From Pablo to Osama

From Pablo to Osama PDF

Author: Michael Kenney

Publisher: Penn State Press

Published: 2010-11

Total Pages: 311

ISBN-13: 0271045310

DOWNLOAD EBOOK →

From Pablo to Osama is a comparative study of Colombian drug-smuggling enterprises, terrorist networks (including al Qaeda), and the law enforcement agencies that seek to dismantle them. Drawing on a wealth of research materials, including interviews with former drug traffickers and other hard-to-reach informants, Michael Kenney explores how drug traffickers, terrorists, and government officials gather, analyze, and apply knowledge and experience. The analysis reveals that the resilience of the Colombian drug trade and Islamist extremism in wars on drugs and terrorism stems partly from the ability of illicit enterprises to change their activities in response to practical experience and technical information, store this knowledge in practices and procedures, and select and retain routines that produce satisfactory results. Traffickers and terrorists "learn," building skills, improving practices, and becoming increasingly difficult for state authorities to eliminate. The book concludes by exploring theoretical and policy implications, suggesting that success in wars on drugs and terrorism depends less on fighting illicit networks with government intelligence and more on conquering competency traps--traps that compel policy makers to exploit militarized enforcement strategies repeatedly without questioning whether these programs are capable of producing the intended results.

The Finish

The Finish PDF

Author: Mark Bowden

Publisher: Open Road + Grove/Atlantic

Published: 2012-10-16

Total Pages: 236

ISBN-13: 0802194109

DOWNLOAD EBOOK →

New York Times bestseller: The true behind-the-scenes story of the manhunt for the 9/11 mastermind is “a page-turner” (Minneapolis Star-Tribune). From the author of Black Hawk Down and Hue 1968, this is a gripping account of the hunt for Osama bin Laden. With access to key sources, Mark Bowden takes us inside the rooms where decisions were made and on the ground where the action unfolded. After masterminding the attacks of September 11, 2001, Osama bin Laden managed to vanish. Over the next ten years, as Bowden shows, America found that its war with al Qaeda—a scattered group of individuals who were almost impossible to track—demanded an innovative approach. Step by step, Bowden describes the development of a new tactical strategy to fight this war—the fusion of intel from various agencies and on-the-ground special ops. After thousands of special forces missions in Iraq and Afghanistan, the right weapon to go after bin Laden had finally evolved. By spring 2011, intelligence pointed to a compound in Abbottabad; it was estimated that there was a 50/50 chance that Osama was there. Bowden shows how three strategies were mooted: a drone strike, a precision bombing, or an assault by Navy SEALs. In the end, the president had to make the final decision. It was time for the finish. “In-depth interviews with Obama and other insiders reveal a White House on edge, facing top-secret options, white-knuckle decisions, and unforeseen obstacles . . . Bowden weaves together accounts from Obama and top decision-makers for the full story behind the daring operation.” —Vanity Fair “The most accessible and satisfying book yet written on the climactic event in the United States’ long war against al Qaeda.” —San Francisco Chronicle

The Economics of Violence

The Economics of Violence PDF

Author: Gary M. Shiffman

Publisher: Cambridge University Press

Published: 2020-01-30

Total Pages: 243

ISBN-13: 1108882838

DOWNLOAD EBOOK →

How do we understand illicit violence? Can we prevent it? Building on behavioral science and economics, this book begins with the idea that humans are more predictable than we like to believe, and this ability to model human behavior applies equally well to leaders of violent and coercive organizations as it does to everyday people. Humans ultimately seek survival for themselves and their communities in a world of competition. While the dynamics of 'us vs. them' are divisive, they also help us to survive. Access to increasingly larger markets, facilitated through digital communications and social media, creates more transnational opportunities for deception, coercion, and violence. If the economist's perspective helps to explain violence, then it must also facilitate insights into promoting peace and security. If we can approach violence as behavioral scientists, then we can also better structure our institutions to create policies that make the world a more secure place, for us and for future generations.

Targeting Top Terrorists

Targeting Top Terrorists PDF

Author: Bryan C. Price

Publisher: Columbia University Press

Published: 2019-01-15

Total Pages: 272

ISBN-13: 0231547722

DOWNLOAD EBOOK →

When President Barack Obama announced the assassination of Osama bin Laden, many Americans hoped the killing of al-Qaida’s leader would sound the death knell for the organization. Since 9/11, killing and capturing terrorist leaders has been a central element in U.S. counterterrorism strategy. This practice, known as leadership decapitation, is based on the logic that removing key figures will disrupt the organization and contribute to its ultimate failure. Yet many scholars have argued that targeted killings are ineffective or counterproductive, questioning whether taking out a terror network’s leaders causes more problems than it solves. In Targeting Top Terrorists, Bryan C. Price offers a rich, data-driven examination of leadership decapitation tactics, providing theoretical and empirical explanations of the conditions under which they can be successful. Analyzing hundreds of cases of leadership turnover from over two hundred terrorist groups, Price demonstrates that although the tactic may result in short-term negative side effects, the loss of top leaders significantly reduces terror groups’ life spans. He explains vital questions such as: What factors make some terrorist groups more vulnerable than others? Is it better to kill or capture terrorist leaders? How does leadership decapitation compare to other counterterrorism options? With compelling evidence based on an original dataset along with an in-depth case study of Hamas, Targeting Top Terrorists contributes to scholarship on terrorism and organizational theory and provides insights for policy makers and practitioners on some of the most pressing debates in the field.

Mexico's Illicit Drug Networks and the State Reaction

Mexico's Illicit Drug Networks and the State Reaction PDF

Author: Nathan P. Jones

Publisher: Georgetown University Press

Published: 2016-04-15

Total Pages: 209

ISBN-13: 1626162964

DOWNLOAD EBOOK →

Mexican drug networks are large and violent, engaging in activities like the trafficking of narcotics, money laundering, extortion, kidnapping, and mass murder. Despite the impact of these activities in Mexico and abroad, these illicit networks are remarkably resilient to state intervention. Drawing on extensive fieldwork and interviews with US and Mexican law enforcement, government officials, organized crime victims, and criminals, Nathan P. Jones examines the comparative resilience of two basic types of drug networks—“territorial” and “transactional”—that are differentiated by their business strategies and provoke wildly different responses from the state. Transactional networks focus on trafficking and are more likely to collude with the state through corruption, while territorial networks that seek to control territory for the purpose of taxation, extortion, and their own security often trigger a strong backlash from the state. Timely and authoritative, Mexico's Illicit Drug Networks and the State Reaction provides crucial insight into why Mexico targets some drug networks over others, reassesses the impact of the war on drugs, and proposes new solutions for weak states in their battles with drug networks.

Dark Logic

Dark Logic PDF

Author: Robert Mandel

Publisher: Stanford University Press

Published: 2011

Total Pages: 268

ISBN-13: 0804769931

DOWNLOAD EBOOK →

This book constitutes the first major study showing (1) when transnational organized crime is likely to use corruption and violence tactics, (2) when transnational criminal activities most affect individual and state security, and (3) when the negative consequences of these tactics and activities can be most successfully combated.

American Made

American Made PDF

Author: Shaun Attwood

Publisher: War On Drugs

Published: 2016-09-12

Total Pages: 0

ISBN-13: 9780993021534

DOWNLOAD EBOOK →

Barry Seal flew cocaine and weapons worth billions of dollars into and out of America in the 1980s. After he became a government informant, Pablo Escobar's Medellin Cartel offered a million for him alive and half a million dead. But his real trouble began after he threatened to expose the dirty dealings of George HW Bush. American Made rips the roof off Bush and Clinton's complicity in cocaine trafficking in Mena, Arkansas. "American Made really captures the big picture of my dad's story"--Aaron Seal, Barry Seal's son "A conspiracy of the grandest magnitude" - Congressman Bill Alexander on the Mena affair Shaun Attwood's WAR ON DRUGS SERIES - PABLO ESCOBAR, AMERICAN MADE, WE ARE BEING LIED TO and THE CALI CARTEL - are harrowing, action-packed and interlinked true stories that demonstrate the devastating consequences of drug prohibition.

Cyber Operations

Cyber Operations PDF

Author: Jerry M. Couretas

Publisher: John Wiley & Sons

Published: 2024-04-08

Total Pages: 324

ISBN-13: 1119712114

DOWNLOAD EBOOK →

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.

Nexus of Global Jihad

Nexus of Global Jihad PDF

Author: Assaf Moghadam

Publisher: Columbia University Press

Published: 2017-05-30

Total Pages: 413

ISBN-13: 0231538154

DOWNLOAD EBOOK →

Leading jihadist groups such as al-Qaeda and the Islamic State dominate through cooperation in the form of knowledge sharing, resource sharing, joint training exercises, and operational collaboration. They build alliances and lesser partnerships with other formal and informal terrorist actors to recruit foreign fighters and spread their message worldwide, raising the aggregate threat level for their declared enemies. Whether they consist of friends or foes, whether they are connected locally or online, these networks create a wellspring of support for jihadist organizations that may fluctuate in strength or change in character but never runs dry. Nexus of Global Jihad identifies types of terrorist actors, the nature of their partnerships, and the environments in which they prosper to explain global jihadist terrorism's ongoing success and resilience. Nexus of Global Jihad brings to light an emerging style of "networked cooperation" that works alongside interorganizational terrorist cooperation to establish bonds of varying depth and endurance. Case studies use recently declassified materials to illuminate al-Qaeda's dealings from Iran to the Arabian Peninsula and the informal actors that power the Sharia4 movement. The book proposes policies that increase intelligence gathering on informal terrorist actors, constrain enabling environments, and disrupt terrorist networks according to different types of cooperation. It is a vital text for strategists and scholars struggling to understand a growing spectrum of terrorist groups working together more effectively than ever before.