Illicit Networks and National Security in the Age of Globalization, That Delves Deeply Into Everything Mentioned Above and More

Total Page:16

File Type:pdf, Size:1020Kb

Illicit Networks and National Security in the Age of Globalization, That Delves Deeply Into Everything Mentioned Above and More Edited by Michael Miklaucic and Jacqueline Brewer With a Foreword by Admiral James G. Stavridis, USN Published for the Center for Complex Operations Institute for National Strategic Studies By National Defense University Press Washington, D.C. 2013 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Portions of this book may be quoted or reprinted without permission, provided that a standard source credit line is included. NDU Press would appreciate a courtesy copy of reprints or reviews. First printing, April 2013 NDU Press publications are sold by the U.S. Government Printing Office. For ordering information, call (202) 512–1800 or write to the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402. For GPO publications on-line, access its Web site at: http://www.access. gpo.gov/su_docs/sale.html. For current publications of the Institute for National Strategic Studies, consult the National Defense University Web site at: http://www.ndu.edu. Contents Foreword vii James G. Stavridis Acknowledgments xi Introduction xiii Michael Miklaucic and Jacqueline Brewer Part I. A Clear and Present Danger Chapter 1 3 Deviant Globalization Nils Gilman, Jesse Goldhammer, and Steven Weber Chapter 2 15 Lawlessness and Disorder: An Emerging Paradigm for the 21st Century Phil Williams Chapter 3 37 Can We Estimate the Global Scale and Impact of Illicit Trade? Justin Picard Part II. Complex Illicit Operations Chapter 4 63 The Illicit Supply Chain Duncan Deville Chapter 5 75 Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect Douglas Farah Chapter 6 97 The Geography of Badness: Mapping the Hubs of the Illicit Global Economy Patrick Radden Keefe Chapter 7 111 Threat Finance: A Critical Enabler for Illicit Networks Danielle Camner Lindholm and Celina B. Realuyo v Contents Chapter 8 131 Money Laundering into Real Estate Louise Shelley Part III. The Attack on Sovereignty Chapter 9 149 The Criminal State Michael Miklaucic and Moisés Naím Chapter 10 171 How Illicit Networks Impact Sovereignty John P. Sullivan Chapter 11 189 Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building Vanda Felbab-Brown Part IV. Fighting Back Chapter 12 213 Fighting Networks with Networks David M. Luna Chapter 13 233 The Department of Defense’s Role in Combating Transnational Organized Crime William F. Wechsler and Gary Barnabo Chapter 14 243 Collaborating to Combat Illicit Networks Through Interagency and International Efforts Celina B. Realuyo About the Contributors 269 vi Foreword Admiral James G. Stavridis, USN llicit networks affect everyone in our modern, globalized world. From human trafficking Iin Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries. I have experience combating these threats personally at the tactical, operational, and stra- tegic levels. As a young naval officer on a variety of ships, I spent a fair amount of time patrolling the global commons where transnational criminals in the guise of pirates and drug smugglers proliferate. I was in the Pentagon on 9/11 and personally experienced the global reach of mod- ern terrorism. Later on, when I commanded U.S. Southern Command (USSOUTHCOM), one of my subordinate commands was Joint Interagency Task Force–South in Key West, Florida, a multinational and interagency/interministerial command that counters drug traf- ficking in the Western Hemisphere. I also experienced the pernicious effects that transnational crime has on our friends as it ranges throughout the entire Western Hemisphere. After leaving USSOUTHCOM to become commander at U.S. European Command (USEUCOM), I saw that Europe was also challenged by the same types of transnational crime. In response, I stood up the Joint/Interagency Counter Trafficking Center in Stuttgart, Germany, designed to counter transnational criminal networks in cooperation with our international partners. When I took command of USEUCOM, I also became the Supreme Allied Commander, Europe (SACEUR). As SACEUR, I command Operation Active Endeavor, which counters trafficking in the Mediterranean, and OperationOcean Shield, which is part of the international counterpiracy efforts off the Somali coast. In addition, we have pioneered responses to cyber threats. At the Supreme Headquarters Allied Powers Europe, we have the North Atlantic Treaty Organization Computer Incident Response Center, and at USEUCOM, we are taking steps to create a subunified cyber command that will have links to both U.S. Cyber Command in the United States and USEUCOM in Germany. All of these organizations were designed to facilitate a whole-of-government approach, where all elements of national power work together in order to address emerging threats. Eventually, once societies understand the nature of the threats facing them, they will hopefully mobilize nongovernmental assets, adopting a “whole of society” approach. When all of these vii Foreword elements work together, governmental and nongovernmental groups can join international regional and global groups to form a “whole of international society” approach, allowing us to close the seams that exist between nations and regions. Only then will we be able to close these illicit transnational networks. These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat. It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification. Criminal networks have the advantage of three primary enablers. First are the huge profits realized by transnational criminal operations. Second is the ability of these organizations to recruit talent and reorganize along lines historically limited to corporations and militaries. The third is their newly developed ability to operate in milieus normally considered the preserve of the state, and often referred to as the diplomatic, informational, military, and economic elements of national power. In the past, although some corporations or cities wielded some of these elements of power, for the last 200 years or so, it was mainly states that did. Transnational criminal elements have recently been able to generate these state-like capabilities. Through resource development and reorganization, they now rival the capabilities of many states and overwhelm the capabilities of others. Access to large-scale resources is made possible by the incredible amount of money that transnational crime generates. This in turn enables other criminal activities. Criminals suborn rule of law actors within countries and are able to operate across borders. The end result is corruption. They can often use these resources to train and equip themselves better than those who seek to halt them. For example, the narcoterrorists in Mexico are often better armed than the government forces that they face. Their communications networks are also world class because they can afford the best equipment. These organizations have also adapted their recruiting and organizing. Drug cartels have been recruiting trained special operations forces and educating lawyers and accountants. Mara Salvatrucha (MS-13) has also adopted a technique of telling its more promising new members to avoid getting tattooed so that they can better blend into the societies they operate in. These organizations adapt in order to take advantage of the emerging situations that they viii Foreword find themselves in. The Revolutionary Armed Forces of Colombia, for instance, started out by guarding airfields for the cartels and quickly realized that they could take over the trade themselves. Over the space of a few years, they vertically integrated, morphing from terrorists to narcoterrorists. Other organizations
Recommended publications
  • Anti-Imperial World Politics: Race, Class, and Internationalism in the Making of Post-Colonial Order
    P a g e | 1 Anti-imperial World Politics: Race, class, and internationalism in the making of post-colonial order Christopher Patrick Murray London School of Economics and Political Science PhD. International Relations P a g e | 2 I certify that this thesis which I am presenting for examination for the PhD degree in International Relations at the London School of Economics and Political Science is solely my own work. I consider the work submitted to be a complete thesis fit for examination. I authorise that, if a degree is awarded, an electronic copy of my thesis will be deposited in LSE Theses Online (in accordance with the published deposit agreement) held by the British Library of Political and Economic Science and that, except as provided for in regulation 61 it will be made available for public reference. I authorise the School to supply a copy of the abstract of my thesis for inclusion in any published list of theses offered for higher degrees in British universities or in any supplement thereto, or for consultation in any central file of abstracts of such theses. Word count…………………………………….……….. 75, 884 P a g e | 3 ABSTRACT Anti-imperial world politics: Race, class, and internationalism in the making of post-colonial order Christopher Murray, PhD. LSE International Relations Why did many ‘black’ anti-imperial thinkers and leaders articulate projects for colonial freedom based in transnational identities and solidarities? This thesis excavates a discourse of anti-imperial globalism, which helped shape world politics from the early to late 20th century. Although usually reduced to the anticolonial nationalist politics of sovereignty and recognition, this study interprets ‘anti-imperialism globalism from below’ as a transnational counter-discourse, primarily concerned with social justice, social freedom, and equality.
    [Show full text]
  • Indigenous Maya Knowledge and the Possibility of Decolonizing Education in Guatemala
    Indigenous Maya Knowledge and the Possibility of Decolonizing Education in Guatemala by Vivian Michelle Jiménez Estrada A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Sociology and Equity Studies in Education Ontario Institute for Studies in Education University of Toronto © Copyright by Vivian Michelle Jiménez Estrada 2012 Indigenous Maya Knowledge and the Possibility of Decolonizing Education in Guatemala Vivian Michelle Jiménez Estrada Doctor of Philosophy Department of Sociology and Equity Studies in Education University of Toronto 2012 Abstract Maya peoples in Guatemala continue to practice their Indigenous knowledge in spite of the violence experienced since the Spanish invasion in 1524. From 1991 until 1996, the state and civil society signed a series of Peace Accords that promised to better meet the needs of the Maya, Xinka, Garífuna and non-Indigenous groups living there. In this context, how does the current educational system meet the varied needs of these groups? My research investigates the philosophy and praxis of Maya Indigenous knowledge (MIK) in broadly defined educational contexts through the stories of 17 diverse Maya professional women and men involved in educational reform that currently live and work in Guatemala City. How do they reclaim and apply their ancestral knowledge daily? What possible applications of MIK can transform society? The findings reveal that MIK promotes social change and healing within and outside institutionalized educational spaces and argues that academia needs to make room for Indigenous theorizing mainly in areas of education, gender, knowledge production, and nation building. I analyze these areas from anticolonial and critical Indigenous standpoints from which gender and Indigenous identities weave through the text.
    [Show full text]
  • From the Editor
    EDITORIAL STAFF From the Editor ELIZABETH SKINNER Editor Happy New Year, everyone. As I write this, we’re a few weeks into 2021 and there ELIZABETH ROBINSON Copy Editor are sparkles of hope here and there that this year may be an improvement over SALLY BAHO Copy Editor the seemingly endless disasters of the last one. Vaccines are finally being deployed against the coronavirus, although how fast and for whom remain big sticky questions. The United States seems to have survived a political crisis that brought EDITORIAL REVIEW BOARD its system of democratic government to the edge of chaos. The endless conflicts VICTOR ASAL in Syria, Libya, Yemen, Iraq, and Afghanistan aren’t over by any means, but they have evolved—devolved?—once again into chronic civil agony instead of multi- University of Albany, SUNY national warfare. CHRISTOPHER C. HARMON 2021 is also the tenth anniversary of the Arab Spring, a moment when the world Marine Corps University held its breath while citizens of countries across North Africa and the Arab Middle East rose up against corrupt authoritarian governments in a bid to end TROELS HENNINGSEN chronic poverty, oppression, and inequality. However, despite the initial burst of Royal Danish Defence College change and hope that swept so many countries, we still see entrenched strong-arm rule, calcified political structures, and stagnant stratified economies. PETER MCCABE And where have all the terrorists gone? Not far, that’s for sure, even if the pan- Joint Special Operations University demic has kept many of them off the streets lately. Closed borders and city-wide curfews may have helped limit the operational scope of ISIS, Lashkar-e-Taiba, IAN RICE al-Qaeda, and the like for the time being, but we know the teeming refugee camps US Army (Ret.) of Syria are busy producing the next generation of violent ideological extremists.
    [Show full text]
  • Technopopulism: the Emergence of a Discursive Formation
    tripleC 15(2): 441-458, 2017 http://www.triple-c.at Technopopulism: The Emergence of a Discursive Formation Marco Deseriis Northeastern University, Boston, USA, [email protected], http://neu.academia.edu/MarcoDeseriis Abstract: This article contends that technopopulism is a discursive formation that emerges from the convergence of two preexisting discourses: populism and technolibertarianism. Whereas these discourses are historically distinct the 2008 financial crisis and the 2011 wave of struggles precipitated the political conditions for their intersection. Such convergence produces both tensions and possibilities. On the one hand, technopopulism engenders a radically participatory model of democracy, which is ultimately anti-institutional as citizens cooperate and engage in sophisticated decision-making without the mediation of professional politicians. On the other hand, the more electorally successful technopopulist parties are led by charismatic leaders who synthesize the positions that emerge from the netroots to mobi- lize them against the establishment. These two seemingly contradictory aspects precipitate in two variants of technopopulism: a leaderless-technocratic variant, which is derived from the open source mode of governance and from early experiments of the Global Justice Movement in networked self-government; and a leaderist-populist variant, which is more strictly focused on the electoral competition as an intrinsically hegemonic practice. The article concludes with a reflection on the discursive complementarity of these two variants. Keywords: technopopulism, technolibertarianism, populism, electronic democracy, social media activism, Global Justice Movement, Free and Open Source Software, Podemos, Five Star Movement, Occupy Technopopulism is the belief that the “government of the people, by the people, for the people” (Lincoln 1953 [1863]) is achievable by means of information communica- tions technology.
    [Show full text]
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • Israel: Growing Pains at 60
    Viewpoints Special Edition Israel: Growing Pains at 60 The Middle East Institute Washington, DC Middle East Institute The mission of the Middle East Institute is to promote knowledge of the Middle East in Amer- ica and strengthen understanding of the United States by the people and governments of the region. For more than 60 years, MEI has dealt with the momentous events in the Middle East — from the birth of the state of Israel to the invasion of Iraq. Today, MEI is a foremost authority on contemporary Middle East issues. It pro- vides a vital forum for honest and open debate that attracts politicians, scholars, government officials, and policy experts from the US, Asia, Europe, and the Middle East. MEI enjoys wide access to political and business leaders in countries throughout the region. Along with information exchanges, facilities for research, objective analysis, and thoughtful commentary, MEI’s programs and publications help counter simplistic notions about the Middle East and America. We are at the forefront of private sector public diplomacy. Viewpoints are another MEI service to audiences interested in learning more about the complexities of issues affecting the Middle East and US rela- tions with the region. To learn more about the Middle East Institute, visit our website at http://www.mideasti.org The maps on pages 96-103 are copyright The Foundation for Middle East Peace. Our thanks to the Foundation for graciously allowing the inclusion of the maps in this publication. Cover photo in the top row, middle is © Tom Spender/IRIN, as is the photo in the bottom row, extreme left.
    [Show full text]
  • The United States and Democracy Promotion in Iraq and Lebanon in the Aftermath of the Events of 9/11 and the 2003 Iraq War
    The United States and democracy promotion in Iraq and Lebanon in the aftermath of the events of 9/11 and the 2003 Iraq War A Thesis Submitted to the Institute of Commonwealth Studies, School of Advanced Study, University of London in fulfilment of the requirements for the Degree of PhD. in Political Science. By Abess Taqi Ph.D. candidate, University of London Internal Supervisors Dr. James Chiriyankandath (Senior Research Fellow, Institute of Commonwealth Studies, School of Advanced Study, University of London) Professor Philip Murphy (Director, Institute of Commonwealth Studies, School of Advanced Study, University of London) External Co-Supervisor Dr. Maria Holt (Reader in Politics, Department of Politics and International Relations, University of Westminster) © Copyright Abess Taqi April 2015. All rights reserved. 1 | P a g e DECLARATION I hereby declare that this thesis is my own work and effort and that it has not been submitted anywhere for any award. Where other sources of information have been used, they have been duly acknowledged. Signature: ………………………………………. Date: ……………………………………………. 2 | P a g e Abstract This thesis features two case studies exploring the George W. Bush Administration’s (2001 – 2009) efforts to promote democracy in the Arab world, following military occupation in Iraq, and through ‘democracy support’ or ‘democracy assistance’ in Lebanon. While reviewing well rehearsed arguments that emphasise the inappropriateness of the methods employed to promote Western liberal democracy in Middle East countries and the difficulties in the way of democracy being fostered by foreign powers, it focuses on two factors that also contributed to derailing the U.S.’s plans to introduce ‘Western style’ liberal democracy to Iraq and Lebanon.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • 134TH COMMENCEMENT James E
    134 th Commencement MAY 2021 Welcome Dear Temple graduates, Congratulations! Today is a day of celebration for you and all those who have supported you in your Temple journey. I couldn’t be more proud of the diverse and driven students who are graduating this spring. Congratulations to all of you, to your families and to our dedicated faculty and academic advisors who had the pleasure of educating and championing you. If Temple’s founder Russell Conwell were alive to see your collective achievements today, he’d be thrilled and amazed. In 1884, he planted the seeds that have grown and matured into one of this nation’s great urban research universities. Now it’s your turn to put your own ideas and dreams in motion. Even if you experience hardships or disappointments, remember the motto Conwell left us: Perseverantia Vincit, Perseverance Conquers. We have faith that you will succeed. Thank you so much for calling Temple your academic home. While I trust you’ll go far, remember that you will always be part of the Cherry and White. Plan to come back home often. Sincerely, Richard M. Englert President UPDATED: 05/07/2021 Contents The Officers and the Board of Trustees ............................................2 Candidates for Degrees James E. Beasley School of Law ....................................................3 Esther Boyer College of Music and Dance .....................................7 College of Education and Human Development ...........................11 College of Engineering ...............................................................
    [Show full text]
  • Magazine 2/2017
    B56133 The Science Magazine of the Max Planck Society 2.2017 Big Data IT SECURITY IMAGING COLLECTIVE BEHAVIOR AESTHETICS Cyber Attacks on Live View of the Why Animals The Power Free Elections Focus of Disease Swarm for Swarms of Art Dossier – The Future of Energy Find out how we can achieve CO2 neutrality and the end of dependence on fossil fuels by 2100, thus opening a new age of electricity. siemens.com/pof-future-of-energy 13057_Print-Anzeige_V01.indd 2 12.10.16 14:47 ON LOCATION Photo: Astrid Eckert/Munich Operation Darkness When, on a clear night, you gaze at twinkling stars, glimmering planets or the cloudy band of the Milky Way, you are actually seeing only half the story – or, to be more precise, a tiny fraction of it. With the telescopes available to us, using all of the possible ranges of the electromagnetic spectrum, we can observe only a mere one percent of the universe. The rest remains hidden, spread between dark energy and dark matter. The latter makes up over 20 percent of the cosmos. And it is this mysterious substance that is the focus of scien- tists involved in the CRESST Experiment. Behind this simple sounding name is a complex experiment, the “Cryogenic Rare Event Search with Superconducting Thermometers.” The site of the unusual campaign is the deep underground laboratory under the Gran Sasso mountain range in Italy’s Abruzzo region. Fully shielded by 1,400 meters of rock, the researchers here – from the Max Planck Institute for Physics, among others – have installed a special device whose job is to detect particles of dark matter.
    [Show full text]
  • Four Easy Pieces to Balance Privacy and Accountability in Public Higher Education
    Loyola of Los Angeles Law Review Volume 46 Number 1 Fall 2012 Article 4 5-15-2013 Four Easy Pieces to Balance Privacy and Accountability in Public Higher Education: A Response to Wrongdoing Ranging from Petty Corruption to the Sandusky and Penn State Tragedy Robert Steinbuch Follow this and additional works at: https://digitalcommons.lmu.edu/llr Recommended Citation Robert Steinbuch, Four Easy Pieces to Balance Privacy and Accountability in Public Higher Education: A Response to Wrongdoing Ranging from Petty Corruption to the Sandusky and Penn State Tragedy, 46 Loy. L.A. L. Rev. 163 (2012). Available at: https://digitalcommons.lmu.edu/llr/vol46/iss1/4 This Article is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. FOUR EASY PIECES TO BALANCE PRIVACY AND ACCOUNTABILITY IN PUBLIC HIGHER EDUCATION: A RESPONSE TO WRONGDOING RANGING FROM PETTY CORRUPTION TO THE SANDUSKY AND PENN STATE TRAGEDY Robert Steinbuch* This Article offers four legislative solutions—four easy pieces—to properly balance confidentiality and accountability in publicly financed higher education. It presents (1) a fix to the Federal Student Privacy Act that will prevent it from being misapplied as a defense to proper freedom of information act requests, (2) a bill to require the affirmative disclosure of admission practices at public schools receiving federal funding, (3) a bill that imposes direct costs, through the bankruptcy code, on schools that misrepresent their data regarding graduation and post-graduation opportunities, and (4) a revision of the federal freedom of information act to have it apply to those public schools that receive federal funding.
    [Show full text]