How Organized Crime Appropriates Counterinsurgency Violence by Philip Luke Johnson
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Highlights of Recent RAND Research on Counterinsurgency
Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces. -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Foreign Military Interventions and Suicide Attacks
Article Journal of Conflict Resolution 2017, Vol. 61(2) 271-297 ª The Author(s) 2015 Foreign Military Reprints and permission: sagepub.com/journalsPermissions.nav DOI: 10.1177/0022002715576575 Interventions journals.sagepub.com/home/jcr and Suicide Attacks Seung-Whan Choi1, and James A. Piazza2 Abstract This study examines the effect of foreign military interventions on the incidence of suicide attacks. It presents three theoretical explanations. Foreign military inter- ventions may boost insurgent use of suicide attacks by (a) fomenting a nationalist backlash that sanctions the use of more extreme and unconventional tactics like suicide attacks, (b) providing more and better targets against which suicide attacks can be launched, or (c) prompting insurgents to use suicide tactics in order to overcome their power asymmetries and to confront better defended targets that are enhanced by interventions. We test these competing explanations using a bat- tery of statistical tests on cross-national, time-series data for 138 countries during the period from 1981 to 2005. We find that only foreign interventions with specific features—pro-government interventions involving larger numbers of ground troops—boost suicide attacks in countries experiencing interventions. This finding suggests that by tipping the balance of power against insurgents and hardening targets in the context of assisting a local government, foreign military interventions are likely to increase the use of suicide attacks by regime challengers. Keywords terrorism, suicide bombings, military intervention, international security 1Department of Political Science (MC 276), University of Illinois at Chicago, Chicago, IL, USA 2Department of Political Science, Pennsylvania State University, University Park, PA, USA Corresponding Author: James A. -
Patterns of Terrorism in the United States, 1970-2013
Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS). -
Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency
Order Code RL32737 CRS Report for Congress Received through the CRS Web Military Aviation: Issues and Options for Combating Terrorism and Counterinsurgency January 27, 2006 Christopher Bolkcom Specialist in National Defense Foreign Affairs, Defense, and Trade Division Kenneth Katzman Specialist in Middle East Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Military Aviation: Issues and Options for Combating Terrorism Summary By all accounts, the U.S. military dominates state-on-state conflict. In the past, non-state actors (terrorists, guerrillas, drug traffickers) appeared to be less threatening to U.S. national security than the well funded, well organized, and potent armed forces of an enemy nation-state. The terrorist attacks of September 11, 2001 illustrate, however, that small groups of non-state actors can exploit relatively inexpensive and commercially available technology to conduct very destructive attacks over great distances. Today’s U.S. armed forces were developed principally with state-on-state conflict in mind. Combating non-state actors, however, presents a number of distinct challenges in terms of operations, cost, and mindset. Non-state actors generally strive to hide within civilian populations. While U.S. policy makers typically seek quick and decisive victories, non-state actors seek protracted war. Non-state actors often employ cheap, commercially available weapons, that often result in expensive responses by the United States. Many of the weapons and methods employed today by U.S. armed forces can be used against non-state actors. Some, however, are more directly applicable than others. U.S. experience in conducting close air support (CAS), employing special operations forces (SOF) and advising friendly governments in using aviation to defend themselves from insurgents and terrorists may form a basis for building capabilities against non-state actors. -
Counterinsurgency Operations
The Basics of Counterinsurgency By R. Scott Moore1 Abstract The study examines the basic characteristics of insurgencies and counterinsurgency campaigns conducted over the past century, strip away many of the prevailing assumptions. Based on detailed analysis of nearly sixty counterinsurgency campaigns, successful and unsuccessful, as well as the lessons learned by American and Coalition forces in Afghanistan and Iraq since 2001, the conclusions offer a historically grounded framework for thinking about counterinsurgency. While every conflict exhibited its own unique causes and conditions requiring tailored solutions, as a whole the many counterinsurgency campaigns exhibited fundamental characteristics that remained constant. If there were no immutable laws or empirical formulas for counterinsurgency, there existed certain basic principles and traits that marked and will continue to mark successful, and unsuccessful, outcomes. Introduction Recent operations in Afghanistan and Iraq have forcibly highlighted the need to reexamine how we fight irregular conflicts, and especially insurgencies to find a strategy to address these emerging threats. Religious extremism, ethnic intolerance, and socio- economic imbalances have given birth to fanatical movements demanding radical change. Insurgencies, and the terrorism that accompanies them, pose complex challenges threatening political and social stability and defying military attempts to suppress or defeat them. Unfortunately, if the conceptual confusion emanating from the many debates over these conflicts is any indication, we seem to have forgotten the past while attempting to reinvent the future. The lack of an integrated and multi-dimensional approach to these new threats too often leads to confusion and disjointed responses and acrimonious debates not only over what needs to be done, but who- military or civilian- should do it. -
The Strategic Paradox of Truly Autonomous Weapons
The strategic paradox of autonomous weapons ZIPAR Policy Brief February 2018 Marko Kovic ZIPAR About ZIPAR The Zurich Institute of Public Aairs Research is devoted to identifying and addressing the major challenges for humankind in the short-term, in the medium- term, and in the long-term future. ZIPAR is an independent nonprot think tank based in Zurich, Switzerland. Recommended citation Marko Kovic (2018): The strategic paradox of autonomous weapons systems. ZIPAR Policy Brief. Zurich, Switzerland. Copyright This document is licensed under a Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International license. You can freely distribute this document and reference it in other works. For any questions about copyright, feel free to contact the author ([email protected]). 2 The strategic paradox of autonomous weapons ZIPAR Policy Brief Abstract Progress in articial intelligence makes the technology increasingly relevant to military applications. In particular, autonomous weapons could be of great military use: Autonomous weapons could achieve goals more ef- fectively and more eciently than humans or human-operated weapons. In this policy brief, the potential impact of implementing autonomous weapons on the behavior and decision-making of the military is discussed. The most probable positive impact, greater adherence to humanitarian law on the battleeld, is outweighed by the most probable negative impact, a disruption of the military chain of command and the security risks that follow from that disruption. This creates a strategic paradox: Even though autonomous weapons could help the military achieve goals more eectively and more eciently, autonomous weapons would strategically undermine the military by disrupting the chain of command and by creating a great security risk. -
Hardening Soft Targets
New Visions for Public Affairs, Volume 11, Spring 2019 || 14 Policy in Action Piece Hardening Soft Targets Daniel Henne University of Delaware Terrorism was once a scattered, intermittent concern for the global community. It is now an everyday security problem that primarily affects large urban centers that have not been secured. Proper risk assessment, intelligence collection, public awareness, organizational collaboration, and improvements in technology are key areas and points that need to be emphasized in terrorism prevention. When it comes to implementing effective counterterrorism practices, places such as New York City have made strides. The city’s ability to prevent attacks can be contributed to their extensive use of surveillance systems, as well as their robust information- sharing and collaborative abilities. This paper assesses the major findings in counterterrorism literature and in practice, providing examples of advances that New York City has utilized in order to keep people safe from terrorist attacks. Policy Problem and Historical Context keep counterterrorism and soft target hardening Terrorist attacks and their effects on at the forefront of their public safety concerns. people throughout the world have been a In addition to this analysis, the following paper protracted concern for the past twenty years. will recommend improvements that can be Although the methods in which these types of made to bolster practices and procedures in attacks have varied, a vast majority of them developing better public safety standards and have occurred in places that can be defined as outcomes. soft targets (French, 2015). Soft targets are locations that are accessible to large numbers of Terrorism and Soft Targets people and that have limited security or There is no universally accepted definition protection methods in case of an emergency. -
Responding to Victims of Terrorism and Mass Violence Crimes Coordination and Collaboration Between American Red Cross Workers and Crime Victim Service Providers
U.S. Department of Justice Office of Justice Programs Responding to Victims of Terrorism and Mass Violence Crimes Coordination and Collaboration Between American Red Cross Workers and Crime Victim Service Providers “Putting Victims First” U.S. Department of Justice Office of Justice Programs 810 Seventh Street NW. Washington, DC 20531 Alberto R. Gonzales Attorney General Regina B. Schofield Assistant Attorney General John W. Gillis Director, Office for Victims of Crime Office of Justice Programs Partnerships for Safer Communities www.ojp.usdoj.gov Office for Victims of Crime www.ovc.gov NCJ 209681 This document was prepared by the Office for Victims of Crime and the American Red Cross under contract number OJP–2001–253–M, awarded by the Office for Victims of Crime, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions expressed in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. The Office for Victims of Crime is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, the Bureau of Justice Statistics, the National Institute of Justice, and the Office of Juvenile Justice and Delinquency Prevention. Contents Introduction and Overview . .1 OVC/American Red Cross Collaborative Timeline . .2 Natural Disasters, Acts of Terrorism, and Mass Violence Crimes: Similarities and Differences . .3 Office for Victims of Crime . .6 Crime Victim Assistance and Services . .8 Grants and Funding Available to Organizations Through OVC . .10 Basics of the Criminal Justice Process . .11 Conclusion . .13 References and Resources . -
Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics.