Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged National Security
CONVERGENCE: Illicit Networks and National Security in the Age of Globalization

By Michael Miklaucic and Jacqueline Brewer

I llicit networks affect everyone in our modern, globalized world. From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries. I have experience combating these threats personally at the tactical, operational, and strategic levels. As a young naval officer on a variety of ships, I spent a fair amount of time patrolling the global commons where transnational criminals in the guise of pirates and drug smugglers proliferate. I was in the Pentagon on 9/11 and personally experienced the global reach of modern terrorism. Later on, when I commanded U.S. Southern Command (USSOUTHCOM), one of my subordinate commands was Joint Interagency Task Force–South in Key West, Florida, a multinational and interagency/interministerial command that counters drug trafficking in the Western Hemisphere. I also experienced the pernicious effects that transnational crime has on our friends as it ranges throughout the entire Western Hemisphere. After leaving USSOUTHCOM to become commander at U.S. European Command (USEUCOM), I saw that Europe was also challenged by the same types of transnational crime. In response, I stood up the Joint/Interagency Counter Trafficking Center in Stuttgart, Germany, designed to counter transnational criminal networks in cooperation with our international partners. When I took command of USEUCOM, I also became the Supreme Allied Commander, Europe (SACEUR). As SACEUR, I command Operation Active Endeavor, which counters trafficking in the Mediterranean, and Operation Ocean Shield, which is part of the international counterpiracy efforts off the Somali coast. In addition, we have pioneered responses to cyber threats. At the Supreme Headquarters Allied Powers Europe, we have the North Atlantic Treaty Organization Computer Incident Response Center, and at USEUCOM, we are taking steps to create a subunified cyber command that will have links to both U.S. Cyber Command in the United States and USEUCOM in Germany. All of these organizations were designed to facilitate a whole-of-government approach, where all elements of national power work together in order to address emerging threats. Eventually, once societies understand the nature of the threats facing them, they will hope- fully mobilize nongovernmental assets, adopting a “whole of society” approach. When all of these elements work together, governmental and nongovernmental groups can join international regional and global groups to form a “whole of international society” approach, allowing us to close the seams that exist between nations and regions. Only then will we be able to close these illicit transnational networks. These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat. 


Center for Complex Operations Institute for National Strategic Studies By National Defense University Press Washington, D.C., 2013. 304p.

Artificial Intelligence, Cybersecurity, and National Security:

By Richard Danzig

In this paper, the author warns national security decisionmakers that to accomplish their missions they urgently need to better prepare for the impact of artificial intelligence (AI) on cybersecurity. He analyzes the present failings of the U.S. government in this respect, highlights the consequences of these failings, and makes recommendations for correcting them. He offers this effort as a case study and draws from it ten propositions relevant to those who are more broadly concerned with how AI, other technologies, and human decisions are intertwined and co-evolving.

Santa Monica, CA: RAND, 2025.

Deepfakes and the Dangers to National Security and Defense

By Benjamin Ang and Muhammad Faizal

AI-generated disinformation in the form of deepfakes, comprising digitally manipulated video, audio, or images, has hit the headlines in Singapore. Cases from around the world demonstrate that AI-generated deepfakes combined with cyberattacks are not only a threat to the integrity of elections and scam victims but are also a threat to national security and defence. COMMENTARY Deepfake videos of Singapore’s political leaders have been circulating since at least last year, when manipulated video and audio impersonating Senior Minister (then Prime Minister) Lee Hsien Loong circulated online, appearing to promote a cryptocurrency scheme in a TV news interview. Similar videos impersonating Prime Minister (then Deputy Prime Minister) Lawrence Wong were also circulated. This year, more deepfake videos of Senior Minister (SM) Lee have been circulating online, this time showing him commenting on international relations. SM Lee described them as having “malicious intent” and was “dangerous and potentially harmful to our national interests”. To deal with this problem of deepfake videos, the Minister for Digital Development and Information, Ms Josephine Teo, is considering ways to regulate it by proposing a labelling scheme for tools and contents and even discussing a temporary ban to counter such videos, which are anticipated ahead of future Singapore general elections. The earlier cases were commercially motivated scams, but the recent ones have severe national security and defence implications. In SM Lee’s case, the deepfake made it look as if he was commenting on foreign policy, and foreigners unfamiliar with him could be misled, thereby sowing distrust. There is evidence that hostile information campaigns are used to weaken national cohesion or disrupt society in the lead-up to hostilities or as part of geopolitical contestation. 

S. Rajaratnam School of International Studies, NTU Singapore , 2024. 4p.

Undocumented Immigration and Terrorism: Is there a Connection? 

By Michael T. Light , Julia T. Thomas

Unauthorized immigration, already a divisive and controversial subject in American society, was reframed as a grave national security threat after the terrorist attacks on Sept. 11, 2001. Yet, despite substantial public, political and policy attention to the issue of undocumented immigration and terrorism, there has been relatively little empirical assessment of the relationship between unauthorized immigration flows and terrorist activity. We attempt to fill this gap by combining newly developed estimates of the unauthorized population, a novel use of sentencing and prosecutorial data to measure terrorism-related activity, and multiple data sources on the criminological, socioeconomic, and demographic context from all 50 states from 1990 to 2014. We then leverage this unique dataset to examine the longitudinal, macro-level relationship between undocumented immigration and various measures of terrorism. Results from fixed effects negative binomial models suggest that increased undocumented immigration over this period is not associated with terrorist attacks, radicalization, or terrorism prosecutions.

Soc Sci Res. 2021 February ; 94: 102512. doi:10.1016/j.ssresearch.2020.102512.