Criminal and terrorist organisations are increasingly turning to white collar crime such as fraud, e-crime, bribery, data and identity theft, in addition to more violent activities involving kidnap and ransom, narcotics and arms trafficking, to fund their activities and, in some cases pursue their cause. The choice of victims is global and indiscriminate. The modus operandi is continually mutating and increasing in sophistication; taking advantage of weaknesses in the system whether they be technological, legal or political. Countering these sources of threat finance is a shared challenge for governments, the military, NGOs, financial institutions and other businesses that may be targeted. Shima Keene’s Threat Finance offers new thinking to equip any organisation regardless of sector and geographical location, with the knowledge and tools to deploy effective counter measures to tackle the threat. To that end, she brings together a wide variety of perspectives - cultural, legal, economic and technological - to explain the sources, mechanisms and key intervention methodologies. The current environment continues to favour the criminal and the terrorist. Threat Finance is an essential read for fraud and security practitioners, financial regulators, policy-makers, intelligence officials, judges and barristers, law enforcement officers, and researchers in this field. Dr Keene offers an antidote to the lack of good, applied, research; shortcomings in in-house financial and forensic expertise; misdirected financial compliance schemes; legal and judicial idiosyncrasies; unhelpful organisation structures and poor communication. She argues convincingly for a coherent, aggressive, informed and cross-disciplinary approach to an ever changing and rapidly growing threat.
In this monograph, British academic and practitioner, Dr. Shima Keene describes a number of ways in which financial intelligence can be leveraged not only to disrupt adversary activities, but also to provide indicators and warnings of future actions and, ultimately, to address underlying insecurities. Dr. Keene was previously both a banker and a British Army reservist. In this monograph, she uses her expertise as a threat finance specialist to outline specific areas where financial intelligence analysis techniques, which are common in the private sector, can be applied to combating insurgency, terrorism, and other hard security threats. The Strategic Studies Institute recommends this monograph not only to counterinsurgency and counterterrorism practitioners and policymakers, but also to the Intelligence community more widely; all of these will find its conclusions on the handling of financial data and the value of threat finance analysis valuable. Related products: Counterinsurgency collection is available here: https: //bookstore.gpo.gov/catalog/security-defense-law-enforcement/counterinsurgency Counterterrorism resources collection can be found here: https: //bookstore.gpo.gov/catalog/security-defense-law-enforcement/counterterrorism Bank Secrecy Act/Anti-Money Laundering Examination Manual is available here: https: //bookstore.gpo.gov/products/sku/052-003-01481-5 Other products produced by the US Army War College, Strategic Studies Institute are available here: https: //bookstore.gpo.gov/agency/1609
The relationship between corruption and stability is complex. What is clear is that corruption increases the level of instability and the risk of conflict by undermining the legitimacy and credibility of state institutions. For peacekeeping and state-building interventions to be effective, careful consideration must be given as to the reason the problem occurs, and to its broader impact, as well as ways to manage it. In this Letort Paper, British academic and practitioner Dr. Shima Keene provides a comprehensive assessment of the relationship between corruption, legitimacy, and stability in fragile states, and explores what must be done by the U.S. Army to counter these issues that directly impact its operational effectiveness.
It is a well established axiom that attempting to defeat an insurgency or a terrorist organization headon is merely treating the symptoms of a problem. For long-term success, the campaign must also address the root causes of the insecurity that spawned conflict in the first place. In this monograph, British academic and practitioner Dr. Shima Keene describes a number of ways in which financial intelligence can be leveraged not only to disrupt adversary activities, but also to provide indicators and warnings of future actions and, ultimately, to address underlying insecurities. Dr. Keene was previously both a banker and a British Army reservist. In this monograph, she uses her expertise as a threat finance specialist to outline specific areas where financial intelligence analysis techniques, which are common in the private sector, can be applied to combating insurgency, terrorism, and other hard security threats.
While supporters claim that drone warfare is not only legal but ethical and wise, others have suggested that drones are prohibited weapons under International Humanitarian Law (IHL) because they cause, or have the effect of causing, indiscriminate killings of civilians, such as those in the vicinity of a targeted person. The main legal justification made by the Barack Obama Administration for the use of armed drones is self-defense. However, there is ambiguity as to whether this argument can justify a number of recent attacks by the United States. In order to determine the legality of armed drone strikes, other factors such as sovereignty, proportionality, the legitimacy of individual targets, and the methods used for the selection of targets must also be considered. One justification for the ethical landscape is the reduced amount of collateral damage relative to other forms of strike. Real time eyes on target allow last-minute decisions and monitoring for unintended victims, and precise tracking of the target through multiple systems allows further refinements of proportionality. However, this is of little benefit if the definition of 'targets' is itself flawed and encompasses noncombatants and unconnected civilians. This monograph provides a number of specific recommendations intended to ensure that the benefits of drone warfare are weighed against medium- and long-term second order effects in order to measure whether targeted killings are serving their intended purpose of countering terrorism rather than encouraging and fueling it"--Publisher's web site.
Establishing the rule of law is a key goal and end state in counterinsurgency (COIN) operations and is a critical aspect of securing peace and preventing future conflict. However, recent experience in theaters such as Afghanistan has shown that establishing effective rule of law institutions and practices is not a straightforward task. Consequently, considerations as to how and when rule of law institutions can start to be developed and integrated into the stability transition process must not only be planned in advance, but also form part of the U.S. Army's strategy from the start of any military intervention. The analysis provided in this monograph will assist the U.S. Army, and more broadly the Departments of Defense and State, in better facilitating a seamless rebalancing from military to police functions in post-conflict environments, and to ensure that sustainable and effective rule of law interventions are delivered as part of an exit strategy.
There are many risks to the U.S. Army's command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a variety of channels; the actions of hidden malign actors; and novel forms of attack on U.S. and allied command, control, communications, computers, information/intelligence, surveillance, targeting acquisition, and reconnaissance (C4ISTAR) systems.If the U.S. Army is to secure and maintain information dominance in all environments, it must exploit complexity and uncertainty in the battlespace and not simply seek to overcome it. Innovation requires that new ideas are considered, and that old ideas should be robustly challenged. To achieve and maintain information dominance, the U.S. Army will also require a significant injection of innovation, a robust and resilient C2 and intelligence capability, novel technologies and an accelerated information operations capability development program that is broad, deep, sustained and well-coordinated. Furthermore, once information dominance is achieved, maintaining it will demand continuous change and development.
Military action by the U.S. Army and its partners resulting in the reduction in territory controlled by the Islamic State of Iraq and Syria (ISIS) does not mean that the threat from foreign jihadist fighters has been extinguished. At the end of any conflict, surviving foreign fighters are likely to disperse in numerous directions. The question is where they are likely to go and whether and how they will re-emerge as a threat to the U.S. Army and the United States, as well as Western interests more broadly. In order to be able to tackle the threat effectively, the U.S. Army must be able to frame the right questions, seek the answers to those questions, and address the issues highlighted. The inability to do so will negatively affect existing and future U.S. Army operations as well as U.S. interests both at home and abroad.
This monograph identifies areas where the U.S. Army and other services can potentially benefit from examining the United Kingdom's comparable program of reserve reform. Key areas where aspects of this reform have been entirely counterproductive are identified, as well as specific and expensive recent British mistakes which are essential for the U.S. military to avoid. The aim of this monograph is to highlight the lessons learned by the U.K. Reserve Forces, both in terms of successes and challenges, as well as to explore the feasibility of achieving the proposals set out by Future Reserves 2020. This may be useful for the United States moving forward, as the need to cut defense spending further is likely, and the U.K. may serve as a good model for operating with a smaller budget. This text includes case studies, and will appeal to military strategists, policy analysts, organization behavior analysts, U.S. policymakers, and military leaders. The Reserve commands of the U.S. armed forces will also be interested in this text because it provides useful views of prior experience in organizing and integrating reserve forces, and presents a valuable addition on how to plan the future shape of the U.S. Army. Students taking military science and management classes, especially relating to the deployment of personnel, may find this "lessons learned" monograph helpful. Related products: Warrior Citizen: The Official Magazine of the U.S. Army Reserve -print quarterly periodical subscription can be found here: https: //bookstore.gpo.gov/products/sku/708-079-00000-6?ctid= The Noncommissioned Officer and Petty Officer: Backbone of the Armed Forces is available here: https: //bookstore.gpo.gov/products/sku/008-029-00568-9 Starting Strong: Talent-Based Branching of Newly Commissioned U.S. Army Officers is available here: https: //bookstore.gpo.gov/products/sku/008-000-01184-2 Citizen Airman, Official Magazine of the Air Force Reserve -print bimonthly periodical subscription can be found here: https: //bookstore.gpo.gov/products/sku/708-006-00000-9?ctid=
Criminal and terrorist organisations are increasingly turning to white collar crime such as fraud, e-crime, bribery, data and identity theft, in addition to more violent activities involving kidnap and ransom, narcotics and arms trafficking, to fund their activities and, in some cases pursue their cause. The choice of victims is global and indiscriminate. The modus operandi is continually mutating and increasing in sophistication; taking advantage of weaknesses in the system whether they be technological, legal or political. Countering these sources of threat finance is a shared challenge for governments, the military, NGOs, financial institutions and other businesses that may be targeted. Shima Keene’s Threat Finance offers new thinking to equip any organisation regardless of sector and geographical location, with the knowledge and tools to deploy effective counter measures to tackle the threat. To that end, she brings together a wide variety of perspectives - cultural, legal, economic and technological - to explain the sources, mechanisms and key intervention methodologies. The current environment continues to favour the criminal and the terrorist. Threat Finance is an essential read for fraud and security practitioners, financial regulators, policy-makers, intelligence officials, judges and barristers, law enforcement officers, and researchers in this field. Dr Keene offers an antidote to the lack of good, applied, research; shortcomings in in-house financial and forensic expertise; misdirected financial compliance schemes; legal and judicial idiosyncrasies; unhelpful organisation structures and poor communication. She argues convincingly for a coherent, aggressive, informed and cross-disciplinary approach to an ever changing and rapidly growing threat.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.