Convergence: Illicit Networks and National Security in the Age of Globalization - Money Laundering, Threat Finance, Narcotics, Transnational Organized Crime, Sex Traffic, Black Market, Urbanization

Nonfiction, History, Military, United States, Social & Cultural Studies, Political Science
Cover of the book Convergence: Illicit Networks and National Security in the Age of Globalization - Money Laundering, Threat Finance, Narcotics, Transnational Organized Crime, Sex Traffic, Black Market, Urbanization by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781311888044
Publisher: Progressive Management Publication: February 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781311888044
Publisher: Progressive Management
Publication: February 3, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this book provides a comprehensive overview of all aspects of illicit networks and national security in the modern "globalized" world.

From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries.

These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat.

It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification.

Contents: Convergence: Illicit Networks and National Security in the Age of Globalization * Part I - A Clear and Present Danger * Chapter 1 - Deviant Globalization * Chapter 2 - Lawlessness and Disorder: An Emerging Paradigm for the 21st Century * Chapter 3 - Can We Estimate the Global Scale and Impact of Illicit Trade? * Part II - Complex Illicit Operations * Chapter 4 - The Illicit Supply Chain * Chapter 5 - Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect * Chapter 6 - The Geography of Badness: Mapping the Hubs of the Illicit Global Economy * Chapter 7 - Threat Finance: A Critical Enabler for Illicit Networks * Chapter 8 - Money Laundering into Real Estate * Part III - The Attack on Sovereignty * Chapter 9 - The Criminal State * Chapter 10 - How Illicit Networks Impact Sovereignty * Chapter 11 - Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building * Part IV - Fighting Back * Chapter 12 - Fighting Networks with Networks * Chapter 13 - The Department of Defense's Role in Combating Transnational Organized Crime * Chapter 14 - Collaborating to Combat Illicit Networks Through Interagency and International Efforts

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this book provides a comprehensive overview of all aspects of illicit networks and national security in the modern "globalized" world.

From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries.

These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat.

It will take a combination of initiatives to defeat the threats created by illicit criminal networks. These transnational organizations are a large part of the hybrid threat that forms the nexus of illicit drug trafficking—including routes, profits, and corruptive influences—and terrorism, both home grown as well as imported Islamic terrorism. With the latest wave of globalization allowing for even more movement of people, goods, and information, these actors have spread their tentacles wider and deeper, breaking new ground. At the same time, they have demonstrated an ability to adapt, diversify, and converge. This has allowed them to obtain vast resources and to continuously reorganize themselves to stay ahead of efforts to combat them. They have achieved a degree of globalized outreach and collaboration via networks, as well as horizontal diversification.

Contents: Convergence: Illicit Networks and National Security in the Age of Globalization * Part I - A Clear and Present Danger * Chapter 1 - Deviant Globalization * Chapter 2 - Lawlessness and Disorder: An Emerging Paradigm for the 21st Century * Chapter 3 - Can We Estimate the Global Scale and Impact of Illicit Trade? * Part II - Complex Illicit Operations * Chapter 4 - The Illicit Supply Chain * Chapter 5 - Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect * Chapter 6 - The Geography of Badness: Mapping the Hubs of the Illicit Global Economy * Chapter 7 - Threat Finance: A Critical Enabler for Illicit Networks * Chapter 8 - Money Laundering into Real Estate * Part III - The Attack on Sovereignty * Chapter 9 - The Criminal State * Chapter 10 - How Illicit Networks Impact Sovereignty * Chapter 11 - Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building * Part IV - Fighting Back * Chapter 12 - Fighting Networks with Networks * Chapter 13 - The Department of Defense's Role in Combating Transnational Organized Crime * Chapter 14 - Collaborating to Combat Illicit Networks Through Interagency and International Efforts

More books from Progressive Management

Cover of the book 2012 Defense Acquisitions: Assessments of Selected Weapon Programs by the GAO - Army, Navy, Air Force Weapons Systems including UAS Programs, Missiles, Ships, F-35 JSF, Carriers, Space Fence by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: The War in Vietnam 1960-1968, Part 3 - Rolling Thunder, TET Offensive, Domestic Dissent, Quest for Talks, Strengthening the RVNAF by Progressive Management
Cover of the book Russian Political Warfare: Origin, Evolution, and Application - Comprehensive Study of Putin's Hybrid Warfare Campaigns Against United States and the West, Crimean Annexation, Ukraine, Gerasimov Model by Progressive Management
Cover of the book Facing Uncertainty: The Role of the M1 Abrams Tank in U.S. Army of 2015-2025 - Hybrid Threats and Combined Arms Maneuver, Case Study of Israel Merkava Tank in Operations Cast Lead and Protective Edge by Progressive Management
Cover of the book Taming the Wild West: United States Nuclear Policy (1945-1961) - Development of Single Integrated Operational Plan (SIOP) by Truman, Eisenhower, and Kennedy Administrations, Effect of Berlin Airlift by Progressive Management
Cover of the book NASA Mishap Board Report on Serious Spacesuit Anomaly July 2013 ISS Space Station EVA EMU Suit Helmet Water Intrusion: Threatened Astronaut Luca Parmitano with Drowning by Progressive Management
Cover of the book Air Force Doctrine Document 2-0, Global Integrated Intelligence, Surveillance & Reconnaissance (ISR) Operations - Satellites, Geospatial, Imagery, Signals, Communications, Electronic, Human Intel by Progressive Management
Cover of the book Regionalism and Secession: German Bavarian and Spanish Catalan Regionalism, Heimat Mediation, Kulturnation, Demystifying Nazi Centralism, Castilian Hegemony, Francoist Spain 1939-1975 by Progressive Management
Cover of the book The U.S. Response to China's ASAT Test: An International Security Space Alliance for the Future, Anti-Satellite Capabilities and China's Space Weapons Strategy by Progressive Management
Cover of the book Space-Based Weapons: Lasers, Directed Energy Weapons, Weaponization of Space, Orbital Weapons, Bringing the Fight into Space, Attacking Terrestrial Targets, Political Implications by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Antiterrorism (Air Force Instruction 10-245 21) - AT Program, Standards, Force Protection, Terrorist Threat Levels, Suspicious Activity by Progressive Management
Cover of the book From SAC To STRATCOM: The Origins of Unified Command Over Nuclear Forces - Strategic Air Command, Carrier Bomber Debate, LeMay, Spaatz, Kenney, Admirals Revolt, Goldwater-Nichols Act, Cold War End by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: NASA's Management of Moon Rocks and Other Astromaterials Loaned for Research, Education, and Public Display (NASA Inspector General Report 2011) by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Bare Base Assets (Air Force Handbook 10-222 Volume 2) - NAVAIDS, Radar, Shelters, Medical Support, Facilities, Equipment, Fueling by Progressive Management
Cover of the book The Impact of Science on Society: Accomplishments of Science by the Year 2000, Our Future in the Cosmos - Computers and Space, The Legacy of Science, Fascinating Philosophical Concepts, Robotics by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy