Convergence: Illicit Networks and National Security in the Age of Globalization - Money Laundering, Threat Finance, Narcotics, Transnational Organized Crime, Sex Traffic, Black Market, Urbanization

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Convergence: Illicit Networks and National Security in the Age of Globalization - Money Laundering, Threat Finance, Narcotics, Transnational Organized Crime, Sex Traffic, Black Market, Urbanization by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781311888044
Publisher: Progressive Management Publication: February 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781311888044
Publisher: Progressive Management
Publication: February 3, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this book provides a comprehensive overview of all aspects of illicit networks and national security in the modern "globalized" world.

From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries.

These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat.

It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification.

Contents: Convergence: Illicit Networks and National Security in the Age of Globalization * Part I - A Clear and Present Danger * Chapter 1 - Deviant Globalization * Chapter 2 - Lawlessness and Disorder: An Emerging Paradigm for the 21st Century * Chapter 3 - Can We Estimate the Global Scale and Impact of Illicit Trade? * Part II - Complex Illicit Operations * Chapter 4 - The Illicit Supply Chain * Chapter 5 - Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect * Chapter 6 - The Geography of Badness: Mapping the Hubs of the Illicit Global Economy * Chapter 7 - Threat Finance: A Critical Enabler for Illicit Networks * Chapter 8 - Money Laundering into Real Estate * Part III - The Attack on Sovereignty * Chapter 9 - The Criminal State * Chapter 10 - How Illicit Networks Impact Sovereignty * Chapter 11 - Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building * Part IV - Fighting Back * Chapter 12 - Fighting Networks with Networks * Chapter 13 - The Department of Defense's Role in Combating Transnational Organized Crime * Chapter 14 - Collaborating to Combat Illicit Networks Through Interagency and International Efforts

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this book provides a comprehensive overview of all aspects of illicit networks and national security in the modern "globalized" world.

From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries.

These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat.

It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification.

Contents: Convergence: Illicit Networks and National Security in the Age of Globalization * Part I - A Clear and Present Danger * Chapter 1 - Deviant Globalization * Chapter 2 - Lawlessness and Disorder: An Emerging Paradigm for the 21st Century * Chapter 3 - Can We Estimate the Global Scale and Impact of Illicit Trade? * Part II - Complex Illicit Operations * Chapter 4 - The Illicit Supply Chain * Chapter 5 - Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect * Chapter 6 - The Geography of Badness: Mapping the Hubs of the Illicit Global Economy * Chapter 7 - Threat Finance: A Critical Enabler for Illicit Networks * Chapter 8 - Money Laundering into Real Estate * Part III - The Attack on Sovereignty * Chapter 9 - The Criminal State * Chapter 10 - How Illicit Networks Impact Sovereignty * Chapter 11 - Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building * Part IV - Fighting Back * Chapter 12 - Fighting Networks with Networks * Chapter 13 - The Department of Defense's Role in Combating Transnational Organized Crime * Chapter 14 - Collaborating to Combat Illicit Networks Through Interagency and International Efforts

More books from Progressive Management

Cover of the book 2014 President Barack Obama's Speech to the United Nations about the Islamic State (IS) and America's War Against ISIS / ISIL Terrorism, Ukraine and Russia, Israel and Palestine, Ebola Outbreak by Progressive Management
Cover of the book Chinese Perceptions of Traditional and Nontraditional Security Threats: China-Japan Animosity, Yasukuni Shrine, Threats from America, Japan, India, Environment, Energy Insecurity by Progressive Management
Cover of the book Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks by Progressive Management
Cover of the book Sink or Swim: The Marine Corps Capacity to Conduct a Marine Expeditionary Brigade Amphibious Assault Using Expeditionary Maneuver Warfare - MEB Assault, Shipping Issues, Air Assault, Lift, Gulf War by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force EC-130J Commando Solo and Super J Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book 21st Century Down Syndrome (Trisomy 21) Sourcebook: Clinical Data for Patients, Families, and Physicians, including Signs, Symptoms, Diagnosis, Genetics, Chromosome Anomalies by Progressive Management
Cover of the book Computers Take Flight: A History of NASA's Pioneering Digital Fly-By-Wire Project - Apollo and Shuttle Computers, Airplanes, Software and Reliability (NASA SP-2000-4224) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Procedures for Humanitarian Assistance Operations - HA - FM 100-23-1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Introduction to the Interagency Security Committee (IS-890) - ISC History, Vulnerability Assessment of Federal Facilities, Security Levels by Progressive Management
Cover of the book 21st Century Pocket Guide to the U.S. Naval Academy at Annapolis: USNA Programs, Admissions, Cadet Life, History by Progressive Management
Cover of the book The United States Army Operating Concept 2016-2028: TRADOC Pam 525-3-1, How the Army Fights, Organizing for Combined Arms Maneuver and Wide Area Security, Training and Education by Progressive Management
Cover of the book Strategic Leadership, Southern Style: Civilian Statesmen in the Confederacy's War - American Civil War Civil Military Relations, Strategic Vision, President Jefferson Davis and His Secretaries by Progressive Management
Cover of the book Operational Culture for the Warfighter: Principles and Applications - Physical Environment, Economy, Social Structure, Political Structure, Iraq, Islam, Clausewitz, Wargaming by Progressive Management
Cover of the book Tactical Nuclear Weapons and NATO - From Nuclear Artillery to Ballistic Missiles, TNWs and NSNWs, Nuclear Modernization, Deterrence, Operation Snowcat, Nuclear Zero, TLE (Treaty-limited Equipment) by Progressive Management
Cover of the book Evaluation of Littoral Combat Ships (LCS) for Open-Ocean Antisubmarine Warfare - History of ASW, Threats, North Korea, China, Russia, Noise Control, Range and Endurance, Data Link, Improvements by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy