Convergence: Illicit Networks and National Security in the Age of Globalization, That Delves Deeply Into Everything Mentioned Above and More

Total Page:16

File Type:pdf, Size:1020Kb

Convergence: Illicit Networks and National Security in the Age of Globalization, That Delves Deeply Into Everything Mentioned Above and More Edited by Michael Miklaucic and Jacqueline Brewer With a Foreword by Admiral James G. Stavridis, USN Published for the Center for Complex Operations Institute for National Strategic Studies By National Defense University Press Washington, D.C. 2013 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Portions of this book may be quoted or reprinted without permission, provided that a standard source credit line is included. NDU Press would appreciate a courtesy copy of reprints or reviews. First printing, April 2013 NDU Press publications are sold by the U.S. Government Printing Office. For ordering information, call (202) 512–1800 or write to the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402. For GPO publications on-line, access its Web site at: http://www.access. gpo.gov/su_docs/sale.html. For current publications of the Institute for National Strategic Studies, consult the National Defense University Web site at: http://www.ndu.edu. Contents Foreword vii James G. Stavridis Acknowledgments xi Introduction xiii Michael Miklaucic and Jacqueline Brewer Part I. A Clear and Present Danger Chapter 1 3 Deviant Globalization Nils Gilman, Jesse Goldhammer, and Steven Weber Chapter 2 15 Lawlessness and Disorder: An Emerging Paradigm for the 21st Century Phil Williams Chapter 3 37 Can We Estimate the Global Scale and Impact of Illicit Trade? Justin Picard Part II. Complex Illicit Operations Chapter 4 63 The Illicit Supply Chain Duncan Deville Chapter 5 75 Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect Douglas Farah Chapter 6 97 The Geography of Badness: Mapping the Hubs of the Illicit Global Economy Patrick Radden Keefe Chapter 7 111 Threat Finance: A Critical Enabler for Illicit Networks Danielle Camner Lindholm and Celina B. Realuyo v Contents Chapter 8 131 Money Laundering into Real Estate Louise Shelley Part III. The Attack on Sovereignty Chapter 9 149 The Criminal State Michael Miklaucic and Moisés Naím Chapter 10 171 How Illicit Networks Impact Sovereignty John P. Sullivan Chapter 11 189 Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building Vanda Felbab-Brown Part IV. Fighting Back Chapter 12 213 Fighting Networks with Networks David M. Luna Chapter 13 233 The Department of Defense’s Role in Combating Transnational Organized Crime William F. Wechsler and Gary Barnabo Chapter 14 243 Collaborating to Combat Illicit Networks Through Interagency and International Efforts Celina B. Realuyo About the Contributors 269 vi Foreword Admiral James G. Stavridis, USN llicit networks affect everyone in our modern, globalized world. From human trafficking Iin Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries. I have experience combating these threats personally at the tactical, operational, and stra- tegic levels. As a young naval officer on a variety of ships, I spent a fair amount of time patrolling the global commons where transnational criminals in the guise of pirates and drug smugglers proliferate. I was in the Pentagon on 9/11 and personally experienced the global reach of mod- ern terrorism. Later on, when I commanded U.S. Southern Command (USSOUTHCOM), one of my subordinate commands was Joint Interagency Task Force–South in Key West, Florida, a multinational and interagency/interministerial command that counters drug traf- ficking in the Western Hemisphere. I also experienced the pernicious effects that transnational crime has on our friends as it ranges throughout the entire Western Hemisphere. After leaving USSOUTHCOM to become commander at U.S. European Command (USEUCOM), I saw that Europe was also challenged by the same types of transnational crime. In response, I stood up the Joint/Interagency Counter Trafficking Center in Stuttgart, Germany, designed to counter transnational criminal networks in cooperation with our international partners. When I took command of USEUCOM, I also became the Supreme Allied Commander, Europe (SACEUR). As SACEUR, I command Operation Active Endeavor, which counters trafficking in the Mediterranean, and OperationOcean Shield, which is part of the international counterpiracy efforts off the Somali coast. In addition, we have pioneered responses to cyber threats. At the Supreme Headquarters Allied Powers Europe, we have the North Atlantic Treaty Organization Computer Incident Response Center, and at USEUCOM, we are taking steps to create a subunified cyber command that will have links to both U.S. Cyber Command in the United States and USEUCOM in Germany. All of these organizations were designed to facilitate a whole-of-government approach, where all elements of national power work together in order to address emerging threats. Eventually, once societies understand the nature of the threats facing them, they will hopefully mobilize nongovernmental assets, adopting a “whole of society” approach. When all of these vii Foreword elements work together, governmental and nongovernmental groups can join international regional and global groups to form a “whole of international society” approach, allowing us to close the seams that exist between nations and regions. Only then will we be able to close these illicit transnational networks. These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat. It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification. Criminal networks have the advantage of three primary enablers. First are the huge profits realized by transnational criminal operations. Second is the ability of these organizations to recruit talent and reorganize along lines historically limited to corporations and militaries. The third is their newly developed ability to operate in milieus normally considered the preserve of the state, and often referred to as the diplomatic, informational, military, and economic elements of national power. In the past, although some corporations or cities wielded some of these elements of power, for the last 200 years or so, it was mainly states that did. Transnational criminal elements have recently been able to generate these state-like capabilities. Through resource development and reorganization, they now rival the capabilities of many states and overwhelm the capabilities of others. Access to large-scale resources is made possible by the incredible amount of money that transnational crime generates. This in turn enables other criminal activities. Criminals suborn rule of law actors within countries and are able to operate across borders. The end result is corruption. They can often use these resources to train and equip themselves better than those who seek to halt them. For example, the narcoterrorists in Mexico are often better armed than the government forces that they face. Their communications networks are also world class because they can afford the best equipment. These organizations have also adapted their recruiting and organizing. Drug cartels have been recruiting trained special operations forces and educating lawyers and accountants. Mara Salvatrucha (MS-13) has also adopted a technique of telling its more promising new members to avoid getting tattooed so that they can better blend into the societies they operate in. These organizations adapt in order to take advantage of the emerging situations that they viii Foreword find themselves in. The Revolutionary Armed Forces of Colombia, for instance, started out by guarding airfields for the cartels and quickly realized that they could take over the trade themselves. Over the space of a few years, they vertically integrated, morphing from terrorists to narcoterrorists. Other organizations
Recommended publications
  • Daily U.S. Virus Cases Climb to Highest Level Since August
    P2JW290000-6-A00100-17FFFF5178F ****** FRIDAY,OCTOBER 16,2020~VOL. CCLXXVI NO.91 WSJ.com HHHH $4.00 DJIA 28494.20 g 19.80 0.1% NASDAQ 11713.87 g 0.5% STOXX 600 362.91 g 2.1% 10-YR. TREAS. g 3/32 , yield 0.730% OIL $40.96 g $0.08 GOLD $1,903.20 À $1.90 EURO $1.1709 YEN 105.45 Trump and Biden Field Questions in Dueling TV Forums Jobless What’s News Claims Point to Business&Finance Slowing ew jobless-benefits ap- Nplications rose last week to the highest level sincelate Rebound August, as fresh layoffs add to other signs the economic GES recovery is losing steam IMA New applications amid the pandemic. A1 GETTY reach a recent high, Softwareexecutive Rob- SE/ adding to signs of a ert T. Brockman wascharged with hiding about $2 billion cooling recovery in income from U.S. taxau- ANCE-PRES FR thorities over 20 years. A1 BY SARAH CHANEY ENCE LVMH said strong growth AG AND GWYNN GUILFORD at itsbiggest fashion brands ON/ buoyedquarterly revenue, TS Thenumber of people in partly offsetting steep drops WA the U.S. filing newapplications in other luxurysegments. B1 JIM forunemployment benefits S; rose last week to the highest MorgaN Stanley said its PRES level sincelateAugust, as third-quarter profit rose 25%, TED fresh layoffs add to other signs another big U.S. bank to CIA SO the economic recovery is los- skateunscathed through the AS ing steam amid the pandemic. rockiest economyinyears. B1 CI/ Claims increased to Petrochemical makers VUC 898,000 last week,holding AN are pausing multibillion- EV well abovethe pre-pandemic dollar U.S.
    [Show full text]
  • A Full List of Signatures Is Here
    IAVA Recipient: Secretary Mattis Letter: Greetings, First, thank you for your service and sacrifice and for your incredible leadership that so many in the military and veteran community have experienced and respect. As you know, more than 1.5 million veterans have have educated themselves with the Post-9/11 GI Bill, and almost 70% of Iraq and Afghanistan Veterans of America (IAVA) members have used or transferred this benefit to a dependent. It could very well be the most transformative federal benefit created. The new restriction on Post-9/11 GI Bill transferability to only those with less than 16 years of service is a completely unnecessary reduction of this critical benefit, and it will ultimately hurt our military recruitment and readiness. In a time of war, it remains enormously important to recruit and retain qualified servicemembers, especially with an ever-decreasing pool of eligible recruits. For years, IAVA has been at the forefront of this fight. We led the effort to establish this benefit in 2008 and we have successfully defended it in recent years. We cannot allow our GI Bill to be dismantled or abused. This is why I am standing with my fellow IAVA members to respectfully request that you reverse this counterproductive policy change that creates barriers to access to these transformative benefits. The GI Bill has been earned by millions of men and women on the battlefield and around the world and it should not be subjected to arbitrary restrictions that limit its use. Again, thank you for your leadership and I ask that you take action now to reverse this decision.
    [Show full text]
  • Virtual Currencies in the Eurosystem: Challenges Ahead
    STUDY Requested by the ECON committee Virtual currencies in the Eurosystem: challenges ahead Monetary Dialogue July 2018 Policy Department for Economic, Scientific and Quality of Life Policies Authors: Rosa María LASTRA, Jason Grant ALLEN Directorate-General for Internal Policies EN PE 619.020 – July 2018 Virtual currencies in the Eurosystem: challenges ahead Monetary Dialogue July 2018 Abstract Speculation on Bitcoin, the evolution of money in the digital age, and the underlying blockchain technology are attracting growing interest. In the context of the Eurosystem, this briefing paper analyses the legal nature of privately issued virtual currencies (VCs), the implications of VCs for central bank’s monetary policy and monopoly of note issue, and the risks for the financial system at large. The paper also considers some of the proposals concerning central bank issued virtual currencies. This document was provided by Policy Department A at the request of the Committee on Economic and Monetary Affairs. This document was requested by the European Parliament's Committee on Economic and Monetary Affairs. AUTHORS Rosa María LASTRA, Centre for Commercial Law Studies, Queen Mary University of London Jason Grant ALLEN, Humboldt-Universität zu Berlin Centre for British Studies, University of New South Wales Centre for Law Markets and Regulation ADMINISTRATOR RESPONSIBLE Dario PATERNOSTER EDITORIAL ASSISTANT Janetta CUJKOVA LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR Policy departments provide in-house and external expertise to support EP committees
    [Show full text]
  • New North Patrol Division Opens New North Patrol About 300 Will Serve the Community Growing West Side Members, Po- of the Northland
    New North Patrol Division opens new North Patrol About 300 will serve the community growing west side members, po- of the Northland. lice and city “The Northland officials cele- is approximately brated the 40 percent devel- grand opening oped at this point, of the new with a strong po- North Patrol tential for popula- Division station tion growth and with tours and a commercial devel- ribbon-cutting opment,” Second ceremony on District City June 23. Councilmember “This facility Dan Fowler said. replaces the “The 15,000-acre rather iconic Twin Creeks de- building at Bar- velopment east of ry Road and the KCI Airport is 169 Highway expected to grow that many of As North Patrol Division officers held the ribbon, Major Roger Lewis and past, present Board of the population of you affection- Police Commissioners and City Councilmembers cut it to open the new station June 23. KCMO and Platte ately have County by 70,000 known as the ‘Bumblebee,’” Interim Chief of Police David Zim- people during the next 20 years, according to the Platte County Eco- merman said. “Well-known as it may be, that building could no nomic Development Council. It is likely the North Patrol Division offic- longer function as one of our police stations.” ers would serve all of those people.” When it opened in 1976, about 15 people were assigned to Community members who attended the ribbon-cutting event had the North Patrol Division. Commensurate with the area’s population opportunity to get a behind-the-scenes tour of the station in areas that growth, there are now 95 KCPD members assigned to North Pa- won’t be open to the public.
    [Show full text]
  • Armed Groups: a Tier-One Security Priority
    Armed Groups: A Tier-One Security Priority Richard H. Shultz Douglas Farah Itamara V. Lochard INSS Occasional Paper 57 September 2004 USAF Institute for National Security Studies USAF Academy, Colorado ii The views expressed in this paper are those of the authors and do not necessarily reflect the official policy or position of the Department of the Air Force, the Department of Defense, or the US Government. The paper is approved for public release; distribution is unlimited. The Consortium for the Study of Intelligence holds copyright to this paper; it is published here with their permission. ******* ABOUT THE AUTHORS: Richard H. Shultz, Jr. is director of the International Security Studies Program at the The Fletcher School and Professor of International Politics. At the Consortium for the Study of Intelligence he serves as research director. He has served as a consultant to US government agencies concerned with national security affairs. He has also written extensively on intelligence and security. He recently published “SHOWSTOPPERS: Nine Reasons Why We Never Sent Our Special Operations Forces after Al Qaeda Before 9/11,” Weekly Standard 9:19 (26 January 2004). His forthcoming book is Tribal Warfare: How Non-State Armed Groups Fight (Columbia University Press, 2005). Douglas Farah is senior fellow at the Consortium for the Study of Intelligence. For 19 years worked as a foreign correspondent and investigative reporter for the Washington Post, covering armed conflicts, insurgencies, and organized crime in Latin America and West Africa. He has also written on Middle Eastern terror finance, including Blood From Stones: The Secret Financial Network of Terror (2004).
    [Show full text]
  • Guidance for a Risk-Based Approach to Virtual
    GUIDANCE FOR A RISK-BASED APPROACH VIRTUAL ASSETS AND VIRTUAL ASSET SERVICE PROVIDERS JUNE 2019 The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard. For more information about the FATF, please visit www.fatf-gafi.org This document and/or any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Citing reference: FATF (2019), Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers, FATF, Paris, www.fatf-gafi.org/publications/fatfrecommendations/documents/Guidance-RBA-virtual-assets.html © 2019 FATF/OECD. All rights reserved. No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: [email protected]) Photocredits coverphoto ©Getty Images GUIDANCE FOR A RISK-BASED APPROACH TO VIRTUAL ASSETS AND VIRTUAL ASSET SERVICE PROVIDERS 1 │ Table of contents Acronyms ...............................................................................................................................................
    [Show full text]
  • The Nature of Corporate Governance: the Significance of National Cultural Identity
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Essex Research Repository Queen Mary University of London, School of Law Legal Studies Research Paper No. 140/2013 The Nature of Corporate Governance: The significance of national cultural identity Janet Dine and Marios Koutsias Electronic copy available at: http://ssrn.com/abstract=2247943 The Nature of Corporate Governance: The significance of national cultural identity Preface The thesis of this book argues that national corporate governance is extremely important for societies. Recently many scholars have said that a convergence of corporate governance is inevitable. We believe that it is true but like Mark Twain said “the report of my death was an exaggeration”. We show that although there is some convergence national law of corporate governance is thriving. We also believe that it is necessary for the identity of each country. The reason that national diversity in corporate governance is still widespread is because of the history, philosophy and economy of each county as shown in its cultural heritage and it gives its identity. The cultural heritage in each state is identifiable in the Company Law and Corporate Governance Codes. We consider that this is crucial for the well being for democratic nations. Convergence in corporate governance is a threat to ordered commercial regulations because of the power of the preeminent economic paradigm in the West which is the neo-liberal model. The neo-liberal agenda that predicates deregulation, privatisation and the liberalisation of markets is moulding many jurisdictions into an Anglo- American model of corporate governance which is dangerous for a number of reasons;1 It is an extreme sort of utilitarianism without significant ethical principles It allows the growth of mega companies backed by powerful international institutions including the International Monetary Fund (IMF), the World Bank (WB), the Organisation for Economic Cooperation and Development (OECD) and the World Trade Organisation (WTO).
    [Show full text]
  • Re-: an Errant Glossary
    RE- Cultural Inquiry EDITED BY CHRISTOPH F. E. HOLZHEY AND MANUELE GRAGNOLATI The series ‘Cultural Inquiry’ is dedicated to exploring how di- verse cultures can be brought into fruitful rather than pernicious confrontation. Taking culture in a deliberately broad sense that also includes different discourses and disciplines, it aims to open up spaces of inquiry, experimentation, and intervention. Its em- phasis lies in critical reflection and in identifying and highlight- ing contemporary issues and concerns, even in publications with a historical orientation. Following a decidedly cross-disciplinary approach, it seeks to enact and provoke transfers among the hu- manities, the natural and social sciences, and the arts. The series includes a plurality of methodologies and approaches, binding them through the tension of mutual confrontation and negoti- ation rather than through homogenization or exclusion. Christoph F. E. Holzhey is the Founding Director of the ICI Berlin Institute for Cultural Inquiry. Manuele Gragnolati is Pro- fessor of Italian Literature at the Sorbonne Université in Paris and Associate Director of the ICI Berlin. RE- An Errant Glossary EDITED BY CHRISTOPH F. E. HOLZHEY ANDARNDWEDEMEYER ISBN (Print): 978-3-96558-000-8 ISBN (PDF): 978-3-96558-001-5 ISBN (EPUB): 978-3-96558-002-2 DOI: 10.25620/ci-15 Bibliographical Information of the German National Library The German National Library lists this publication in the Deutsche Nationalbibliografie (German National Bibliography); detailed bibliographic information is available online at http://dnb.d-nb.de. © 2019 ICI Berlin. Copyright of individual chapters is maintained by the chapter’s author. Cover design: Studio Bens with a photograph by Claudia Peppel This publication is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
    [Show full text]
  • How Safe Is Our Food?
    VOLUME TWELVE NUMBER 2 Lobbying Reform — Keeping it Legal by Cheryl Baisden When you want something really special for your birthday, it may take more than just a simple request to convince your parents to buy it. You probably start out dropping hints about how great it is, and then casually mention how your friends have it, and how good you’ll be if you get it. If that doesn’t work, maybe you become a little more helpful around the house, or try winning your mom over by complimenting her new haircut. You probably never realized it, but there’s a word for all of the effort you’re putting in — it’s called lobbying. And while you may be lobbying to get that special gift, the practice is most often used in government as a way to influence lawmakers. WINTER2008 “In government, a lobbyist is someone who tries to influence the decisions of elected officials,” explained Todd Sidor, an attorney From ‘Farm to Fork’: and lobbyist for the New Jersey State Bar Association. “Usually they are experts in certain fields, or former government officials with connections HowHow SafeSafe isis OurOur Food?Food? in certain fields, and their job is to by Barbara Sheenhan account for about 20 percent of our (CSREES); and the Department of educate legislators about why a food supply. Health and Human Services (DHHS), certain piece of legislation should or Except for the occasional recall, The remaining 80 percent of which encompasses the Centers for should not be passed. In a way, they Americans basically operate on the our food supply is regulated by Disease Control and Prevention are kind of like salesmen because assumption that our food supply is the Food and Drug Administration (CDC) and the National Institute of their job is to try to sell a certain idea safe.
    [Show full text]
  • What to Watch
    WEDNESDAY, MARCH 17, 2021 had. Kevin (Casey Cott) and Fangs (Drew Ray ‘True Tanner) make a big decision about their future Conviction’ What together. MOVIES The Masked Singer YOU’LL LOVE to watch FOX, 7 p.m. Group B performers take to the stage for the first time, and one will be unmasked at the WEDNESDAY end of the new episode “Group B Premiere — March 17, 2021 Shamrock and Roll.” All times Mountain. Start times can vary based Chicago Med on cable/satellite provider. Confirm times on NBC, 7 p.m. your on-screen guide. In “For the Want of a Nail,” as Maggie ‘Alice in Wonderland’ (Marlyne Barrett) deals with her own trauma, DISNEY ENTERPRISES INC. My Feet Are Killing Me: she steps in to help a mother in need. The Peanuts Movie (2015, DISCOVERY COMMUNICATIONS Meanwhile, Dean (Steven Weber) continues Children) Noah Schnapp, Hadley Footnotes to stir the pot with more than one doctor, and Belle Miller FXM, 3:40 p.m. discovery+ (Season 5), “Chain of Command” (Season 6), a patient comes to Med needing immediate This program features never-before-seen “Tapestry” (Season 6) and the series finale, treatment but doesn’t want it from them. Scary Movie 2 (2001, Comedy) cases with your favorite foot doctors as well “All Good Things...” (Season 7). Shawn Wayans, Marlon Wayans as follow-ups with memorable patients to see Chicago Fire VH1, 6 p.m. how they are doing today. NHL Hockey NBC, 8 p.m. Alice in Wonderland (2010, NBCSN, beginning at 5:30 p.m. Live In “Double Red,” Mouch (Christian Stolte), Children) Johnny Depp, Mia True Conviction A pair of Wednesday Night Hockey matchups Gallo (Alberto Rosende), Ritter (Daniel Kyri) Wasikowska Freeform, 6:30 p.m.
    [Show full text]
  • Iran's Extending Influence in the Western Hemisphere
    THREAT TO THE HOMELAND: IRAN’S EXTENDING INFLUENCE IN THE WESTERN HEMISPHERE HEARING BEFORE THE SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JULY 9, 2013 Serial No. 113–24 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–689 PDF WASHINGTON : 2014 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY JEFF DUNCAN, South Carolina, Chairman PAUL C.
    [Show full text]
  • Journal of Health Care Finance
    Journal of Health Care Finance Journal of Health Care Finance (USPS 048-090) Indexing: JHCF is indexed in Academic (ISSN 1078-6767) is published quarterly by Aspen Search/CD-ROM, the Business Periodicals Index, the Publishers, 76 Ninth Avenue, New York, NY 10011. Cumulative Index to Nursing & Allied Health Copyright © 2012 CCH Incorporated. All rights reserved. Literature (CINAHL), EMBASE, Health Source, Index www.aspenpublishers.com. Reproduction in whole Medicus, MEDLINE, MEDLARS, the UP-TO-DATE or in part without permission is strictly prohibited. Library/Health Services Management and Wilson Postmaster: Send address changes to Subscription Dept. Business Abstracts®, Wilson Business Abstracts Full IP. P.O. Box 3000, Denville, NJ 07834. Text® by The H.W. Wilson Company. Currently Subscription rate is $369 (plus postage and handling) available on CD-ROM and online via the WilsonWeb. per year in the United States and Canada (four issues), For more information, please visit http://www. payable in advance. The two-year subscription rate is hwwilson.com. $627, the three-year subscription rate is $886, and the “This publication is designed to provide accurate and cost of one issue is $111. Subscribers may specify any authoritative information in regard to the Subject Matter issue to begin the subscription. Subscribers in the covered. It is sold with the understanding that the United States and Canada: Address inquiries to publisher is not engaged in rendering legal, accounting, Fulfi llment, Aspen Publishers, 7201 McKinney Circle, or other professional service. If legal advice or other Frederick, MD 21704, or call 1-800-234-1660. To place expert assistance is required, the services of a an order, call 1-800-638-8437.
    [Show full text]