Transnational Threats: Blending Law Enforcement and Military Strategies


Book Description

On February 2-3, 2000, the U.S. Army War College, the Triangle Institute for Security Studies, and the Duke University Center for Law, Ethics, and National Security co-sponsored a conference in Chapel Hill, North Carolina. The conference examined transnational threats, including terrorism involving weapons of mass destruction, cyber threats to the national infrastructure, and international organized crime. The goal was to evaluate the seriousness of such threats and discuss strategies for dealing with them. In particular, the conference sought to address the question of how military and law enforcement could blend their strategies to better counter transnational threats. A secondary purpose was to clarify the role of the military in meeting challenges that transcend national borders and threaten our national interests. This book highlights some of the main issues and themes that ran through the conference. After looking at the various threats and undertaking a risk assessment, the report considers the unique aspects of transnational threats, and then identifies the key challenges facing the United States, paying particular attention to the role of the military. The book concludes with discussions of some of the steps that should be taken to secure ourselves against transnational threats.




Transnational Threats


Book Description

On February 2-3, 2000, the U.S. Army War College, the Triangle Institute for Security Studies, and the Duke University Center for Law, Ethics, and National Security co-sponsored a conference in Chapel Hill, North Carolina. The conference examined transnational threats, including terrorism involving weapons of mass destruction, cyber threats to the national infrastructure, and international organized crime. The goal was to evaluate the seriousness of such threats and discuss strategies for dealing with them. In particular, the conference sought to address the question of how military and law enforcement could blend their strategies to better counter transnational threats. A secondary purpose was to clarify the role of the military in meeting challenges that transcend national borders and threaten our national interests. This book highlights some of the main issues and themes that ran through the conference. After looking at the various threats and undertaking a risk assessment, the report considers the unique aspects of transnational threats, and then identifies the key challenges facing the United States, paying particular attention to the role of the military. The book concludes with discussions of some of the steps that should be taken to secure ourselves against transnational threats.




Transnational Threats


Book Description




Human Trafficking and Human Security


Book Description

Human trafficking, and the related problems of organised crime and prostitution, has become a serious problem for post-Soviet countries since the dissolution of the Soviet Union. Human trafficking has a major impact on the countries of origin, the destination countries and the countries of transit, and is a concern for those studying population and migration, economics, politics, international relations and security studies. This book examines human trafficking from post-Soviet countries, exploring the full extent of the problem and discussing countermeasures, both local and at the global level, and considering the problem in all its aspects. It focuses in particular on the experiences of the Baltic Sea region, setting out the nature of organised crime and the full range of threats against society.




War as Risk Management


Book Description

This major new study shows how war can be thought of in terms of proactive risk management rather than in terms of conventional threat response. It addresses why the study of ‘risk management’ has helped fields such as sociology and criminology conceptualize new policy challenges but has made limited impact on Strategic Studies with new case studies of recent Anglo-American military campaigns in Kosovo, Afghanistan and Iraq. The author shows how ‘risk' is now a key defining feature of our globalized era, encompassing issues from global financial meltdown, terrorism, infectious diseases, to environmental degradation and how its vocabulary, such as the Precautionary Principle, now permeates the way we think about war, and how it now appears in US and UK defence policy documents, and speeches from both civilian and military staff. This book will be of great interest to all students and scholars of strategic studies, war studies, international relations and globalization.




Over 40 Publications Combined: Implications Of Narco-Terrorism And Human Trafficking In Mexico and Central America On United States National Security


Book Description

Over 3,100 total pages ... CONTENTS: The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype? Crossing Our Red Lines About Partner Engagement in Mexico Two Faces of Attrition: Analysis of a Mismatched Strategy against Mexican and Central American Drug Traffickers Combating Drug Trafficking: Variation in the United States' Military Cooperation with Colombia and Mexico Ungoverned Spaces in Mexico: Autodefensas, Failed States, and the War on Drugs in Michoacan U.S. SOUTHWEST BORDER SECURITY: AN OPERATIONAL APPROACH TWO WARS: OVERSEAS CONTINGENCY OPERATIONS AND THE WAR ON DRUGS WHAT HAVE WE LEARNED FROM THE WAR ON DRUGS? AN ASSESSMENT OF MEXICO’S COUNTERNARCOTICS STRATEGY THE DIVERSIFICATION OF MEXICAN TRANSNATIONAL CRIMINAL ORGANIZATIONS AND ITS EFFECTS ON SPILLOVER VIOLENCE IN THE UNITED STATES Mexican Drug Trafficking Organizations: Matching Strategy to Threat THE IMPACTS OF SOCIAL MEDIA ON CITIZEN SECURITY BEHAVIOR IN MEXICO Combating Transnational Organized Crime: Strategies and Metrics for the Threat Beyond Merida: A Cooperative Counternarcotics Strategy for the 21st Century MEXICAN DRUG CARTELS AND TERRORIST ORGANIZATIONS, A NEW ALLIANCE? THE EFFECTIVE BUSINESS PRACTICES OF MEXICAN DRUG TRAFFICKING ORGANIZATIONS (DTOs) DRUG TRAFFICKING AND POLICE CORRUPTION: A COMPARISON OF COLOMBIA AND MEXICO CRISIS IN MEXICO: ASSESSING THE MÉRIDA INITIATIVE AND ITS IMPACT ON US-MEXICAN SECURITY BORDER SECURITY: IS IT ACHIEVABLE ON THE RIO GRANDE? Borders and Borderlands in the Americas PREVENTING BULK CASH AND WEAPONS SMUGGLING INTO MEXICO: ESTABLISHING AN OUTBOUND POLICY ON THE SOUTHWEST BORDER FOR CUSTOMS AND BORDER PROTECTON DRUG TRAFFICKING WITHIN MEXICO: A LAW ENFORCEMENT ISSUE OR INSURGENCY? USSOCOM’s Role in Addressing Human Trafficking Southwest Border Violence: Issues in Identifying and Measuring Spillover Violence National Security Threats at the U.S.-Mexico Border Merida Initiative: Proposed U.S. Anticrime and Counterdrug Assistance for Mexico and Central America COCAINE TRAFFICKING THROUGH WEST AFRICA: THE HYBRIDIZED ILLICIT NETWORK AS AN EMERGING TRANSNATIONAL THREAT ORGANIZED CRIME AND TERRORIST ACTIVITY IN MEXICO, 1999-2002 Is the Narco-violence in Mexico an Insurgency? THE USE OF TERRORISM BY DRUG TRAFFICKING ORGANIZATIONS’ PARAMILITARY GROUPS IN MEXICO An Approach to the 40-Year Drug War EXPLOITING WEAKNESSES: AN APPROACH TO COUNTER CARTEL STRATEGY MEXICO AND THE COCAINE EPIDEMIC: THE NEW COLOMBIA OR A NEW PROBLEM? EXPLAINING VARIATION IN THE APPREHENSION OF MEXICAN DRUG TRAFFICKING CARTEL LEADERS Drug Cartels and Gangs in Mexico and Central America: A View through the Lens of Counterinsurgency The COIN Approach to Mexican Drug Cartels: Square Peg in a Round Hole Counterinsurgency and the Mexican Drug War THE UNTOLD STORY OF MEXICO’S RISE AND EVENTUAL MONOPOLY OF THE METHAMPHETAMINE TRADE Competing with the Cartels: How Mexico's Government Can Reduce Organized Crime's Economic Grip on its People FIGHTING CORRUPTION IN MEXICO: LESSONS FROM COLOMBIA Defeating Mexico's Drug Trafficking Organizations: The Range of Military Operations in Mexico Drug Trafficking as a Lethal Regional Threat in Central America What Explains the Patterns of Diversification in Drug Trafficking Organizations Evaluating the Impact of Drug Trafficking Organizations on the Stability of the Mexican State




The Organization of European Security Governance


Book Description

Analyses the emergence of new forms of security governance in Europe in response to changing domestic and external challenges.




The History of Information Security


Book Description

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.- Interdisciplinary coverage of the history Information Security- Written by top experts in law, history, computer and information science- First comprehensive work in Information Security




The International Political Thought of Carl Schmitt


Book Description

Presenting the first critical analysis of Carl Schmitt's The Nomos of the Earth and how it relates to the epochal changes in the international system that have risen from the collapse of the ‘Westphalian’ international order. There is an emerging recognition in political theory circles that core issues, such as order, social justice, rights, need to be studied in their global context. Schmitt’s international political thought provides a stepping stone in these related paths, offering an alternative history of international relations, of the genesis, achievements and demise of the ‘Westphalian system.’ Writing at a time when he believed that the spatial, political and legal order—the nomos of the earth—had collapsed, he highlighted the advent of the modern state as the vehicle of secularization, tracing how this interstate order was able to limit and ‘rationalize and humanize’ war. Providing a large number of case studies including: global terrorism, humanitarian intervention and US hegemony, this book will give further impetus to, and expand, the nascent debate on the significance of Schmitt’s legal and political thought for international politics. The International Political Thought of Carl Schmitt will be of interest to students and scholars of international relations, law and history.




An Invisible Scalpel: Low-Visibility Operations in the War on Terror


Book Description

The War on Terror (WOT) is actually a war against extremist insurgents comprised of numerous and varied organizations scattered across the globe. They are spurred to action by an extremist ideology that is nurtured, demonstrated, and led by al Qaeda and its leadership. This ideology serves as the insurgency’s center of gravity whereby it gains all manner of support across a broad spectrum of functional resources in multiple operational domains. As operating environments change, these ideology inspired decentralized insurgent organizations are able to quickly adapt their methods of operation. In order to defeat this evolving, ubiquitous yet elusive threat, the US must develop a comprehensive strategy that incorporates all instruments of US national power, as well as those of its allies. This strategy must also defeat or mitigate the enemy’s center of gravity in order to have any chance of success. This thesis argues that as lead combatant command in the WOT, the US Special Operations Command (USSOCOM) should conduct continuous, global, pre-emptive low-visibility operations in order to disrupt insurgent operations. In order to accomplish its WOT missions, USSOCOM must effectively organize and array forces and resources to defeat insurgent functional resources across multiple operational domains.