Harmful Intent: Organized Crime & International Terrorism “And hate with them is limitless as love.” Lermontov.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

The post-Soviet inheritance Following the collapse of the Soviet Empire, states in the Black Sea Region inherited political and social networks and emerged.
Briefing by CTED Working Group on Terrorist Financing to the
Homeland Security and the Future of Criminal Justice.
The Development Response to Drug Trafficking in Africa: A Programming Guide Brooke Stearns Lawson, USAID Africa Bureau/USDA Transnational Organized Crime.
© SEESAC, SALW Control Name? Organisation? Event? Date?
AUSTRALIA’S INTERNATIONAL MANPADS INITIATIVE Mr Don Smith Executive Officer Department of Foreign Affairs and Trade Canberra.
Globalisation and Transnational Crime Each slide can be advanced using a mouse click. Alternatively, moving the cursor to the: Right Hand edge of the.
Private Contractor Support Jennifer Shamalla Pan Africa Strategic Policy Research Group Kenya (PANAFSRAG)
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
SUSTAINABLE DEVELOPMENT GOALS: Challenges by organized crime and corruption Ambassador Dr. Ugliesa Zvekic, Senior Advisor
DIRTY ENTANGLEMENTS Illicit Links between Organized Crime, Corruption and Terrorism Louise Shelley, Hirst Chair and Director of Terrorism, Transnational.
Counterfeit Avoidance Mark Alliance® Forum for CAMA members, industry professionals, government leaders and concerned citizens to address the growing epidemic.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. FAC004 What is AML?
Hungarian Defence and Security Policy Mr. György RÁBAI Counsellor HU MoD, Defence Policy Department.
FIGHT AGAINST CORRUPTION: THE LITHUANIAN WAY. CONTENTS Factors Decision Challenges Dilemmas Priorities.
4.0. Issues in International Security 4.1. The Impact of Nuclear Weapons on Global Politics 4.2. Nuclear Weapons in International Security 4.3. Armed Conflict.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
Humans as Money Trafficking, Demography and Soft Currency: the political economy of changing structures of organised crime BILL TUPMAN DIRECTOR, UNIT.
War on Drugs in Afghanistan Jessica KenneyKrista FlyntKrista Tuthill.
Threats to World Security Chapter 33 Section 3.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
The Global Effort to Regulate the Financing of Terrorism.
Opportunities for All: Human Rights in Norway’s Foreign Policy and Development Cooperation White paper on human rights in Norway’s foreign and development.
1 Ethics and Corruption in Public Service. 2 CHALLENGES OF PUBLIC SERVICE Large scale problems Transcend borders Stress limited resources Require knowledge.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
The Black Sea Region: New Challenges and Opportunities for Regional Cooperation ( ANALYSES from Ukraine) prof. Grygorii Perepelytsia.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Do we still need NATO? Standard Grade Modern Studies – Europe.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 5 - Port and Border Security: The First and Last Line of National Security Defence,
Small Arms Violence and Trafficking in Bangladesh : Security Implications Neila Husain Senior Research Fellow Bangladesh Institute of International & Strategic.
US and Asia Today 4 developments with Asian countries over the past ten years.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
WHAT IS THE DARK SIDE OF GLOBALIZATION? Moises Naim’s central argument in Illicit: The globalization of crime is fundamentally changing global politics:
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Middle East and North Africa The Military Implications Sir Tim Garden.
Global Supply Chain Threats: Impacts to Multinational Corporations.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
International Security Changes in the United States and the world.
National Security of Ukraine: Challenges and Threats 1.
Foreign Policy A policy based on decision making, influenced by relations with the rest of the world.
1 Good Intentions – Bad Drugs Washington, DC Thursday, 10 March 2005 Robert D. Moore, Executive Director; Global Security Group Merck & Co., Inc.
What is Money Laundering? How does It Occur? What are the Development Impacts of Money Laundering? Emiko Todoroki The World Bank Building Financial Market.
TRANSNATIONAL ORGANISED CRIME SECRET. CCSS TIER 1 THREATS: IMMEDIATE SIGNIFICANT THREAT.
European security Security definitions and the main dilemmas Dr. Arūnas Molis 22 April, 2014 Tallinn.
The Eradication of Illicit Crops (and alternative agricultural development) emes/altdev-6.htm.
By David Partridge.  Africa  Second largest continent  Second largest population on earth ▪ Over 1 billion people  Africa and civil conflict ▪ Somalia.
BLOOD DIAMONDS. Diamonds symbolize wealth, love, and grace around the world In several African nations they have been a means to power a reason to terrorize.
Mobilizing Anti-Money Laundering regimes to Combat Wildlife Crime Marilyne Pereira Goncalves, World Bank.
Diamonds. History First First used and mined mined 2500 years ago Was Was a symbol of wealth and nobility Originally Originally a rare engagement present.
Blood Diamonds Blood Diamonds, also known as Conflict Diamonds, are used in the illegal trading of diamonds to finance conflict, civil wars and human.
Dealing with Terror after 9-11 How do dealing with terrorism and trying to develop and practice peace fit together?
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
Crown capital management international relations International Affairs.
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
Maritime Security as an Integral Part of an
International Security and Peace
Threats to World Security Chapter 33 Section 3.
Federal Protective Service
Conference On Improving Domestic Resource Mobilization (DRM) and Stemming Illicit Financial Flows (IFFs) 12th-15th March 2019, Nairobi Kenya Presented.
Criminal Investigations
CIVIL - MILITARY CO-OPERATION IN THE EMERGING SECURITY LANDSCAPE
Presentation transcript:

Harmful Intent: Organized Crime & International Terrorism “And hate with them is limitless as love.” Lermontov

Presentation Objectives Validate the link between organized crime syndicates and international terrorism. Validate the link between organized crime syndicates and international terrorism. Assess the inherent dangers posed by international crime to the Homeland Security mission. Assess the inherent dangers posed by international crime to the Homeland Security mission.

Presentation Objectives (Cont) Evaluate the social and political junctures of organized crime and terrorist organizations through case studies. Evaluate the social and political junctures of organized crime and terrorist organizations through case studies. Critique the effectiveness of joint private sector, military, and political efforts to mitigate or eliminate terror/criminal junctures as part of the international “Global War on Terror” (GWOT). Critique the effectiveness of joint private sector, military, and political efforts to mitigate or eliminate terror/criminal junctures as part of the international “Global War on Terror” (GWOT).

Organized Crime and Terrorists - Commonalities Organization (hierarchic, cell, etc.) Organization (hierarchic, cell, etc.) Middlemen and contacts – various venues Middlemen and contacts – various venues Income-producing activities Income-producing activities Meet goals through terror, coercion, extortion, etc. Meet goals through terror, coercion, extortion, etc. Utilize corrupt officials to meet needs Utilize corrupt officials to meet needs

Key Links Between Intl. Crime & Terrorism Drug trafficking & narco-terrorism Drug trafficking & narco-terrorism Intl. arms trade - conventional Intl. arms trade - conventional Intl. arms trade – WMD Intl. arms trade – WMD Human trafficking Human trafficking Patent and trademark infringement Patent and trademark infringement Internet piracy Internet piracy

Case Study - Afghanistan World Bank estimates >1/2 of Afghanistan’s economy is based on the drug trade. World Bank estimates >1/2 of Afghanistan’s economy is based on the drug trade. In 2003, the total illicit drug trade profits totaled approximately $2.33 billion U.S. dollars. In 2003, the total illicit drug trade profits totaled approximately $2.33 billion U.S. dollars. The primary concern is that the opium debacle will negate all Coalition Forces efforts to win the Global War on Terror in-country. The primary concern is that the opium debacle will negate all Coalition Forces efforts to win the Global War on Terror in-country.

Afghanistan – Opium Capital of the World

Afghanistan – The Evidence

The Illicit Arms Trade in Conventional Weapons, Ammunition, and Explosives Commodities such as diamonds, timber, slaves, etc. are turned into cash or, in some cases, simply traded for weapons.

Case Studies – The Illicit Arms Market The illicit international arms market is referred to as the “Gray Market.” The illicit international arms market is referred to as the “Gray Market.” While numerous nations support a very active legal arms trade, illicit arms trafficking proliferates primarily in regions with little or no political, law enforcement, or regulatory supervision of commercial brokering operations. While numerous nations support a very active legal arms trade, illicit arms trafficking proliferates primarily in regions with little or no political, law enforcement, or regulatory supervision of commercial brokering operations.

Extent of the Problem – Specific Examples Ukraine: Ukraine: 7 million rifles, pistols, machineguns, and mortars 7 million rifles, pistols, machineguns, and mortars Moldavia: Moldavia: 42k small-arms 42k small-arms 20,000 tons of munitions including: aircraft bombs, rockets, 39k landmines 20,000 tons of munitions including: aircraft bombs, rockets, 39k landmines

Human Trafficking – Large Profit Margins for Terrorist Organizations World-wide

Trafficking in Persons

"As of May 2004, the U.S. Government estimates that 14,500 to 17,500 people are trafficked annually into the United States, and 600,000 to 800,000 are trafficked globally.”

Post 9/11 Terrorist Funding Al-Qaeda and similar groups switched to so-called “blood diamonds” as one key source of funding after 9/11. Al-Qaeda and similar groups switched to so-called “blood diamonds” as one key source of funding after 9/11. On-going civil wars in Sierra Leone and Angola provided a rich resource in diamonds On-going civil wars in Sierra Leone and Angola provided a rich resource in diamonds

Al-Qaeda Diamond Connection “Al- Al-Qaeda Diamond Connection “Al-Qaeda made a strategic decision to use diamonds to fund its operations. Rebel armies, drug dealers, organised crime outfits and rogue states have all recognized That rough diamonds can be put to covert or illicit uses. Easy to transport and conceal, and with an ability to maintain their price, they are already the favored method of payment or bribe in many illegal transactions.” Source: “For a Few Dollar$ More How al Qaeda moved into the diamond trade A Report”

Major Conflict Diamond “ Hot Spots”

Cyber-Terrorism

Case Study - Estonia Relatively modern state apparatus Relatively modern state apparatus Rapidly moved to on-line banking and personal living management after collapse of the Soviet Union Rapidly moved to on-line banking and personal living management after collapse of the Soviet Union Relatively modern infrastructure Relatively modern infrastructure Much tension between native Estonians and ethnic Russian residents Much tension between native Estonians and ethnic Russian residents

Estonia – Catalyst for Cyber- Terrorism Movement of Russian WWII “Bronze Soldier” monument from capital to a less conspicuous location Movement of Russian WWII “Bronze Soldier” monument from capital to a less conspicuous location Attacks initiated April 2007 and targeted all major banking institutions. Attacks initiated April 2007 and targeted all major banking institutions. IP addresses traced to Russian government sources IP addresses traced to Russian government sources NATO involvement necessary NATO involvement necessary

A New Paradigm for Success Realize that while combat between nation- -state actors is a threat, the threat posed by the nexus of international crime, terrorism, and rampant corruption in some regions of the world is the most immediate threat to national security. Realize that while combat between nation- -state actors is a threat, the threat posed by the nexus of international crime, terrorism, and rampant corruption in some regions of the world is the most immediate threat to national security.

Strategies and Concepts for Risk Mitigation Realization that criminal and terrorist threats are global Realization that criminal and terrorist threats are global Anti-corruption campaigns with real penalties for corrupt acts Anti-corruption campaigns with real penalties for corrupt acts Professionalization of law enforcement and security institutions world-wide Professionalization of law enforcement and security institutions world-wide Enhanced cooperation in intelligence and counter-intelligence gathering operations Enhanced cooperation in intelligence and counter-intelligence gathering operations

Failure to Share Intelligence – Case- in-Point In Bosnia and Herzegovina, SFOR (the NATO “Stabilization Force) detained a suspect for alleged involvement in terrorist activity. Ultimately, SFOR turned the suspect over to local law enforcement, which had to release him, since SFOR was not able to share its intelligence or provide evidence that could be used to sustain charges.”

The Future of Organized Crime & Terrorism Sources: Sources: dex.html dex.html dex.html dex.html

The Dilemma – “The Enemy of My Enemy is My Friend

The Enemy is Real

Questions and Comments?