The Future of Terror, Crime, and Militancy

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Terror, Crime, and Militancy The Future of Terror, Crime, and Militancy John Arquilla s David Ronfeldt National Defense Research Institute R The research described in this report was sponsored by the Office of the Secretary of Defense (OSD). The research was conducted in RAND’s National Defense Research Institute, a federally funded research and development center supported by the OSD, the Joint Staff, the unified commands, and the defense agencies under Contract DASW01-01-C-0004. Library of Congress Cataloging-in-Publication Data Networks and netwars : The future of terror, crime, and militancy / John Arquilla, David Ronfeldt. p. cm. MR-1382 Includes bibliographical references. ISBN 0-8330-3030-2 1. Information warfare. 2. Cyberterrorism. I. Arquilla, John. II. Ronfeldt, David F. HV6773 .N47 2001 303.6'25—dc21 2001041739 RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors. Cover design by Peter Soriano © Copyright 2001 RAND All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2001 by RAND 1700 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 201 North Craig Street, Suite 102, Pittsburgh, PA 15213 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: [email protected] To Dick O’Neill, for his stalwart support and keen eye PREFACE The fight for the future makes daily headlines. Its battles are not be- tween the armies of leading states, nor are its weapons the large, ex- pensive tanks, planes, and fleets of regular armed forces. Rather, the combatants come from bomb-making terrorist groups like Osama bin Laden’s al-Qaeda, drug smuggling cartels like those in Colombia and Mexico, and militant anarchists like the Black Bloc that ran amok during the Battle of Seattle. Other protagonists are civil-society activ- ists fighting for democracy and human rights—from Burma to the Balkans. What all have in common is that they operate in small, dis- persed units that can deploy nimbly—anywhere, anytime. They know how to penetrate and disrupt, as well as elude and evade. All feature network forms of organization, doctrine, strategy, and technology at- tuned to the information age. And, from the Intifadah to the drug war, they are proving very hard to beat; some may actually be winning. This is the story we tell. This book also provides a further step in the elaboration of our ideas about how and why the information revolution is affecting the whole spectrum of conflict. Our notion of cyberwar (1993) focused on the military domain, and our first study of netwar1 (1996) on irregular modes of conflict, including terror, crime, and militant social activ- ism.2 The implications of these concepts for organization, doctrine, and technology across the spectrum of conflict were further elaborat- 1Our netwar concept predates, and should not be confused with, the U.S. military’s “network warfare simulation system” (NETWARS). 2For full citations of these and our other studies, please see the bibliographies for Chapters One and Ten. v vi Networks and Netwars: The Future of Terror, Crime, and Militancy ed in our book, In Athena’s Camp (1997). More recently, we noted that many activists who practice netwar are helping to create a new ap- proach to strategy and diplomacy that we call noopolitik (1999). Next, we expanded on our idea that swarming (2000) will emerge as a 21st- century doctrine that will encompass and enliven both cyberwar and netwar. Here, we offer new analysis about netwar. The analysis in- cludes case studies about terrorists, criminals, and gangs; social net- wars in Burma, Mexico, and Seattle; and closing chapters on some of the technological, organizational, and doctrinal dynamics of netwar. U.S. policymakers and strategists will be interested in this book. It should also interest analysts in academia and research institutes con- cerned with how the information revolution is altering the nature of conflict. This book was prepared for a project on “Networks and Netwars,” di- rected by John Arquilla and David Ronfeldt. The project was spon- sored by the Office of the Assistant Secretary of Defense (Command, Control, Communications and Intelligence), OASD/C3I, and was con- ducted within the International Security and Defense Policy Center of RAND’s National Defense Research Institute (NDRI). NDRI is a feder- ally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the unified commands, and the defense agencies. Comments are invited. We can be reached via email at arquilla@ rand.org and [email protected]. CONTENTS Preface . v Summary . ix Acknowledgments . xiii Chapter One THE ADVENT OF NETWAR (REVISITED) John Arquilla and David Ronfeldt . 1 Part I: Violence-Prone Netwars Chapter Two THE NETWORKING OF TERROR IN THE INFORMATION AGE Michele Zanini and Sean J.A. Edwards . 29 Chapter Three TRANSNATIONAL CRIMINAL NETWORKS Phil Williams . 61 Chapter Four GANGS, HOOLIGANS, AND ANARCHISTS—THE VANGUARD OF NETWAR IN THE STREETS John P. Sullivan . 99 Part II: Social Netwars Chapter Five NETWORKING DISSENT: CYBER ACTIVISTS USE THE INTERNET TO PROMOTE DEMOCRACY IN BURMA Tiffany Danitz and Warren P. Strobel . 129 vii viii Networks and Netwars: The Future of Terror, Crime, and Militancy Chapter Six EMERGENCE AND INFLUENCE OF THE ZAPATISTA SOCIAL NETWAR David Ronfeldt and John Arquilla . 171 Chapter Seven NETWAR IN THE EMERALD CITY: WTO PROTEST STRATEGY AND TACTICS Paul de Armond . 201 Part III: Once and Future Netwars Chapter Eight ACTIVISM, HACKTIVISM, AND CYBERTERRORISM: THE INTERNET AS A TOOL FOR INFLUENCING FOREIGN POLICY Dorothy E. Denning . 239 Chapter Nine THE STRUCTURE OF SOCIAL MOVEMENTS: ENVIRONMENTAL ACTIVISM AND ITS OPPONENTS Luther P. Gerlach . 289 Chapter Ten WHAT NEXT FOR NETWORKS AND NETWARS? David Ronfeldt and John Arquilla . 311 AFTERWORD (SEPTEMBER 2001): THE SHARPENING FIGHT FOR THE FUTURE John Arquilla and David Ronfeldt . 363 Contributors . 373 About the Editors . 375 SUMMARY Netwar is the lower-intensity, societal-level counterpart to our earlier, mostly military concept of cyberwar. Netwar has a dual nature, like the two-faced Roman god Janus, in that it is composed of conflicts waged, on the one hand, by terrorists, criminals, and ethnonationalist extremists; and by civil-society activists on the other. What distin- guishes netwar as a form of conflict is the networked organizational structure of its practitioners—with many groups actually being lead- erless—and the suppleness in their ability to come together quickly in swarming attacks. The concepts of cyberwar and netwar encompass a new spectrum of conflict that is emerging in the wake of the informa- tion revolution. This volume studies major instances of netwar that have occurred over the past several years and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or “uncivil-society” criminals and terrorists, their netwars have general- ly been successful. In part, the success of netwar may be explained by its very novelty—much as earlier periods of innovation in military af- fairs have seen new practices triumphant until an appropriate re- sponse is discovered. But there is more at work here: The network form of organization has reenlivened old forms of licit and illicit activ- ity, posing serious challenges to those—mainly the militaries, con- stabularies, and governing officials of nation states—whose duty is to cope with the threats this new generation of largely nonstate actors poses. Strategists and policymakers in Washington and elsewhere have al- ready begun to discern the dark side of the netwar phenomenon, es- ix x Networks and Netwars: The Future of Terror, Crime, and Militancy pecially as manifested in terrorist and criminal organizations. This growing awareness is quite evident in recent official studies of this burgeoning problem: Patterns of Global Terrorism: 1999 (State De- partment, 2000), International Crime Threat Assessment (Interagency Working Group, 2000), and Global Trends 2015 (National Intelligence Council, 2000). But strategists and policymakers still have much work to do to harness the brighter, civil-society-building potential of net- worked nonstate actors. Thus, a fundamental challenge in the coming decade will be to focus on the opportunities that may arise from closer cooperation with nongovernmental organizations (NGOs) and other nonstate actors. For the U.S. Department of Defense, a range of possibilities opens up, from encouraging the early involvement of appropriate NGO net- works in helping to detect and head off a looming crisis, to working closely with them in the aftermath of conflicts to improve the effec- tiveness of U.S. forces still deployed, to reduce the residual hazards they face, and to strengthen the often fragile peace. In short, Ameri- can policymakers and strategists must continue to keep an eye on the perils posed by criminal and terrorist networks. But they must enlarge their vision and their practices to encompass the tremendous oppor- tunities likely to attend the rise of a network-based realm devoted to the protection of human rights, the spread of democratic values, and the formation of deep coalitions between states and civil-society NGOs. Netwar, the emergent mode of conflict of choice for networked nonstate actors, has two faces—and both matter very much. In this volume, we and our colleagues examine various types of net- war, from the most violent to the most socially activist. In so doing, we find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework.
Recommended publications
  • Terrorism and the Media (Including the Internet): an Extensive Bibliography
    Perspectives on Terrorism Volume 7, Issue 1, Supplement Terrorism and the Media (including the Internet): an Extensive Bibliography Compiled and selected by Judith Tinnes Introduction This bibliography is intended to serve as an extensive up-to-date resource for studying and researching the multi-faceted relationships between terrorism and the media, including the Internet. It contains over 2.200 records covering academic or professional journal articles (most of them peer-reviewed), book chapters, reports, conference contributions, books, theses and other text publications, mainly in English and German. To keep the bibliography manageable, smaller, more informal publications, e.g., blog posts, research briefs, commentaries, newspaper articles, or newsletters, were not considered – with a few exceptions of contributions containing ideas or subjects that were underrepresented in long-form academic or professional literature. The vast majority of resources included date from the 21st century, as after 9/11 – the biggest single media event in history – the amount of publications on the relationship between terrorism and the media has increased considerably. However, terrorist use of the media is as old as terrorism itself and has been researched since the beginning of terrorism studies. Therefore, this bibliography is not restricted to a particular time period and covers publications up to early February 2013. Thematically, the bibliography covers many aspects of the relationship between terrorism and the media, including these: • terrorist use of the traditional media (TV, radio, newspapers); • terrorist use of the new media, especially the Internet (E-Jihad, Cyberterrorism); • online radicalization; • 9/11 as a media event; • media-oriented counter-terrorism measures; • the psychological impact of media exposure to terrorist attacks; • the portrayal of Islam and Muslims after 9/11; • the depiction of terrorism in literature, movies and the arts; • media-oriented hostage-takings.
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
    What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions.
    [Show full text]
  • Virtual Currencies in the Eurosystem: Challenges Ahead
    STUDY Requested by the ECON committee Virtual currencies in the Eurosystem: challenges ahead Monetary Dialogue July 2018 Policy Department for Economic, Scientific and Quality of Life Policies Authors: Rosa María LASTRA, Jason Grant ALLEN Directorate-General for Internal Policies EN PE 619.020 – July 2018 Virtual currencies in the Eurosystem: challenges ahead Monetary Dialogue July 2018 Abstract Speculation on Bitcoin, the evolution of money in the digital age, and the underlying blockchain technology are attracting growing interest. In the context of the Eurosystem, this briefing paper analyses the legal nature of privately issued virtual currencies (VCs), the implications of VCs for central bank’s monetary policy and monopoly of note issue, and the risks for the financial system at large. The paper also considers some of the proposals concerning central bank issued virtual currencies. This document was provided by Policy Department A at the request of the Committee on Economic and Monetary Affairs. This document was requested by the European Parliament's Committee on Economic and Monetary Affairs. AUTHORS Rosa María LASTRA, Centre for Commercial Law Studies, Queen Mary University of London Jason Grant ALLEN, Humboldt-Universität zu Berlin Centre for British Studies, University of New South Wales Centre for Law Markets and Regulation ADMINISTRATOR RESPONSIBLE Dario PATERNOSTER EDITORIAL ASSISTANT Janetta CUJKOVA LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR Policy departments provide in-house and external expertise to support EP committees
    [Show full text]
  • The Blitz and Its Legacy
    THE BLITZ AND ITS LEGACY 3 – 4 SEPTEMBER 2010 PORTLAND HALL, LITTLE TITCHFIELD STREET, LONDON W1W 7UW ABSTRACTS Conference organised by Dr Mark Clapson, University of Westminster Professor Peter Larkham, Birmingham City University (Re)planning the Metropolis: Process and Product in the Post-War London David Adams and Peter J Larkham Birmingham City University [email protected] [email protected] London, by far the UK’s largest city, was both its worst-damaged city during the Second World War and also was clearly suffering from significant pre-war social, economic and physical problems. As in many places, the wartime damage was seized upon as the opportunity to replan, sometimes radically, at all scales from the City core to the county and region. The hierarchy of plans thus produced, especially those by Abercrombie, is often celebrated as ‘models’, cited as being highly influential in shaping post-war planning thought and practice, and innovative. But much critical attention has also focused on the proposed physical product, especially the seductively-illustrated but flawed beaux-arts street layouts of the Royal Academy plans. Reconstruction-era replanning has been the focus of much attention over the past two decades, and it is appropriate now to re-consider the London experience in the light of our more detailed knowledge of processes and plans elsewhere in the UK. This paper therefore evaluates the London plan hierarchy in terms of process, using new biographical work on some of the authors together with archival research; product, examining exactly what was proposed, and the extent to which the different plans and different levels in the spatial planning hierarchy were integrated; and impact, particularly in terms of how concepts developed (or perhaps more accurately promoted) in the London plans influenced subsequent plans and planning in the UK.
    [Show full text]
  • Guidance for a Risk-Based Approach to Virtual
    GUIDANCE FOR A RISK-BASED APPROACH VIRTUAL ASSETS AND VIRTUAL ASSET SERVICE PROVIDERS JUNE 2019 The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard. For more information about the FATF, please visit www.fatf-gafi.org This document and/or any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Citing reference: FATF (2019), Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers, FATF, Paris, www.fatf-gafi.org/publications/fatfrecommendations/documents/Guidance-RBA-virtual-assets.html © 2019 FATF/OECD. All rights reserved. No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: [email protected]) Photocredits coverphoto ©Getty Images GUIDANCE FOR A RISK-BASED APPROACH TO VIRTUAL ASSETS AND VIRTUAL ASSET SERVICE PROVIDERS 1 │ Table of contents Acronyms ...............................................................................................................................................
    [Show full text]
  • John Arquilla David Ronfeldt of Engaging in Such Serious Doctrinal Change
    SWARMING &The Future of Conflict A New Way of War Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign—involving the creation of platoon-like “pods” joined in company-like “clusters”—that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of “flattening,” which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” This study examines the benefits—and also the costs and risks— Arquilla David Ronfeldt John of engaging in such serious doctrinal change. The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approaches to battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming. Related Reading Arquilla, John, and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, MR-789-OSD, 1996.
    [Show full text]
  • Gang Project Brochure Pg 1 020712
    Salt Lake Area Gang Project A Multi-Jurisdictional Gang Intelligence, Suppression, & Diversion Unit Publications: The Project has several brochures available free of charge. These publications Participating Agencies: cover a variety of topics such as graffiti, gang State Agencies: colors, club drugs, and advice for parents. Local Agencies: Utah Dept. of Human Services-- Current gang-related crime statistics and Cottonwood Heights PD Div. of Juvenile Justice Services historical trends in gang violence are also Draper City PD Utah Dept. of Corrections-- available. Granite School District PD Law Enforcement Bureau METRO Midvale City PD Utah Dept. of Public Safety-- GANG State Bureau of Investigation Annual Gang Conference: The Project Murray City PD UNIT Salt Lake County SO provides an annual conference open to service Salt Lake County DA Federal Agencies: providers, law enforcement personnel, and the SHOCAP Bureau of Alcohol, Tobacco, community. This two-day event, held in the South Salt Lake City PD Firearms, and Explosives spring, covers a variety of topics from Street Taylorsville PD United States Attorney’s Office Survival to Gang Prevention Programs for Unified PD United States Marshals Service Schools. Goals and Objectives commands a squad of detectives. The The Salt Lake Area Gang Project was detectives duties include: established to identify, control, and prevent Suppression and street enforcement criminal gang activity in the jurisdictions Follow-up work on gang-related cases covered by the Project and to provide Collecting intelligence through contacts intelligence data and investigative assistance to with gang members law enforcement agencies. The Project also Assisting local agencies with on-going provides youth with information about viable investigations alternatives to gang membership and educates Answering law-enforcement inquiries In an emergency, please dial 911.
    [Show full text]
  • Investigating Web Defacement Campaigns at Large
    Session 11: Malware and Web ASIACCS’18, June 4–8, 2018, Incheon, Republic of Korea Investigating Web Defacement Campaigns at Large Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Forward-Looking Threat Research Team - Trend Micro, Inc. ABSTRACT the attack, team affiliation of the defacer(s), or nicknames ofthe Website defacement is the practice of altering the web pages of a supporting actors. Over the years, defacers have abandoned their website after its compromise. The altered pages, called deface pages, interested in defacing for the mere purpose of advertising the com- can negatively affect the reputation and business of the victim site. promise, pursuing defacement more as a mean to broadcast strong Previous research has focused primarily on detection, rather than messages “to the World”—by compromising popular websites. exploring the defacement phenomenon in depth. While investigat- Despite several actors are still driven by the desire of promot- ing several defacements, we observed that the artifacts left by the ing their own reputation, an increasing number of defacers strive defacers allow an expert analyst to investigate the actors’ modus instead to promote their ideologies, religious orientation, political operandi and social structure, and expand from the single deface views, or other forms of activism, often closely following real-world page to a group of related defacements (i.e., a campaign). However, events (e.g., war, elections, crisis, terrorist attacks). We refer to this manually performing such analysis on millions of incidents is te- phenomenon as dark propaganda, to highlight that legitimate re- dious, and poses scalability challenges. From these observations, we sources are abused for pushing the actors’ viewpoints.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Sean Patrick Griffin, Professor of Criminal Justice, Received His Ph.D
    Sean Patrick Griffin, Professor of Criminal Justice, received his Ph.D. in the Administration of Justice (Sociology) from The Pennsylvania State University. Dr. Griffin, a former Philadelphia Police Officer, has authored peer-reviewed articles on the following topics: police legitimacy, police abuse of force, the social construction of white-collar crime, securities frauds, professional sports gambling, international narcotics trafficking and money laundering, political corruption, and organized crime. Dr. Griffin is the author of the critically-acclaimed text Philadelphia’s Black Mafia: A Social and Political History (Springer, 2003), and of the best-selling, more mainstream Black Brothers, Inc.: The Violent Rise and Fall of Philadelphia’s Black Mafia (Milo, 2005/2007). Each book is currently being/has been updated and revised to reflect historical events that have transpired since their respective initial publications. In 2007, Black Entertainment Television (BET) based an episode (“Philly Black Mafia: ‘Do For Self’”) of its popular “American Gangster” series on Black Brothers, Inc. Dr. Griffin was an interview subject and consultant for the episode, which is now re-broadcast on the History Channel and A&E Network, among others. Most recently, Professor Griffin authored the best-selling Gaming the Game: The Story Behind the NBA Betting Scandal and the Gambler Who Made It Happen (Barricade, 2011), which has been discussed in numerous academic and media forums. An ardent public scholarship advocate, Dr. Griffin commonly lends his expertise to an assortment of entities and individuals, including but not limited to: local, state, and federal law enforcement agencies (especially in re: organized crime, extortion, narcotics trafficking, tax evasion, and money laundering); regulatory agencies (especially in re: gaming and stock fraud); social service agencies (especially in re: policing and violence against women); and print, radio, and television outlets throughout the U.S.
    [Show full text]
  • World War 11
    World War 11 When the British Government declared war against Germany in September 1939, notices went out to many people requiring them to report to recruiting centres for assessment of their fitness to serve in the armed forces. Many deaf men went; and many were rejected and received their discharge papers. Two discharge certificates are shown, both issued to Herbert Colville of Hove, Sussex. ! man #tat I AND NATIOIUL WVlc4 m- N.S. n. With many men called up, Britain was soon in dire need of workers not only to contribute towards the war but to replace men called up by the armed forces. Many willing and able hands were found in the form of Deaf workers. While many workers continued in their employment during the war, there were many others who were requisitioned under Essential Works Orders (EWO) and instructed to report to factories elsewhere to cany out work essential to the war. Deaf females had to do ammunition work, as well as welding and heavy riveting work in armoury divisions along with males. Deaf women were generally so impressive in their war work that they were in much demand. Some Deaf ladies were called to the Land Army. Carpenters were also in great demand and they were posted all over Britain, in particular in naval yards where new ships were being fitted out and existing ships altered for the war. Deaf tailors and seamstresses were kept busy making not only uniforms and clothing materials essential for the war, but utility clothes that were cheaply bought during the war.
    [Show full text]