T he C ombating T errorism C enter A t w est p oint EAPC/PfP Workshop on Threat Convergence, Zurich, 5 March 2007 James J.F. Forest Director of Terrorism.

Slides:



Advertisements
Similar presentations
Connecting Scholars and Practitioners: Reflections on the Development of the Combating Terrorism Center at West Point Dr. James Forest, Director of Terrorism.
Advertisements

Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
In most countries: Key institutions are in ferment Public institutions must meet new expectations/needs or lose public trust Public sector reform is getting.
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
T he C ombating T errorism C enter a t W est P oint 13 th Annual International Development Conference, 20 April 2007 James J.F. Forest Director of Terrorism.
Qualifiers and Caveats James J.F. Forest, Ph.D. Monterey Terrorism Research and Education Program Conference on the The Nexus Between Terrorism and Trafficking.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Preconditions for Effective Implementation of anti-corruption measures.
AGENCY FOR PREVENTION OF CORRUPTION AND COORDINATION OF FIGHT AGAINST CORRUPTION mr.sci. Vladica Babić - Assisstent.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
T he C ombating T errorism C enter A t w est p oint EAPC/PfP Workshop on Threat Convergence, Zurich, 5 March 2007 James J.F. Forest Director of Terrorism.
Strategic Leadership: Creating a Learning Organization and an Ethical Organization Chapter Eleven Copyright © 2010 by The McGraw-Hill Companies, Inc. All.
FIGHT AGAINST CORRUPTION: THE LITHUANIAN WAY. CONTENTS Factors Decision Challenges Dilemmas Priorities.
Competing For Advantage Part I – Strategic Thinking Chapter 2 – Strategic Leadership.
Asia-Pacific Finance and Development Centre 2006 Biennial Forum Shanghai, September 2006 Session V: Regional Cooperation and Innovation Development Presented.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Origins and Implications
Chair, Department of Management & Marketing
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
The Global Effort to Regulate the Financing of Terrorism.
Fundamentals of Organization Structure
How to better protect the business - Introduction based on findings of SUPPORT Delft, May 9, 2012 Henk van Unnik Senior advisor, Securitas Maritime & Logistics.
Using the UN Convention against Corruption as a Basis for Good Governance.
The Black Sea Region: New Challenges and Opportunities for Regional Cooperation ( ANALYSES from Ukraine) prof. Grygorii Perepelytsia.
Working Group 4: Urban Governance for Risk Reduction: Mainstreaming Adaptation into Urban Planning and Development Chair: Prof. Shabbir Cheema Rapporteurs:
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 5 - Port and Border Security: The First and Last Line of National Security Defence,
1 CREATING A LEARNING ORGANIZATION AND AN ETHICAL ORGANIZATION STRATEGIC MANAGEMENT BUAD 4980.
Chapter 11 – Managing a Business
1 How organised is crime in Southern Africa? Briefing on the state of trans-national organised crime in Southern Africa ISS Conference.
Copyright 2010, The World Bank Group. All Rights Reserved. Managing resources Finance – People – Knowledge Part 1 Strengthening Statistics Produced in.
6. Management in public sector in the context of anti-corruption policy.
Essentials of Contemporary Management, 1Ce. Copyright (c) 2005 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 The Environment of Management 2.
 Relationship between terrorism and financial/economic systems is multifaceted.
The leaders personal characteristics Leadership style Situational influence Social interaction – the importance of delegation and communication.
Introduction to Security
Chapter Five: Financing Terrorism
1 Enterprise and Global Management of Information Technology.
Terrorism. What is going on? Brief timeline of major events of terrorism Definition of terrorism Why do terrorists commit terrorism acts? How do governments.
Conclusions for the New NATO Members from the UK Experience in Defence Research and Development Author: Ventzislav Atanassov, MSc in Ec., MCSc.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Implementing Strategies: Marketing, Finance/Accounting, R&D, and MIS Issues Chapter 6.
Chapter 8 International Strategic Alliances
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
C OMBATING T ERRORISM C ENTER at West Point James JF Forest, Ph.D. Director of Terrorism Studies Root Causes, Facilitators and Underlying Conditions of.
Corruption Perceptions and the Importance of Corruption to the Organisation of Serious Crimes Michael Levi, PhD, DSc (Econ) Professor of Criminology Cardiff.
Management of Not-For-Profit Organizations Fall 2014.
Transforming Institution for Results-focused Policy Jibgar Joshi.
OPTIONS AND REQUIREMENTS FOR ENGAGEMENT OF CIVIL SOCIETY IN GEF PROJECTS presented by Ermath Harrington GEF Regional Focal Point.
Background Nature and function Rationale Opportunities for TB control Partnering process.
The Management Challenge of Transnational Management.
Chapter 1: Introducing the Concepts By: Jake Alonzo Charly Cone Natalie Bohman Meredithe Marshall Michael Scott Mikey Via Virginie Charlotte Milhaud By:
Fundamentals of Organization Structure
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Chapter 5 Creating Business Value © John Wiley & Sons Canada, Ltd.5-1.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Crown capital management international relations International Affairs.
B300B Policy Chapter 4 By: WASSIM ALWAN. culture, social norms and economics: some implication for policy.
Maritime Security as an Integral Part of an
[ 6.6 ] National Security.
Foreign Policy; a brief introduction
The role of Supreme Audit Institutions in fragile situations: initial findings Research by David Goldsworthy and Silvia Stefanoni of Development Action.
The European Anti-Corruption Report
REGIONAL NETWORK FOR CIVIL ORGANIZATIONS ON MIGRATION – RNCOM
Financing Natura 2000 Success factors
A Framework for the Governance of Infrastructure - Getting Infrastructure Right - Jungmin Park, OECD Budgeting & Public Expenditures Division 2019 Annual.
Presentation transcript:

T he C ombating T errorism C enter A t w est p oint EAPC/PfP Workshop on Threat Convergence, Zurich, 5 March 2007 James J.F. Forest Director of Terrorism Studies Countering Linkages between Terrorist and Criminal Networks

The views expressed herein are those of the author and do not purport to reflect the position of the United States Military Academy, the Department of the Army, or the Department of Defense.

Networked Organizations “Living, breathing organisms” with no state/geographical boundaries Distributed cellular architecture can insulate and protect the core Can concentrate resources when necessary (‘swarming’) Becoming preferred method of communication, coordination, cooperation & collaboration –Political Activists –Organized Crime –Terrorists –Academic Researchers

Trust is critical “To work well, networks require strong shared beliefs, a collective vision, some original basis for trust, and excellent communications” - Brian Jenkins, 2006 In human networks, trust is established by various social mechanisms and shared beliefs Anyone can plug into the network if they use the proper protocols (the “trusted handshake”), usually enabled by previously established network credentials

Trust is critical Examples of the “trusted handshake” Family ties, clan, tribe, etc. Mutual friends/acquaintances who vouch for you w/their life Battlefield veteran status (Afghanistan, Bosnia, Iraq) Religion (doctrinal knowledge, credentials, etc.) Shared experiences (prison, battlefield, oppression) Political, ideology, political activist goals Shared academic/scientific knowledge base Some individuals have a very high level of "betweeness centrality" – these are critical knowledge brokers connecting different types of members (e.g., veterans & new recruits; scholars & mujahideen)

Hybrid network linkages We have seen an increase in the establishment of linkages between terrorist and criminal networks, creating Hybrid Networks Why? –Need for new funding sources, money laundering services, specialized skills, knowledge, etc. (especially when state sponsorship, charity funds have become constrained) Upon what grounds are these linkages established? –Mission-specific, temporary, transaction-specific vs. long-term linkages (examples include smuggling, kidnapping, trading drugs for weapons) Money is a centrifugal force; because they both need it, this force brings them together

Hybrid network linkages “Trusted handshake” of Hybrid Networks established by –Ethnic ties, often within a diaspora (e.g., Algerians in France, Spain; Pakistanis in UK; Tamils in Canada; Turks in Germany) –Record of successful black market transactions –Shared prison experiences –Shared anti-government sentiment –Mutual friends/acquaintances who vouch for you with their life –Family ties, clan, tribe, etc. Where do we see increasing chances of forming “trusted handshakes”? –Prisons –Black market transaction centers –Ethnic enclaves related to a diaspora

Enabling environments Environmental issues that enable or facilitate network linkages: Conflict zones (& former conflict zones flush with weapons) High level of corruption Weak civil society / Low level of rule of law Zones of competing governance/ungoverned spaces Ethnic enclave/diaspora neighborhoods Areas of deep ethnic fissures, animosity towards a “them” Regions of financial/economic desperation forces alignments Poorly equipped, underpaid border guards Authoritarian, statist regimes that overly control economy Lack of transparency in private and public sector finance

vulnerabilities Any organization involved in clandestine activities faces similar challenges in terms of operational security –Includes ferreting out spies within the organization Must maintain a level of security that facilitates conducting meaningful transactions of information and finance Secure long-distance communication is time consuming and expensive Constant fear of intelligence agencies, law enforcement

Agency Theory A network’s members have different preferences, based on personal experiences, perceptions, etc. Preference divergence impacts the level of trust/expectations of shared effort toward common goal Preference divergence can make it harder for a network’s principals to maintain: –Tactical control –Transaction integrity –Strategic authority These challenges are exacerbated by Hybrid Networks (temporary “marriages of convenience” between criminals and terrorists)

1. Tactical Control Principals must delegate certain duties to middlemen or low-level operatives, but cannot perfectly monitor agents Preference divergence over controlled use of violence –Terrorists cannot afford to alienate the center of gravity, or risk losing support –Danger of “Freelancing” - members initiating attacks against strategically high-value targets Preference divergence over who needs what kinds of situational awareness Preference divergence over what should be done to maintain security Operational Security Tactical Control

Exacerbate tactical control challenges Preference divergence creates challenges for networked organizations that can be exploited –Exploit preference divergence over controlled use of violence –Force leaders to consider punitive actions against agents/operatives These challenges are particularly acute for Hybrid Networks –Pre-existing differences between criminals and terrorists in their views toward the use of violence –Terrorists take responsibility for violence; media attention provides a form of strategic communication –Criminals do not take responsibility for violence; do not want media attention

2. Transaction Integrity Strength of any network is based on the level of its integrity (reliability and trust) for conducting transactions –Expectations of money to support operations –Expectations that recipients will do the correct things with funds Limited or no accountability –Because of operational security needs, a clandestine organization cannot offer much transparency regarding its finances –Considerable latitude for abuse, corruption –Particular challenge for Hybrid Networks, where suspicion is already natural Operational Security Transaction Integrity

Exacerbate transaction integrity challenges Distrust can be easier to establish than trust Slow the transfer of funds, assets from one node to another; cause unexplained transaction delays Encourage internal looting (or perception of looting); Promote suspicion, rumors, mistrust Publicize accounts of financial mismanagement, corruption, misappropriation, fund diversion (e.g., from court records) Get money to disappear with no reason, and then have conspicuous consumption items (big screen TV) appear in place of the missing money Spread rumors of preferential treatment, special benefits given to certain members of the network unfairly

countering Hybrid networks Hybrid networks require a higher level of trust in order to maintain operational security Linkages between criminal and terror organizations exacerbates trust, agency theory problems Most criminal and terrorist network operatives have difficulty trusting terrorists because of differences in objectives, rationality for violence, values, motivations, etc. How to exacerbate these problems to sow distrust and discord between them? Exploit network vulnerabilities and produce a constant state of disruption and uncertainty – degrade its ability to function effectively

Final thoughts Information warfare: influencing “street perception” of an organization is a powerful component of an overall counterterrorism strategy Criminal network infiltration may offer new pathways for counterterrorism –Highlight the perception that criminal organizations may be easier to penetrate with human intelligence resources Increase concern about network infiltration, forcing them to spend more time on screening new members Identify and exploit rivalries: Disagreements already exist in these networks; How can we exacerbate them, make them more acrimonious?

questions

Backup slides

Technology and OPSEC Organizational Tightness Technological Capacity Technology enables organizations to become more “networked” Constraining their technological capacity forces more face-to-face interaction More frequent face-to-face interaction can increase a clandestine network’s vulnerabilities - technology, eavesdropping - human intelligence, spies

Strategic authority Within all networks, there are forces which influence how the nodes operate. For example: if Mafia, certain family leaders/patrons... if Jihadis, certain influential scholars... Preference divergence over “who’s in charge” Internal dissension within the network’s leadership Strategic disagreements within network lead some members to subvert the authority of senior commanders Principals must combat perceptions of strategic drift, disconnections between rhetoric and actions Strategic Authority/Leadership Preference Divergence

Exacerbate strategy authority challenges Identify the most influential members within each network; who is trusted most? Whose word carries most weight, and why? Identify and exploit rivalries within each network and between networks - Disagreements already exist in these networks - How to exacerbate them, make them more acrimonious? - Encourage debate; force them to defend their ideas - Ideology vs. profit motivation differences lead to legitimacy questions Raise questions about strategic coherence, leadership competency, direction Highlight personal agendas of those who are “in charge” Highlight disconnect between rhetoric and actions – especially when an ideologically-driven group is involved in narcotics, extortion (e.g., UDF) Publicize CT successes and the network’s tactical failures; spread rumors of incompetence, strategic drift, lack of tactical control