urban Planning and Development Chair: Prof. Shabbir Cheema Rapporteurs:
J. Scott Hauger, Ph.D., Asia-Pacific Center for Security Studies Pacific Operational Science & Technology Conference Honolulu, HI March 5, 2013.
Small Arms Violence and Trafficking in Bangladesh : Security Implications Neila Husain Senior Research Fellow Bangladesh Institute of International & Strategic.
11 The Global Manager Chapter Key Points
T he C ombating T errorism C enter A t w est p oint EAPC/PfP Workshop on Threat Convergence, Zurich, 5 March 2007 James J.F. Forest Director of Terrorism.
Transnational Politics Global networks of violence.
Engagement as Strategy: Leading by Convening in the SSIP Part 2 8 th Annual Capacity Building Institute May, 2014 Joanne Cashman, IDEA Partnership Mariola.
 Relationship between terrorism and financial/economic systems is multifaceted.
1. The Indo-US relationship has evolved gradually in the last two decades from estrangement to engagement heading an alliance. 2. The conversion interests.
© 2014 IBM Corporation Smarter Workforce Services Business Process Innovation.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Disarmament & Development. Background Disarmament and development are two of the international community’s most important tools for building a world free.
Marketing in Today’s Economy
International environment: economic aspects political and legal aspects cultural aspects Elena Horska.
Engaging non-State Actors in Zones of Competing Governance Dr. James Forest University of Massachusetts Lowell.
C OMBATING T ERRORISM C ENTER at West Point James JF Forest, Ph.D. Director of Terrorism Studies Root Causes, Facilitators and Underlying Conditions of.
BUSINESS DRIVEN TECHNOLOGY
 Grievances and Opportunities: An Introduction Bottom line: Terrorism is very much a contextual phenomenon We thus have to understand the many different.
 Relationship between terrorism and political systems is multifaceted.
Modeling Drivers of Rebellion National Defense University Center for Technology and National Security Policy Dr. Michael Baranick, Senior Research Fellow.
1 8 Strategy in the Global Environment. 2 Related Concepts/Theories Theory of comparative advantage – a country is ahead, and all other country’s benefit,
Professor Colon FTC Comparative Criminal Justice Systems / 6 th edition Chapter 2: Domestic Crime, Transnational Crime, and Justice.
Canada’s Asia-Pacific Gateway and Corridor Initiative 2006.
Transnational Organized Crime and Terrorism
 What can we project about the future of terrorism?
© 2009 The McGraw-Hill Companies, Inc. All rights reserved.
Judith M. Whipple, Ph.D. Department of Marketing and Supply Chain Management Michigan State University 325 North Business Complex
Integrated Customs Solution
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
Week 4. Tonight’s seminar National Security Strategy National Security Strategy Local Response Local Response United Kingdom’s plan United Kingdom’s plan.
2012 National BDPA Technology Conference Diversity Is Not Enough: Keys to Complex Project Management Stewart White, PMP August 1 – 4, 2012 Baltimore, MD.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2012 Pearson Canada Inc. 00 Chapter 11 Alliances as Vehicles.
Managing in a Global World
Tonya Ayow Asst. Director, Support Services CARICOM IMPACS 19 November 2015 SECURING CARICOM THROUGH REGIONAL AND INTERNATIONAL COOPERATION INITIATIVES.
Module 7 Strategy and Strategic Management. Module 7 What types of strategies are used by organizations? How are strategies formulated and implemented?
Globalization. What is Globalization? Globalization: The increased movement of people, knowledge and ideas, and goods and money across national borders.
Dealing with Terror after 9-11 How do dealing with terrorism and trying to develop and practice peace fit together?
STATUS OF SECURITY IN THE EAC REGION BY ADAMS OLOO.
The way forward: Recommendations on improving cooperation between RIGOs and CSOs A Private Sector’s View Gilberto Marin Quintero, President of the Board.
Crown capital management international relations International Affairs.
The conflict in Donbas region: challenges, solutions Olga Reznikova, PHd Head of the National Security Research Department The National Institute for Strategic.
Maritime Security as an Integral Part of an
Peacebuilding Approaches to Training & Dialogue with Security Forces
Terrorism 2027 James J.F. Forest, Ph.D. May 5, 2017.
Cooperative Compliance-Breaking the Barriers
Liberation Tigers of Tamil Eelam: Origins, Objectives, Doctrine
Foreign Policy: Protecting the American Way
Marketing in Today’s Economy
Community of Interest Conference 2018
Decentralization and Local Governance in Fragile Contexts
Advance briefing.
Entry Mode Choice.
Criminal Investigations
Presentation transcript:

Qualifiers and Caveats James J.F. Forest, Ph.D. Monterey Terrorism Research and Education Program Conference on the The Nexus Between Terrorism and Trafficking February 22, 2013

Criminals and Terrorists  Much in common – rational actors, operate secretly, use similar tactics (kidnapping, extortion, assassination) to obtain resources, power Conceptual paradigms offered:  Nexus, intersections, hybrids  Continuum (groups shifting incrementally)  Transformation (become less one, more the other)

Researching a “Nexus”  Lots of specific conditions involved  No formula, no perfect predictors  Any common patterns? If the “Nexus” exists, what do we need know?  Who  Where  When  Why  How  What kinds

Who? (Group & Individual Characteristics)  Group characteristics Goals, capabilities, leadership, areas of operation, support networks, interpersonal relationships  Less “Organization” more “Networked individuals”  Individual facilitators are the heart of collaboration  “Trusted handshake” based on:  Mutual friends/acquaintances who vouch for you w/their life  Family ties, clan, tribe, etc.  Religious beliefs (doctrinal knowledge, credentials, etc.)  Battlefield veteran status (Afghanistan, Bosnia, Iraq)  Shared experiences (prison, battlefield, oppression)

Where? (Location-related conditions)  Global access to banking systems, materials, weapons, technologies, knowledge, infrastructure, etc....  Access to markets (incl. pipelines, routes, conduits); Global markets = more opportunities for profit  Internationally linked criminal markets in which various actors, including terrorists and insurgents, engage in profit- seeking activities  Domestic cash economies, shadow economies, depressed/dysfunctional economies  Physical terrain for illicit crops, smuggling  State weakness (limited intell, security capabilities), border insecurity, ongoing conflicts, safe havens  Corruption, kleptocracy, low development/high need and other “legitimacy grievances”, and much more...

When? (Temporal/Event-related Conditions)  Inter-state or intra-state conflicts  Coup/regime collapse, foreign military occupation, other events that enhance the perceived need for action within a particular environment;  Transitioning state governments (Tunisia, Egypt, Libya);  Governance challenges in dozens of countries worldwide;  Long-term projections: No indication that demand for drugs, weapons, illicit sexual services, etc. will decline any time soon  Experiences lead to expansion of trusted handshakes; patterns of successful collaboration can lead to more trust & willingness for future collaboration

Why? (And if not, why not?)  Power, resources, operational capacity common goals  Money is centrifugal force that brings them together  Expertise (money laundering, travel document forgery)  Relatively few “strategic alliances”, more tactical, transactional, sub-contract kinds of relationships Even if we see many of these conditions, we may not see a terrorist-trafficking nexus. Why not?  Trust is much harder to build than destroy  Once you become involved in trafficking, difficult to get back out (much different from disengagement from political violence)  Failed states less hospitable than weak states  OPSEC: Risk aversion regarding money, resources

How?  Money laundering dimensions  Diaspora network connections  Individual trusted relationships  Profit sharing?  Operational security?  Impact of arrests, operations interrupted?

What kinds? (Short-term / Long-term & other characteristics)  Strategic alliances  Long-term commitments; shared intelligence, revenues, etc.  Transactional supply chain relationships  Often based on territorial control by each group  Tactical alliances  Short-term, in response to perceived mutual threat  Sub-contract relationships  Often based on unique/specialized capabilities  Spot sales and barter agreements  Like drugs for explosives (Madrid 2004: 66 lbs. hashish = 440 lbs. explosives) - Adapted from Phil Williams (2002) and Annette Idler (2012)

Summary  At minimum, broad stroke characterizations of a “terrorism trafficking nexus” require significant qualifiers and caveats  Occasional convergence based on a variety of contexts and group/individual attributes  This is a very contextual phenomenon  Reinforces a common truth – there is no “one size fits all” kind of policy solution or universal strategy to deal with this problem

Qualifiers and Caveats James J.F. Forest, Ph.D.