 Presented to the ODNI Special Security Division Research Program.

Slides:



Advertisements
Similar presentations
Certification Industry Against Counterfeiting
Advertisements

Briefing at UN SC CTC January 2008 Meetings of Special Services, Security Agencies, and Law-Enforcement Organizations Federal Security Service of the Russian.
Homeland Security and the Future of Criminal Justice.
Willingness and Opportunity: Minority Discrimination, State Strength and Domestic Terrorism Sambuddha Ghatak University of Tennessee & Brandon C. Prins.
CrimeLink Explorer: Lt. Jennifer Schroeder Tucson Police Department Jie Xu University of Arizona June 2, 2003 Using Domain Knowledge to Facilitate Automated.
1 This project was supported by Grant No DG-BX-K021 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Comprehensive M&E Systems
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Comparative Criminal Justice Systems CRIME, TRANSNATIONAL CRIME, AND JUSTICE CHAPTER TWO Reichel.
Enterprise Business Information Model Enterprise Data Services.
1 Measuring violence against women: The Canadian experience François Nault Director, Statistics Canada November 2013.
TERRORISM And how to tackle it. TERRORISM: THE USUAL CONFUSIONS ‘A new threat…’ - and aimed at the West ‘One man’s terrorist is another man’s freedom.
GARDINER POLICE DEPARTMENT SERVING SINCE 1849 SERVING SINCE 1849 Chief James M. Toman.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
PAMS Export Control Page UTHSC Campus –Wide Business Managers Meeting May 17, 2012.
Criminal Justice Today Twelfth Edition CHAPTER Criminal Justice Today: An Introductory Text for the 21st Century, 12e Frank Schmalleger Copyright © 2014.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Chapter 1 Introduction to forensic science and the law.
Paris Project Meeting January 2012 Item – Statistics Objective 5 B. Proia With financial support from Criminal Justice Programme 2008 European Commission.
Data Collection Methods
Terrorism and Counter-Terrorism: Strategies and Policy Jonathan Jackson (MSC, BSC)
1 Xiaoyu Wang UNC Charlotte Erin Miller START Center, U. Maryland Kathleen Smarick START Center, U Maryland William Ribarsky UNC Charlotte Remco Chang.
The FBI What the Federal Bureau of Investigation is TODAY.
Canadian Observatory on the Justice System’s Response to Intimate Partner Violence Carmen Gill, Ph.D. Muriel McQueen Fergusson Centre for family violence.
JIEM and Business Process Change. Exchange Analysis  Work with stakeholder Subject Matter Experts (SMEs) to identify information sharing requirements.
Patterns of Event Causality Suggest More Effective Corrective Actions Abstract: The Occurrence Reporting and Processing System (ORPS) has used a consistent.
All rights reserved. Please do not reproduce without appropriately citing the United States Institute of Peace Measuring Progress in Conflict Environments.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Professor Colon FTC Comparative Criminal Justice Systems / 6 th edition Chapter 2: Domestic Crime, Transnational Crime, and Justice.
1 Criminal Investigative Analysis. 2 A Comprehensive Investigative Aid Indirect Personality Assessments Equivocal Death Analysis Investigative Suggestions.
Transnational Organized Crime and Terrorism
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Copyright © Allyn & Bacon 2008 Intelligent Consumer Chapter 14 This multimedia product and its contents are protected under copyright law. The following.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Civil Liability and Policing Challenges.  Any questions about anything before we begin?  Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
JIEM and Business Process Change. 2 Objectives Need for Exchange Analysis – Available Tools What is JIEM? Business Process Modeling Using JIEM Where JIEM.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
Chapter Thirteen – Organizational Effectiveness.  Be able to define organizational effectiveness  Understand the issues underpinning measuring organizational.
Creswell Qualitative Inquiry 2e
Connecticut Department of Correction Division of Parole and Community Services Special Management Unit Parole Manager Frank Mirto October 14, 2015.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Discuss how researchers analyze data obtained in observational research.
Obtaining Support From Police Officers for Crime Prevention Programs Presented by American Crime Prevention Institute.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Trouble? Can’t type: F11 Can’t hear & speakers okay or can’t see slide? Cntrl R or Go out & come back in 1 Sridhar Rajappan.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
1 International Institute of Business Analysis Vision: The world's leading association for Business Analysis professionals” Mission: To develop and maintain.
Criminal Justice and Criminology Research Methods, Second Edition Kraska / Neuman © 2012 by Pearson Higher Education, Inc Upper Saddle River, New Jersey.
FIU- the Netherlands ‘The Power of Financial Intelligence’
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
2  Containment and negotiation, normally associated with standoff incidents may not be useful  Often better armed than initial responding officers 
Terrorism in the EU: Threats & Trends EAASP Annual Conference Dubrovnik, April 2014 Europol Public Information.
Dr. Ceresa Dr. Fonio Comune di Milano
National Centre for Missing Persons & Unidentified Remains
8.1 Levels of Police in Canada/Starting a Police Investigation
Hard Data: Data Collection Mechanisms on Human Trafficking in the Baltic Sea Region Expert Conference on Forced Labour Exploitation and Counter.
Terrorism Training for Law Enforcement
Relational Linkages of Associational Networks in Terrorist Events
Prevention, Intelligence
Yves Goulet Director, National Fisheries Intelligence Service
Inequality and radicalisation: Assessing the research evidence
CTS 2018 results Eurostat countries Focus
Institutional Review Board
Presentation transcript:

 Presented to the ODNI Special Security Division Research Program

 Introduction  Violent Groups in the United States  Research & Findings on Violent Groups at Home  Data for Analysis  A Potential Research Agenda o Intelligence in Plain View & JDLR  Questions/Comments

 Definitions matter! o Focusing on “Terrorism” eliminates 3/4 of the subject matter you are interested in  You gave me a definition to work with: o Adjudicated Guideline A – Allegiance to the United States  We study group-based violence, which we operationalize as: o Terrorist organizations o Violent extremist organizations o Transnational criminal organizations

 All graphics and statistics in this presentation come from the Institute for the Study of Violent Groups (ISVG)  Based out of the University of New Haven, but really a consortium of universities and non-profit organizations  Mission: To maintain the largest and most comprehensive database on violent groups worldwide  Analyses of our database have been utilized to support decision-making at the strategic and operational levels

Supports five units of analysis Theoretically: Every event, is a part of an incident Every incident was committed by at least one individual Every individual is a member of at least one organization Every organization is a part of at least one larger movement Event Event Var. 1, Event Var. 2, …, Event Var. X Incident Inc. Var. 1, Inc. Var. 2, …., Inc. Var. X Ind. Var. 1, Ind. Var. 2, …., Ind. Var. X Org. Var. 1, Org. Var. 2, …., Org. Var. X Individual Organization Mov Var. 1, Mov Var. 2, …., Mov Var. X Movement Relational Database Conceptual Model © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

Each of these units of analysis are represented in the ISVG Relational Database with variables and link types that we can use to visualize and analyze networks based on open source information. The variables and link types describe two general types of networks: Operational – networks of individuals, groups, and organizations based on the actions they engage in Associations – networks of individuals, groups, and organizations based on the relationships they keep Altogether, there are more than 1,500 variables in the database and more than 100 link types for building, visualizing, and analyzing networks. Building Networks through Operational and Associational Coding © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

An operational network is a grouping of individuals, groups, and organizations through at least one event type. The ISVG database has 25 basic event types that describe the actions of terrorist, extremist, and criminal actors. Violent Armed Attack Arson Bombing CBRN Hijacking Hostage-Taking Kidnapping Non-Violent Logistical Ceasefire Communication Financing Meeting Travel Criminal Bribery Counterfeiting Escape Extortion Financing Illicit Transactions Piracy Robbery Trafficking Interventions Military Operation Police Operation Civil Court Actions Criminal Court Proceedings Operational Networks © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

Each event type has sub-categories to capture specific actions and variables to describe the attributes of each event. Bombing Operational Networks © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

The ISVG database also provides a link to describe each individual, group, and organization’s involvement in an event. Four Operational Linkage Types Group Involved Individual Involved Responsible Targeted Note that the ISVG database can link groups to events through their individual members/associates Operational Networks © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

An associational network is a grouping of individuals, groups, and organizations through at least association type. The ISVG database has more than 60 association types that fall into three categories Association Networks © 2010 Institute for the Study of Violent Groups West Haven, CT 06516

 Terrorist organization o A group that threatens violence or commits violence in furtherance of a political, religious, or social cause  Extremist organization o A group that espouses or advocates violence in furtherance of a political, religious, or social cause  Transnational criminal organization o A group that engages in illicit activities within the United States and has a significant portion of it operations and support activities outside of the United States.  All of these organizations fall under Adjudicative Guideline A – Allegiance, section 4,c,1-4.

Transnational Criminal Organizations Violent Extremist Organizations Terrorist Organizations

 ISVG collects and analyzes data at the event, group, and individual level data  Currently more than 225,000 events in the ISVG database (2004-present)  In the United States, more than 70,000 events (2004- present) o 60% of these events related to transnational criminal organizations o 30% of these events related to violent extremist organizations o Approximately 10% of these events related to terrorist organizations  These events have occurred in every state in the United States, but there are definitely strong geographic clusters by event type and perpetrator type

 ISVG collects and analyzes data at the event, group, and individual level data  Currently more than 4,000 violent groups in the ISVG database (2004-present)  In the United States, more than 2,000 violent groups o 75% are violent extremist organizations o 15% are transnational criminal organizations o Less than 10% are terrorist organizations  Events where the perpetrator is unknown or unattributed are approximately 35% in the United States

 ISVG collects and analyzes data at the event, group, and individual level data  Currently more than 40,000 individual profiles in the ISVG database (2004-present)  In the United States, more than 26,000 individual profiles o 45% of these are linked to terrorist organizations o 35% of these are linked to violent extremist organizations o Approximately 20% are linked to transnational criminal organizations ISVG has more than 300 variables about the backgrounds, associations, and organizations that these individuals are involved in.

 A very understudied topic in academic social sciences o Data issues (lack of data) o PII issues (DHS and DOJ are very hesitant to fund this type of research)  Common research methods: o Content analysis/ethnographic studies of violent group members Mark Hamm’s work on right-wing & militia terrorists in the US o “Travel studies” – geographic span in the activities of terrorist networks Brent Smith & Kelly Damphouse’s work on Terrorism in Time & Space o Participant Observation – usually very questionable findings Several “anonymous” researchers infiltrate radical environmental groups, neo-nazi groups, and radical islamist organization

 Most of the people who are responsible for identifying and investigating violent groups in the US are local law enforcement  Many of the best research findings about indicators of involvement in violent groups come from distilling the expertise of investigators and patrol officers that interact with these individuals  When you extract this knowledge, it common that the “indicator” that the expert relied on most was that it “just didn’t look right” or JDLR.  JDLR is a phenomenon that we are trying to operationalize so that we can capture the details and expertise that triggered the “indicator” (this has not been successfully operationalized to date)  Current research on this is about to start at Naval Research Laboratory – Adversarial Modeling & Exploitation Office

 Systematically examining, on a per domain basis, the expertise resident in law enforcement officials about violent groups could lead to a better understanding of the indicators that a person is a member, associate, or affiliate or a violent group  Domains: o Physical appearance and dress of individual and associates o Traffic stops o Home/Residence interviews and search o Office interviews and search

 ISVG’s assets to support this research o We have the largest unclassified database of known individuals that are members of, associates of, or affiliates of violent groups in the United States o We have already collected data about their backgrounds and the backgrounds of their associates o We have assembled much of the propaganda, symbology, and internet-based information about the violent groups themselves o We know which of these individuals have been arrested and prosecuted, and the outcomes/dispositions of those proceedings. o We have a constant, ongoing data collection effort to identify violent groups, their events, and their individuals moving forward that can be used support interviews and other methods of capturing expert knowledge.

Thank you for your attention! Questions? / Comments?