Disrupting & Dismantling Transnational Criminal Organizations

Similar documents
Organized Crime, Terrorism and Non State Actors

TESTIMONY OF MICHAEL J. FISHER CHIEF UNITED STATES BORDER PATROL U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY BEFORE

A Behavioral Perspective on Money Laundering

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks

Crime and Networks. Edited by Carlo Morselli CONTENTS. Preface. Introduction Carlo Morselli PART I: CO-OFFENDING NETWORKS

Drugs and Crime. Class Overview. Illicit Drug Supply Chain. The Drug Supply Chain. Drugs and Money Terrorism & the International Drug Trade DRUG GANGS

Following the Money to Combat Terrorism, Crime and Corruption

NATIONAL SOUTHWEST BORDER COUNTERNARCOTICS STRATEGY Unclassified Summary

The US Mexico Border Mayors Association works to:

DHS Biometrics Strategic Framework

Europol External Strategy. Business Case: Cooperation with Brazil

Countering Illicit Firearms Trafficking in the Context of Organized Crime and Terrorism Work of UNODC s Global Firearms Programme

Information derived from several sources and searchable databases. All research conducted according to the project manual.

Europol External Strategy. Business Case: Cooperation with Mexico

TA: Meghan Clapp Office: 305 Cushing Hall Phone:

SOCIAL NETWORK ANALYSIS 2. CRIME APPLICATION

Wildlife Trafficking the Paradigm Mind Shift. Col Johan Jooste Directorate for Priority Crime Investigation

Hidden Costs of Crime: Quantifying the Economic Impact of Illicit Trade on Business and Investment

WORKING WITH IMMIGRANTS IN PROTECTIVE SERVICES. Protective Services Division Annual Training Spring 2009

BRIEFING: MANDATE AND ACTIVTIES DIRECTORATE FOR PRIORITY CRIME INVESTIGATION(DPCI): 17 SEPTEMBER 2014

American. National Security. Policy. Elements of National Security. Policy American National Security. Policy

United Nations Security Council Resolution 1540 and the CBRN Security Culture

CAC/COSP/2018/CRP.9 * * 28 August English only V (E) CAC/COSP/IRG/2018/1/Add.1.

EIGHTY-SIXTH SESSION WORKSHOPS FOR POLICY MAKERS: REPORT CAPACITY-BUILDING IN MIGRATION MANAGEMENT

OECD Task Force on Charting Illicit Trade (TF-CIT)

Note verbale dated 25 June 2013 from the Permanent Mission of Luxembourg to the United Nations addressed to the Chair of the Committee

CBTIR Homeland Security Symposium Series No. 13 ( ) Drug Trafficking Organizations and Violence in Mexico After-Action Report

U.S. Attitudes toward Terrorism and Counterterrorism Gary LaFree, Stanley Presser, Roger Tourangeau, Amy Adamczyk

PRESIDENT TRUMP S EXECUTIVE ORDERS ON IMMIGRATION

PROTECTING CULTURAL HERITAGE

enforcing ODS & F-Gas Regulation & EUROPOL

IOM s COMPREHENSIVE APPROACH TO COUNTER MIGRANT SMUGGLING

IOM s COMPREHENSIVE APPROACH TO COUNTER MIGRANT SMUGGLING

Instructor s Biography. Topics Covered. Analysis of Symposium Feedback. Thursday, June 1, 2017

For Immediate Release May 19, 2010 Joint Statement from President Barack Obama and President Felipe Calderón

CYBER CRIMES CENTER U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY BEFORE THE U.S. HELSINKI COMMISSION.

Developing a Global Fund approach to COEs Acknowledges the need to differentiate management of portfolios in acute emergency and chronic settings

Towards AsiaJust. Keebong PAEK Senior Prosecutorial and Judicial Adviser UNODC RCEAP

Part 11. Commitment and Shared Responsibility; Country and Region Recommendations, Communications, and Conduct

3.1 The specific sections in the Act, which regulate the production of SALW, are as follows:

Borders are widely taken for granted, as artifacts of state sovereignty.

Challenges at the Border: Examining the Causes, Consequences, and Responses to the Rise in Apprehensions at the Southern Border

Adopted by the Security Council at its 5907th meeting, on 11 June 2008

The Future Evolution of Transnational Criminal Organizations and the Threat to U.S. National Security. Celina B. Realuyo

Coversheet: Interdicting drug shipments in international waters

ICSANT 10 th Anniversary Event Vienna, 5 December 2017 Co-Chairs Summary

MEXICO (Tier 2) Recommendations for Mexico:

Conference of the Parties to the United Nations Convention against Transnational Organized Crime

The Gunpowder and Explosives Act governs the importation and transit of explosives and other dangerous cargo into the island.

INTERCEPTION OF ASYLUM-SEEKERS AND REFUGEES THE INTERNATIONAL FRAMEWORK AND RECOMMENDATIONS FOR A COMPREHENSIVE APPROACH

WHY WE ARE REVIEWING THE ACT

Model United Nations College of Charleston November 3-4, 2017

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

United Nations Office on Drugs and Crime (UNODC) (May 2014-April 2015)

US-Mexico Cooperation Against Organized Crime

FIGURE 2.1. Components of the Arms Market

Security and Sustainability Partnerships for Shutting Down Black Markets and Dismantling Webs of Corruption and Criminality

AILA InfoNet Doc. No (Posted 3/25/09)

Beyond Merida: The Evolving Approach to Security Cooperation Eric L. Olson Christopher E. Wilson

Treaty on the Non-Proliferation of Nuclear Weapons 2010 Review Conference New York, 4 28 May 2010

Note to Ad Hoc Group members: Working Group on the Disruption of Criminal Networks involved in People Smuggling and Trafficking in Persons

GOALS 9 ISSUE AREAS. page 7. page 5. page 6. page 8. page 1 page 2. page 9

GLOBAL WILDLIFE ENFORCEMENT. Strengthening Law Enforcement Cooperation Against Wildlife Crime

UNITED NATIONS OFFICE ON DRUGS AND CRIME

UN Task Force on Transnational Organized Crime and Drug Trafficking. Presentation to the ACPR Bangkok 30 May 2012

Security and Prosperity Partnership of North America: An Overview and Selected Issues

CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA

Resolution adopted by the General Assembly. [on the report of the Third Committee (A/58/499)]

Global Metropolitan Policing An Emerging Trend in Intelligence Sharing

Leading glocal security challenges

Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z Index

Strategy for the period for the United Nations Office on Drugs and Crime

CBTIR Homeland Security Symposium Series No. 4 ( ) Gangs, Terrorism, and Radicalization After-Action Report

INTERPOL CBRNE OPERATIONS

Brussels VIENNA. Cairo. Dakar. Abuja. Pretoria - COUNTRY OFFICE

Context, Analysis and Strategies

Keynote Speaker Day 1: Leon Fuerth. Transnational Organized Crime as Complex Adaptive Behavior: Anticipatory Governance as Response

Chair s Summary on the Seventh ASEM Conference on Counter-Terrorism Manila, Philippines June 2009

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

U.S.- Gulf Cooperation Council Camp David Joint Statement

Border Patrol National Strategy. The Mission: Protect America

I. INSTITUTIONAL BUILDING / NATIONAL ANTI-DRUG STRATEGY

ASEAN Regional Forum. Work Plan for Counter Terrorism. and Transnational Crime

Original language: Spanish CoP18 Doc CONVENTION ON INTERNATIONAL TRADE IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA

Supporting Regional Integration with Effective Border Management: Border Liaison Offices. UNODC Regional Programme for Southeast Asia

Structure, Behavior, and Influence of Salvadorian Gangs and Their Implications for the Rule of Law in the United States and El Salvador

U.S. Engagement in the Western Hemisphere

WG 6-13 CTOC WARGAME ANALYSIS STRATEGIC WARGAMING SERIES September 2013

LAC Focus: Latin America, China and the United States

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM. Trinidad and Tobago

Trade Costs and Export Decisions

NORTH AMERICA Dividers_country profiles.indd 3 15/11/ :07:26

Annex M. Voluntary Briefing by Southeast Asia Regional Center for Counter-Terrorism (SEARCCT)

REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES. Malaysia supports the continuous effort by United Nations Department for

Professionalism. Four Years of Stewardship: DG Annual Report to Council. November, Report Overview. I. Milestones

IOM COUNTER-TRAFFICKING ACTIVITIES

The Stability Instrument: The Longer-Term Component. November 2009 Louis-Victor Bril, DG External Relations

Recommendation for a COUNCIL DECISION

Joint Declaration on ASEAN-REPUBLIC OF KOREA strategic partnership for peace and prosperity

Transcription:

Disrupting & Dismantling Transnational Criminal Organizations Brandon Behlendorf, Ph.D. College of Emergency Preparedness, Homeland Security, and Cybersecurity University at Albany (State University of New York) October 25 th, 2017 University of Texas - El Paso 1

Briefing Outline Introductions Purpose and Definitions Overview of the Failure Points Project What science knows & mostly knows Leadership targeting Organizational adaptation (and its limitations) Q&A Break What science is learning How organizations fail Network vs. supply chain resilience How we move forward Q&A 2

Purpose & Definitions 3

Purpose Short course on disruption & dismantlement in Transnational Criminal Organizations (TCOs) Socialize the science of disrupting / dismantling networks Bring awareness to key findings and key limitations Advance future efforts to improving practice & science through mutual partnerships 4

Definitions Illicit network a network engaged in criminal activity Illicit organization an enterprise defined by criminal activity Illicit market an arena of transaction whose products or methods are criminal 5

Definitions Disruption to interrupt the normal course or unity of a Interdiction to intercept and prevent the movement of (a prohibited commodity or person) b Dismantlement to disconnect the pieces of a Failure a state of inability to perform a normal function a a Merriam-Webster, Inc. Webster's ninth new collegiate dictionary. Merriam-Webster, 1983. b Dictionary, Oxford English. Oxford English dictionary online. (2007). 6

Overview of Failure Points Project 7

Failure Points in Smuggling Networks Project Objectives: Analyze strategic behavior and multiplex relationships of actors within smuggling networks Document key factors about how smuggling networks have failed Identify critical nodes, relationships, and processes which could have led to network failure 8

Case selection Analysis of eight transnational trafficking networks that differ in terms of: Size (small vs. large); Commodity (drugs, humans, exotic wildlife, arms, and radiological/nuclear material); and Geographic reach of operations (single vs. multi continent). Sources came from court records, open source media, government reports, and other unclassified documentation 9

The examined networks Network Name Primary Trafficking Route(s) Commodity Time Period Hernan Prada South America to USA and Europe Drugs 1988-2006 Jacob Stuart Canada to USA Drugs 2006-2011 Sister Ping China and SE Asia to USA Humans 1980s-1994 Soto-Huarto Mexico to US Humans 2002-2003 Rodrigues / Duindam South America to USA and Europe Exotic Wildlife 1998-2010 al-kassar Global Arms 1970s-2007 Dadayan Vagner-Illich Eastern Europe Eastern to Western Europe Radiological / Nuclear Radiological / Nuclear 2003 & 2010 1994 10

11

12

Q & A 13

What Science Knows: Targeting Leadership to Disrupt Networks 14

Targeting Leadership Targeted removal involves the coercive (i.e., arrest or killing) of key actors within illicit networks in order to disrupt or dismantle operations. Lots of Questions: - Who to target (leaders, brokers, etc.)? - How to target (sequentially or simultaneously)? - Is it applicable in all situations? - How will networks respond? 15

Network Configurations John Arquilla and David Ronfeldt, The Advent of Netwar (Revisited). In, John Arquilla and David Ronfeldt (eds.), Networks and Netwars: The Future of Terror, Crime, and Militancy (Santa Monica, CA: RAND Corporation, 2001): 8 Aili Malm and Gisela Bichler. Networks of Collaborating Criminals: Assessing the Structural Vulnerability of Drug Markets. Journal of Research in 16 Crime and Delinquency 48, no. 2 (February 7, 2011): 276

Centrality 17

Centrality: Degree 18

Centrality: Closeness 19

Centrality: Betweenness 20

Clustering Cluster A Cluster B 21

Small Worlds Cluster A Cluster B bridge Think six degrees of separation 22

Key Player Problem 23

Who to target? Depends on who you consider a leader? Manager? Broker? Facilitator / Coordinator? Prioritize connections (social capital) or role (human capital)? Depends on how you construct the network Among organizational relationships, group leaders were the most central actors (Calderoni 2014, Duijn et al, 2014) When mapped against communication networks, group leaders were peripheral to the network (Morselli, 2010; Agreste et al, 2016) 24

Who to target? Not all networks are the same Many studies have found drug trafficking networks to be highly centralized around a few key leaders and loosely organized among other members Can scale Can adapt quickly Can replace [to some degree] In some cases, large networks persisted for years; in other locations, networks comprised small, temporary coalitions among transporters, brokers, and dealers (Eck and Gersh, 2000; Tenti & Morselli, 2014) 25

Addressing Who to Target Comparative analysis of the effects targeted removal of keyactors using four different methods of measuring nodal importance: 1. Kingpin target the key leader 2. Degree centrality target the most connected 3. Betweenness centrality target brokers 4. Key-player measure target those who most connect the network Sequential and simultaneous removal of key-actors occurred for each network until they achieved optimal disruption (90% fragmentation). 26

Results Optimal Fragmentation Point 27

Results 28

# of Individuals Removed to Reach 90% Frag 29

Results Optimal Fragmentation Point Feasible Fragmentation Point 30

Results: Moving beyond kingpins To maximize the fragmentation of complex networks, need to remove more than the nominal (i.e., kingpin ) leader. Different network structures and characteristics means there is no one approach fits all for optimizing targeted removal strategies. More complex networks required the removal of up to seven key-actors to become optimally fragmented. 31

Results: Moving beyond kingpins Find weak nodes (Morone & Makse, 2015) Markets are more resilient to disruption (Duijn et al 2014; Duxbury and Haynie, 2017) splinter and monitor Re-assess the dissortative nature of criminal networks (Wood, 2017) Highly-connected linked with weaklyconnected 32

What Science Mostly Knows Organizational Adaptation (and Limitations) 33

Ability to Adapt Illicit organizations are constantly balancing security & efficiency (Morselli and Petit, 2007) In response to intervention, they optimize activities and avoid/coopt detection Optimization requires recurring adaptation 34

Ability to Adapt Adaptation is essential part of illicit network / organization operations Shipments are interdicted Demand escalates New markets open and other close Depending on law enforcement interdiction, limited mechanisms for adaptation Arrest an individual replace them Interdict a shipment send another / multiple Close a route find an alternative path 35

Positive Adaptations Strategic and technological improvements New concealment methods Improved security protocols Differentiated operations and structure Compartmentalized functions Shifted operations to new routes Shifted operations towards new priorities E.g. Moving from trafficking to money laundering 36

Limitations of Adaptation Problems of Capacity or Capability Structural inability to adapt Temporal incapacity to adapt Strategic Miscalculation Choice of new locations / pathways Choice of new partners 37

Q & A 38