Rand Corporation Monograph/Report MR-1382 ISBN: 0-8330-3030-2

Total Page:16

File Type:pdf, Size:1020Kb

Rand Corporation Monograph/Report MR-1382 ISBN: 0-8330-3030-2 Networks and Netwars: The Future of Terror, Crime, and Militancy Edited by: John Arquilla, David Ronfeldt Rand Corporation Monograph/Report MR-1382 ISBN: 0-8330-3030-2 http://www.rand.org/pubs/monograph_reports/MR1382/index.html Netwar-like cyberwar-describes a new spectrum of conflict that is emerging in the wake of the information revolution. Netwar includes conflicts waged, on the one hand, by terrorists, criminals, gangs, and ethnic extremists; and by civil-society activists (such as cyber activists or WTO protestors) on the other. What distinguishes netwar is the networked organizational structure of its practitioners-with many groups actually being leaderless-and their quickness in coming together in swarming attacks. To confront this new type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves. The research described in this report was performed under the auspices of RAND's National Security Research Division. The monograph/report was a product of the RAND Corporation from 1993 to 2003. RAND monograph/reports presented major research findings that addressed the challenges facing the public and private sectors. They included executive summaries, technical documentation, and synthesis pieces. Contents Preface Summary Acknowledgments Chapter One: The Advent of Netwar (Revisited) Part I: Violence-Prone Netwars Chapter Two: The Networking of Terror in the Information Age Chapter Three: Transnational Criminal Networks Chapter Four: Gangs, Hooligans, and Anarchists - the Vanguard of Netwar in the Streets Part II: Social Netwars Chapter Five: Networking Dissent: Cyber Activists Use the Internet to Promote Democracy in Burma Chapter Six: Emergence and Influence of the Zapatista Social Netwar Chapter Seven: Netwar in the Emerald City: WTO Protest Strategy and Tactics Part III: Once and Future Netwars Chapter Eight: Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy Chapter Nine: The Structure of Social Movements: Environmental Activism and Its Opponents Chapter Ten: What Next for Networks and Netwars? Afterword (September 2001): The Sharpening Fight for the Future Contributors About the Authors PREFACE The fight for the future makes daily headlines. Its battles are not be- tween the armies of leading states, nor are its weapons the large, ex- pensive tanks, planes, and fleets of regular armed forces. Rather, the combatants come from bomb-making terrorist groups like Osama bin Laden’s al-Qaeda, drug smuggling cartels like those in Colombia and Mexico, and militant anarchists like the Black Bloc that ran amok during the Battle of Seattle. Other protagonists are civil-society activ- ists fighting for democracy and human rights—from Burma to the Balkans. What all have in common is that they operate in small, dis- persed units that can deploy nimbly—anywhere, anytime. They know how to penetrate and disrupt, as well as elude and evade. All feature network forms of organization, doctrine, strategy, and technology at- tuned to the information age. And, from the Intifadah to the drug war, they are proving very hard to beat; some may actually be winning. This is the story we tell. This book also provides a further step in the elaboration of our ideas about how and why the information revolution is affecting the whole spectrum of conflict. Our notion of cyberwar (1993) focused on the military domain, and our first study of netwar1 (1996) on irregular modes of conflict, including terror, crime, and militant social activ- ism.2 The implications of these concepts for organization, doctrine, and technology across the spectrum of conflict were further elaborat- 1Our netwar concept predates, and should not be confused with, the U.S. military’s “network warfare simulation system” (NETWARS). 2For full citations of these and our other studies, please see the bibliographies for Chapters One and Ten. v vi Networks and Netwars: The Future of Terror, Crime, and Militancy ed in our book, In Athena’s Camp (1997). More recently, we noted that many activists who practice netwar are helping to create a new ap- proach to strategy and diplomacy that we call noopolitik (1999). Next, we expanded on our idea that swarming (2000) will emerge as a 21st- century doctrine that will encompass and enliven both cyberwar and netwar. Here, we offer new analysis about netwar. The analysis in- cludes case studies about terrorists, criminals, and gangs; social net- wars in Burma, Mexico, and Seattle; and closing chapters on some of the technological, organizational, and doctrinal dynamics of netwar. U.S. policymakers and strategists will be interested in this book. It should also interest analysts in academia and research institutes con- cerned with how the information revolution is altering the nature of conflict. This book was prepared for a project on “Networks and Netwars,” di- rected by John Arquilla and David Ronfeldt. The project was spon- sored by the Office of the Assistant Secretary of Defense (Command, Control, Communications and Intelligence), OASD/C3I, and was con- ducted within the International Security and Defense Policy Center of RAND’s National Defense Research Institute (NDRI). NDRI is a feder- ally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the unified commands, and the defense agencies. Comments are invited. We can be reached via email at arquilla@ rand.org and [email protected]. SUMMARY Netwar is the lower-intensity, societal-level counterpart to our earlier, mostly military concept of cyberwar. Netwar has a dual nature, like the two-faced Roman god Janus, in that it is composed of conflicts waged, on the one hand, by terrorists, criminals, and ethnonationalist extremists; and by civil-society activists on the other. What distin- guishes netwar as a form of conflict is the networked organizational structure of its practitioners—with many groups actually being lead- erless—and the suppleness in their ability to come together quickly in swarming attacks. The concepts of cyberwar and netwar encompass a new spectrum of conflict that is emerging in the wake of the informa- tion revolution. This volume studies major instances of netwar that have occurred over the past several years and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or “uncivil-society” criminals and terrorists, their netwars have general- ly been successful. In part, the success of netwar may be explained by its very novelty—much as earlier periods of innovation in military af- fairs have seen new practices triumphant until an appropriate re- sponse is discovered. But there is more at work here: The network form of organization has reenlivened old forms of licit and illicit activ- ity, posing serious challenges to those—mainly the militaries, con- stabularies, and governing officials of nation states—whose duty is to cope with the threats this new generation of largely nonstate actors poses. Strategists and policymakers in Washington and elsewhere have al- ready begun to discern the dark side of the netwar phenomenon, es- ix x Networks and Netwars: The Future of Terror, Crime, and Militancy pecially as manifested in terrorist and criminal organizations. This growing awareness is quite evident in recent official studies of this burgeoning problem: Patterns of Global Terrorism: 1999 (State De- partment, 2000), International Crime Threat Assessment (Interagency Working Group, 2000), and Global Trends 2015 (National Intelligence Council, 2000). But strategists and policymakers still have much work to do to harness the brighter, civil-society-building potential of net- worked nonstate actors. Thus, a fundamental challenge in the coming decade will be to focus on the opportunities that may arise from closer cooperation with nongovernmental organizations (NGOs) and other nonstate actors. For the U.S. Department of Defense, a range of possibilities opens up, from encouraging the early involvement of appropriate NGO net- works in helping to detect and head off a looming crisis, to working closely with them in the aftermath of conflicts to improve the effec- tiveness of U.S. forces still deployed, to reduce the residual hazards they face, and to strengthen the often fragile peace. In short, Ameri- can policymakers and strategists must continue to keep an eye on the perils posed by criminal and terrorist networks. But they must enlarge their vision and their practices to encompass the tremendous oppor- tunities likely to attend the rise of a network-based realm devoted to the protection of human rights, the spread of democratic values, and the formation of deep coalitions between states and civil-society NGOs. Netwar, the emergent mode of conflict of choice for networked nonstate actors, has two faces—and both matter very much. In this volume, we and our colleagues examine various types of net- war, from the most violent to the most socially activist. In so doing, we find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter: the technological, social, narrative, organizational, and doctrinal lev- els. A netwar actor must get all five right to be fully effective. While a network’s level of technological sophistication does make a difference—and people do tend to think that netwar depends heavily on technology—the other levels have just as much, if not more, of an effect on the potential power of a given group. One key level is the so- cial basis for cooperation among network members. When social ties Summary xi are strong, building mutual trust and identity, a network’s effective- ness is greatly enhanced. This can be seen most clearly in ethnically based terror, crime, and insurgent groups in which clan ties bind to- gether even the loosest, most dispersed organization. Among civil-society netwarriors, the narrative level of analysis may matter most.
Recommended publications
  • Terrorism and the Media (Including the Internet): an Extensive Bibliography
    Perspectives on Terrorism Volume 7, Issue 1, Supplement Terrorism and the Media (including the Internet): an Extensive Bibliography Compiled and selected by Judith Tinnes Introduction This bibliography is intended to serve as an extensive up-to-date resource for studying and researching the multi-faceted relationships between terrorism and the media, including the Internet. It contains over 2.200 records covering academic or professional journal articles (most of them peer-reviewed), book chapters, reports, conference contributions, books, theses and other text publications, mainly in English and German. To keep the bibliography manageable, smaller, more informal publications, e.g., blog posts, research briefs, commentaries, newspaper articles, or newsletters, were not considered – with a few exceptions of contributions containing ideas or subjects that were underrepresented in long-form academic or professional literature. The vast majority of resources included date from the 21st century, as after 9/11 – the biggest single media event in history – the amount of publications on the relationship between terrorism and the media has increased considerably. However, terrorist use of the media is as old as terrorism itself and has been researched since the beginning of terrorism studies. Therefore, this bibliography is not restricted to a particular time period and covers publications up to early February 2013. Thematically, the bibliography covers many aspects of the relationship between terrorism and the media, including these: • terrorist use of the traditional media (TV, radio, newspapers); • terrorist use of the new media, especially the Internet (E-Jihad, Cyberterrorism); • online radicalization; • 9/11 as a media event; • media-oriented counter-terrorism measures; • the psychological impact of media exposure to terrorist attacks; • the portrayal of Islam and Muslims after 9/11; • the depiction of terrorism in literature, movies and the arts; • media-oriented hostage-takings.
    [Show full text]
  • John Arquilla David Ronfeldt of Engaging in Such Serious Doctrinal Change
    SWARMING &The Future of Conflict A New Way of War Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign—involving the creation of platoon-like “pods” joined in company-like “clusters”—that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of “flattening,” which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” This study examines the benefits—and also the costs and risks— Arquilla David Ronfeldt John of engaging in such serious doctrinal change. The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approaches to battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming. Related Reading Arquilla, John, and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, MR-789-OSD, 1996.
    [Show full text]
  • FY17 Annual Report Metropolitan Enforcement Group
    State of Illinois Illinois State Police FY17 Annual Report Metropolitan Enforcement Group Printed by the Authority of the State of Illinois ISP Central Printing Section Printed on Recycled Paper ISP 5-583 (1/18) M www.illinois.gov www.isp.state.il.us Illinois State Police INTRODUCTION Metropolitan Enforcement Groups (MEGs), authorized by the Illinois General Assembly in 1977 under the Intergovernmental Drug Laws Enforcement Act (30 ILCS 715/6), continue to be an important component in the effort to combat illegal drug traffic throughout Illinois. MEGs represent a collaborative effort among state, federal, and local law enforcement agencies to enforce Illinois drug laws and investigate street gang activity. MEGs partner with Statewide Terrorism Intelligence Center (STIC) and Illinois National Guard Counterdrug analysts to reduce crime through intelligence led policing which focuses enforcement efforts on felony level drug distribution and trafficking. MEGs partner with community groups, health organizations, and local stakeholders to address and prevent substance abuse disorders (SUDs) affecting communities throughout Illinois. Illinois has nine MEGs encompassing 20 counties, including Scott County, Iowa. Combined populations of these counties is 3,968,508 or 31 percent of the total population of Illinois. The MEGs are staffed by 100 officers, 24 (24 percent) from the Illinois State Police (ISP), and 76 (76 percent) from local and federal agencies. Twenty-five administrative staff members manage budgets, analyze intelligence data, and coordinate asset seizures and forfeitures. Each MEG is overseen by a policy board composed of ISP officers, elected officials, and chief law enforcement officers or their designees. A 2017 report by the Illinois Criminal Justice Information Authority (ICJIA), concluded MEG units were effective at making proportionally more felony and manufacture/delivery arrests than their local counterparts.
    [Show full text]
  • Air Supremacy in US Air Force History, Theory, and Doctrine
    A HOUSE BUILT ON SAND: Air Supremacy in US Air Force History, Theory, and Doctrine E. Taylor Francis Major, USAF Air University James B. Hecker, Lieutenant General, Commander and President LeMay Center for Doctrine Development and Education Brad M. Sullivan, Major General, Commander AIR UNIVERSITY LEMAY CENTER FOR DOCTRINE DEVELOPMENT AND EDUCATION A House Built on Sand: Air Supremacy in US Air Force History, Theory, and Doctrine E. Taylor Francis, Major, USAF Lemay Paper No. 6 Air University Press Muir S. Fairchild Research Information Center Maxwell Air Force Base, Alabama Air University Commander and President Accepted by Air University Press May 2019 and published April 2020. Lt Gen James B. Hecker Commandant and Dean, LeMay Center for Doctrine Development and Education Maj Gen Brad Sullivan Director, Air University Press Lt Col Darin M. Gregg Project Editor Dr. Stephanie Havron Rollins Illustrator Daniel Armstrong Print Specialist Megan N. Hoehn Distribution Diane Clark Disclaimer Air University Press Opinions, conclusions, and recommendations expressed or implied 600 Chennault Circle, Building 1405 within are solely those of the authors and do not necessarily repre- Maxwell AFB, AL 36112-6010 sent the official policy or position of the organizations with which https://www.airuniversity.af.edu/AUPress/ they are associated or the views of the Air University Press, LeMay Center, Air University, United States Air Force, Department of Facebook: https://www.facebook.com/AirUnivPress Defense, or any other US government agency. This publication is cleared for public release and unlimited distribution. and This LeMay Paper and others in the series are available electronically Twitter: https://twitter.com/aupress at the AU Press website: https://www.airuniversity.af.edu/AUPress/ LeMay-Papers/.
    [Show full text]
  • The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J
    STRATEGIC PERSPECTIVES 33 The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for the Study of Chinese Military Affairs, and Center for the Study of Weapons of Mass Destruction. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the unified combatant commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: General William Westmoreland luncheon meeting with President Lyndon B. Johnson, The White House, April 6, 1968 (Yoichi Okamoto/ Courtesy LBJ Presidential Library/C9391-17A) The Micromanagement Myth and Mission Command The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations By Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 33 Series Editor: Thomas F. Lynch III National Defense University Press Washington, D.C. August 2020 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the State Department, Defense Department, or any other agency of the Federal Government.
    [Show full text]
  • The Dictionary Legend
    THE DICTIONARY The following list is a compilation of words and phrases that have been taken from a variety of sources that are utilized in the research and following of Street Gangs and Security Threat Groups. The information that is contained here is the most accurate and current that is presently available. If you are a recipient of this book, you are asked to review it and comment on its usefulness. If you have something that you feel should be included, please submit it so it may be added to future updates. Please note: the information here is to be used as an aid in the interpretation of Street Gangs and Security Threat Groups communication. Words and meanings change constantly. Compiled by the Woodman State Jail, Security Threat Group Office, and from information obtained from, but not limited to, the following: a) Texas Attorney General conference, October 1999 and 2003 b) Texas Department of Criminal Justice - Security Threat Group Officers c) California Department of Corrections d) Sacramento Intelligence Unit LEGEND: BOLD TYPE: Term or Phrase being used (Parenthesis): Used to show the possible origin of the term Meaning: Possible interpretation of the term PLEASE USE EXTREME CARE AND CAUTION IN THE DISPLAY AND USE OF THIS BOOK. DO NOT LEAVE IT WHERE IT CAN BE LOCATED, ACCESSED OR UTILIZED BY ANY UNAUTHORIZED PERSON. Revised: 25 August 2004 1 TABLE OF CONTENTS A: Pages 3-9 O: Pages 100-104 B: Pages 10-22 P: Pages 104-114 C: Pages 22-40 Q: Pages 114-115 D: Pages 40-46 R: Pages 115-122 E: Pages 46-51 S: Pages 122-136 F: Pages 51-58 T: Pages 136-146 G: Pages 58-64 U: Pages 146-148 H: Pages 64-70 V: Pages 148-150 I: Pages 70-73 W: Pages 150-155 J: Pages 73-76 X: Page 155 K: Pages 76-80 Y: Pages 155-156 L: Pages 80-87 Z: Page 157 M: Pages 87-96 #s: Pages 157-168 N: Pages 96-100 COMMENTS: When this “Dictionary” was first started, it was done primarily as an aid for the Security Threat Group Officers in the Texas Department of Criminal Justice (TDCJ).
    [Show full text]
  • Military Transformation? Which Transformation, and What Lies Ahead?
    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY institution that helps improve policy and POPULATION AND AGING decisionmaking through research and PUBLIC SAFETY SCIENCE AND TECHNOLOGY analysis. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details This product is part of the RAND Corporation reprint series. RAND reprints present previously published journal articles, book chapters, and reports with the permission of the publisher. RAND reprints have been formally reviewed in accordance with the publisher’s editorial policy, and are compliant with RAND’s rigorous quality assurance standards for quality and objectivity. 2 Military Transformation? Which Transformation, and What Lies Ahead? Paul K. Davis The term “military transformation” should simply be understood to mean “profound change” in military affairs.1 It need not imply rapid or across-the-board change, nor the discarding of that which continues to work well. The changes, however, should be dramatic rather than mere improvements on the margin such as modestly better aircraft, tanks, or ships. Transformation is a process with no simple end point.2 Military transformations are only sometimes successful; they can even be dis- tinctly counterproductive because militaries often embrace concepts too strongly and uncritically.3 Since mistakes are to be expected, hedging and course correction are basic ingredients in successful transformation.
    [Show full text]
  • Russian Strategic Intentions
    APPROVED FOR PUBLIC RELEASE Russian Strategic Intentions A Strategic Multilayer Assessment (SMA) White Paper May 2019 Contributing Authors: Dr. John Arquilla (Naval Postgraduate School), Ms. Anna Borshchevskaya (The Washington Institute for Near East Policy), Dr. Belinda Bragg (NSI, Inc.), Mr. Pavel Devyatkin (The Arctic Institute), MAJ Adam Dyet (U.S. Army, J5-Policy USCENTCOM), Dr. R. Evan Ellis (U.S. Army War College Strategic Studies Institute), Mr. Daniel J. Flynn (Office of the Director of National Intelligence (ODNI)), Dr. Daniel Goure (Lexington Institute), Ms. Abigail C. Kamp (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Roger Kangas (National Defense University), Dr. Mark N. Katz (George Mason University, Schar School of Policy and Government), Dr. Barnett S. Koven (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Jeremy W. Lamoreaux (Brigham Young University- Idaho), Dr. Marlene Laruelle (George Washington University), Dr. Christopher Marsh (Special Operations Research Association), Dr. Robert Person (United States Military Academy, West Point), Mr. Roman “Comrade” Pyatkov (HAF/A3K CHECKMATE), Dr. John Schindler (The Locarno Group), Ms. Malin Severin (UK Ministry of Defence Development, Concepts and Doctrine Centre (DCDC)), Dr. Thomas Sherlock (United States Military Academy, West Point), Dr. Joseph Siegle (Africa Center for Strategic Studies, National Defense University), Dr. Robert Spalding III (U.S. Air Force), Dr. Richard Weitz (Center for Political-Military Analysis at the Hudson Institute), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Prefaces Provided By: RDML Jeffrey J. Czerewko (Joint Staff, J39), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Editor: Ms.
    [Show full text]
  • Gang ID Sessions Meant to Break Down Fear Www
    TUnited States Attorney’s Office – Northern District of Indiana i s c o T T H Volume 6, Issue 3 March 2010 I s This collection of open source information is offered for informational purposes only. It is not, and should United States not be, construed as official evaluated intelligence. Points of view or opinions are those of the individual Department authors and do not necessarily represent the official position or policies of the U.S. Department of Justice or Of Justice the U.S. Attorney's Office for the Northern District of Indiana. Gang ID sessions meant to break down fear Published by JConline.com on February 23, 2010 LAFAYETTE, IN| In response to concerns of possible turf wars between rival gang members, Jefferson High School in recent years established a firm policy letting students U.S. Attorney’s know such behavior would not be tolerated. Office Northern District The result? Less conflict in hallways and fewer of Indiana instances of graffiti, which is often an indicator of a street gang's presence, assistant principal 5400 Federal Plaza Suite 1500 Roger Francis said. Hammond, IN 46320 219.937.5500 "Things have really subsided tremendously in the last year, knock on wood," he said. "That's not to David Capp United States Attorney say we don't have gang members or that it's gotten rid of gangs. Inside This Issue "But we've made it clear that the school is a neutral territory. What takes place on the streets Local News has no place in school. We will not tolerate any gang activity." Page 1 Regional News Page 6 Francis' last sentiment is one the Tippecanoe County prosecutor's office is hoping the National News community will adopt.
    [Show full text]
  • Gang Name Lookup
    Gang Name Lookup Gang Name Lookup LEADS Info → Help File Index → Gang Names → Gang Name Lookup To find a criminal street gang name, enter any portion of the name in the search box below and click "Submit." Gang Name Gang Name Comments No records returned. Top Display All Gang Names Gang Name Help File Display All Gang Names Display All Gang Names LEADS Info → Help File Index → Gang Names → Display All Gang Names Gang Name Comments 18th Street 4 Block 4 Corner Hustlers 47th Street Satan Disciples 69 Posse 8 Ball Posse 98 Posse 9th Street Gangster Disciples Akros Allport Lovers Ambrose American Born Kings (aka - ABK) American Breed Motorcycle Club American Freedom Militia American Indian Movement (AIM) American Nazi Party Angels of Death Animal Liberation Front Armed Forces of National Liberation Army of God Aropho Motorcycle Club Aryan Brotherhood Aryan Nation Aryan Patriots Ashland Vikings Asian Dragons Asian Gangster Disciples Asian Klik Assyrian Eagles Assyrian Kings Avengers Motorcycle Club Display All Gang Names Backstreetz Bad Ass Mother Fuckers Bad Company Motorcycle Club Bandidos Motorcycle Club Bassheads Bigelow Boys Biker Bishops BK Gang DCP BK GS GD SQD Black Eagles Black Gangster Disciple Black Gangsters Black Gates or Skates Black Mafia Black Mobb Black Pistons MC Black P-Stone Nation Black Skinheads Black Souls Black Stones BLK Disciple Bloods Bomb City Taggers Bomb Squad Bootleggers Motorcycle Club Botton Boys Brazers Breakaways Motorcycle Club Brotherhood Brothers of the Struggle Brothers Rising Motorcycle Club C.Ville Posse Campbell Boys Central Insane Channel One Posse Chicago Players Cholos Christian Patriots Church of the Creator Display All Gang Names Cicero Insane City Knights City Players C-Notes Cobra Stones Conservative Vice Lords Corbetts Crash Crew Crips Cullerton Deuces D.C.
    [Show full text]
  • Cartel and Gangs in Chicago
    UNCLASSIFIED Cartels and Gangs in CHICAGO DEA-CHI-DIR-013-17 MAY 2017 JOINT Intelligence REPORT CARTELS IN CHICAGO AND GANGS 1 UNCLASSIFIED Executive Summary Chicago has a long history of organized crime and is home to numerous street gangs that use the illegal drug trade to build their criminal enterprises. Although the murder rate in Chicago has declined significantly since the 1990s, recent instances of gang-related homicides have placed Chicago’s crime situation in the national spotlight. Compounding Chicago’s crime problem is a steady supply of drugs from Mexican drug cartels, most notably the Sinaloa Cartel. Illicit drugs flow from Mexico to Chicago via a loosely associated network of profit-driven intermediaries, with Chicago street gangs serving as the primary distributors at the street level. The profits earned through drug trafficking increase the staying power of both street gangs and drug trafficking organizations (DTOs), thereby influencing levels of violent crime in both the United States and Mexico. Of particular concern is the trafficking and distribution of heroin, which has increased significantly in recent years and caused significant harm to communities in Chicago and throughout the United States. This report provides background on the gang- related crime situation in Chicago and offers insight on the nexus between Mexican DTOs and Chicago street gangs. Details CHICAGO’S DRUG SITUATION The drug trafficking threat in Chicago encompasses virtually every aspect of the threat facing our nation—wholesale supply, transshipment, distribution, use, and money laundering—all of which are occurring at very high levels. The vast majority of illegal drugs distributed in Chicago are supplied by Mexican cartels, including the Sinaloa Cartel, Beltran-Leyva Cartel, Gulf Cartel, La Familia Michoacana, the Guerreros Unidos, and the Cartel de Jalisco Nueva Generacin.
    [Show full text]
  • Swarming and the Future of Conflict
    SWARMING &The Future of Conflict A New Way of War Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign—involving the creation of platoon-like “pods” joined in company-like “clusters”—that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of “flattening,” which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” This study examines the benefits—and also the costs and risks— Arquilla David Ronfeldt John of engaging in such serious doctrinal change. The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approaches to battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming. Related Reading Arquilla, John, and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, MR-789-OSD, 1996.
    [Show full text]