Transcript ppt - ISMOR

Modeling the Combined TerroristNarcotics Trafficker
Threat to National Security
Alexander Woodcock and Samuel Musa
National Defense University
Woodcock and Musa 2012
1
Objectives
 Examine relationship between terrorism,
drug trafficking and policy making through
the development, implementation, and use
of a series of systems dynamics-based
models
 Provide the basis for future development of
a decision aid to support policy-makers in
combating the narco-terror threat
Woodcock and Musa 2012
2
Models
 Narcotics, counter-narcotics, and trafficker double
agent model
 Policy cycle model to manage the trafficker double
agent conversion policies
 Prototype societal deprivation, affection,
disaffection, and advanced terrorist recruitment,
training, and narco-terrorist support model
 Entity security and terrorist activity models
 Violence generation model
 Policy cycle models to represent the management of
social violence and entity security policies
Woodcock and Musa 2012
3
Outcomes
 Relationships between deprivation of key
resources to individuals and disaffection and
ultimate terrorist activity
 Attack of notional targets by teams of terrorists
 Deprivation of individuals leading to violence
which can lead to an increase in level of
perceived deprivation
 Dynamics of policy- making in response to
perceived needs
 Impact of corruption on policy- making
Woodcock and Musa 2012
4
Global Threats






Western Hemisphere
 Tri border area of Paraguay, Brazil and Argentina is key for converging threats
 TOC in Mexico makes US border vulnerable- Merida Initiative
 Columbia success against FARC but new groups are emerging
Afghanistan/Southeast Asia
 Insurgency in some areas is criminally driven
 Taliban ties to Latin American DTOs and Hezbollah established
Russia/Eurasia
 TOC networks establishing new ties to global DTOs
The Balkans
 TOC groups seizing control of key DTO routes
West Africa
 Major transit point for drug shipments to Europe and heroin to US
Asia/Pacific
 Significant human trafficking, threat to intellectual property and Illicit drug production
Woodcock and Musa 2012
5
Trends
 Crime-Terror –Insurgency Nexus
 29 of 63 DoJ Priority Organization Targets list are
associated with terrorist groups
 DEA claims that 19 foreign terrorist organizations have ties
with Drug Trafficking Organizations (DTOs)
 Expansion of Drug Trafficking
 Russia, China, Italy and Balkans are establishing ties to
drug producers to develop own distribution networks &
markets
 Latin American cartels are exploiting criminal organizations
in West Africa to move cocaine to Western Europe and the
Middle East. Also Afghan DTOs in collaboration with West
African groups smuggle heroin to Europe and U.S.
Woodcock and Musa 2012
6
U.S. Strategy to Combat Transnational
Organized Crime- July 2011
 Protect Americans and partners from TCO
 Help partner countries strengthen means to combat
TCO
 Break economic power of TCO and protect
strategic markets and US financial system
 Defeat criminal networks that pose threat to
national security through various means
 Build international consensus, multilateral
cooperation and public private partnerships to
defeat TCO
Woodcock and Musa 2012
7
New capabilities to combat TOC
 New executive Order to establish sanctions program to
block property and prohibit transactions
 Proposed legislative package to enhance authorities
available to combat TOC
 Presidential proclamation to deny US entry by
transnational criminal aliens
 Rewards program in obtaining TOC information
 Interagency Threat Mitigation Working Group to identify
threat and coordination to combat TOC
Woodcock and Musa 2012
8
Drug-Terrorism Alliances
 Drug trafficking organizations (DTO) in Colombia
and Venezuela and terrorist organization FARC of
Colombia were indicted for moving cocaine through
Liberia to Europe
 There is evidence that the FARC operating on the
Ecuadorian border has developed ties to the Sinaloa
cartel, which operates inside the Ecuadorian border
 It is also well known that West African criminal
syndicates cooperate in illicit smuggling operations
with Al Qaeda operatives in Islamic Maghreb
(AQIM)
Woodcock and Musa 2012
9
Drug-Terrorism Alliances
 Drug trafficking organizations (DTO) in Colombia
and Venezuela and terrorist organization FARC of
Colombia were indicted for moving cocaine through
Liberia to Europe
 There is evidence that the FARC operating on the
Ecuadorian border has developed ties to the Sinaloa
cartel, which operates inside the Ecuadorian border
 It is also well known that West African criminal
syndicates cooperate in illicit smuggling operations
with Al Qaeda operatives in Islamic Maghreb
(AQIM)
Woodcock and Musa 2012
10
Specific Cases





Hezbollah group has been working with the Mexican drug cartels to use the
existing drug pipelines to penetrate the U.S. homeland
Two parallel terrorist networks growing in Latin America. One is operated by
Hezbollah, and another is managed by Qods operatives. These networks
cooperate to carry out various criminal activities including narcotics
smuggling
More than 80 operatives in at least 12 countries throughout the region with
greatest concern are regions of Brazil, Venezuela, and the Southern Cone
There have been several reports on Hezbollah’s financial ties to the contraband
center of the Tri-Border region of Paraguay, Argentina, and Brazil, and the
contributions of the Lebanese diaspora on Isle Margarita and other locations
Operation Red Coalition began in May 2011 when an Iranian-American from
Corpus Christi, Texas, approached a DEA informant seeking the help of a
Mexican drug cartel to assassinate the Saudi ambassador. The IranianAmerican thought he was dealing with a member of the feared Zetas Mexican
drug organization, according to agents. This led to the arrest of the suspect on
October 11, 2011.
Woodcock and Musa 2012
11
Model-Based Analyses of Counter-narcotics Activities
Counter-Narcotics
Disruption Model
Double Agent
Conversion Model
Double Agent
Policy Cycle Model
Societal Deprivation, Disaffection,
Recruitment, Advanced Terrorist Training,
and Narco-Terrorist Support Model
Security Policy Cycle
Model
Entity Security and
Terrorist Activity Models
Social Policy Cycle
Model
Violence Generation
Model
Prototype model-based analyses of counter-narcotics activities
involved studies of the impact of creating double agents and of
the possible synergy of terrorist and trafficker activities.
Woodcock and Musa 2012
12
The Impact of Double Agent Conversion
Double Agent
Conversion Effort
Double Agent
Conversion
Narcotics Capture
Narcotics Detection
Effort
Narcotics Detection
A prototype model illustrates the processes involved in the conversion of
traffickers to double agents and use of the information that they provide to
identify and capture or disrupt illicit narcotics products
Conv Effrt
0
5
10
15
20
25
30
Total (tons) Narcot Evnts Doubl Agnts Thresh Dep
3376
68
0
0
6448
129
70
7
8881
173
142
14.2
10936
214
205
20.5
13263
260
275
27.5
16332
319
357
35.7
18990
373
427
42.7
Impact of narcotics trafficker conversion efforts on the creation of trafficker
double agents
Woodcock and Musa 2012
13
The Impact of Double Agent Conversion
Number and size of narcotics
disruptions without counter-narcotics
intelligence efforts. Some 3376 tons
are seized in 68 events during a
notional 360-day time period.
Modeling Actual Narcotics Capture Activities
Year Narco Seized
2008
264 tons
2009
274 tons
2010
194 tons
%
19.6
20.3
14.4
Threshold Total (2.0)
80.4
277 tons
79.7
291 tons
85.6
206 tons
Total (1.9)
263 tons
276 tons
196 tons
Total (1.8)
249 tons
262 tons
185 tons
Estimated cocaine shipments and actual cocaine seizures or
disruptions (Narco Seized) can be used to set parameters for the
random process model
Woodcock and Musa 2012
14
Policy Cycle Models can represent the impact of Counternarcotics policy-making
A Problem for Government
Stage I: Agenda Setting
Stage VI: Policy Termination
Stage II: Policy Formulation
Stage V: Policy Change
Stage III: Policy Implementation
Stage IV: Policy Evaluation
The Policy Cycle can involve actions that identify a problem for a
government, setting an agenda, and formulating, implementing
evaluating, changing and/or terminating a policy in order to address
identified problems (Modified after Lester and Stewart, 2000). A
modified Policy Cycle model provides a basis for assessing the impact
of corruption on counter-narcotics activities
Woodcock and Musa 2012
15
Assessing the impact of policy-making speed
on counter-narcotics activities
PCM Param Total (Tons) Doubl Agnts Thresh Dep
0
320
70
7
0.02
341
133
13.3
0.04
354
160
16
0.06
358
169
16.9
0.08
368
177
17.7
0.1
369
180
18
Increased rates of policy (PCM
Param) information transfer from 0
to 0.1 (10% per time step) increase
the amount of disturbed narcotics
shipments and number of converted
double agents (Doubl Agnts)
Assessing the impact of corruption
on counter-narcotics activities
Corrupt Lvl Total (Tons) Doubl Agnts Thresh Dep
0
369
180
18
0.01
339
111
11.1
0.02
331
91
9.1
0.03
330
84
8.4
0.04
327
78
7.8
0.05
327
78
7.8
Increased levels of corruption (Corrupt
Lvl) can off-set the impact of increased
policy information transfer rates, reducing
the amount of disturbed narcotics
shipments and the number of double
agents (Doubl Agnts).
Woodcock and Musa 2012
16
Building and using combined terroristnarcotics trafficker Models
Societal Deprivation, Disaffection,
Recruitment, Advanced Terrorist Training,
and Narco-Terrorist Support Model
Security Policy Cycle
Model
Entity Security and
Terrorist Activity Models
Social Policy Cycle
Model
Violence Generation
Model
Insights gained from modeling the combined terrorist-narcotics
trafficker threat to national security can provide guidance to policy- and
decision-makers
Woodcock and Musa 2012
17
Casualties
Affected
Violence & Casualty
Impact
Casualties
Disaffected
Policy Cycle Impact
Narco-Terrorist
Training Support
Recruitment of
Disaffected Individuals
Narco-Terrorist
Corruption Impact
Basic Terrorist
Training
Narco-Terrorist
Personnel
Advanced Terrorist
Training
Available Trained
Advanced Terrorists
Key activities of the Societal Deprivation, Affection, Disaffection,
Advanced Terrorist Recruitment, Training, and Narco-Terrorist
Support Model generate notional trained terrorists who are
available to undertake terrorist activities
Woodcock and Musa 2012
18
Model-generated numbers of notional
basic and advanced terrorists. In this
particular case some 574 basic
terrorists and 37 advanced terrorists
were produced
Traff Staff
50
100
150
200
Basic Terr
45
90
136
181
Adv Terr
5
9
14
19
Recrt Rte
0
0.0001
0.0005
0.001
Basic Terr
181
326
883
1579
Adv Terr
19
28
62
77
(a) Trafficker-supplied (Traff Staff)
personnel can train to become terrorists
with basic (Basic Terr) and advanced (Adv
Terr) training;
(b) Trafficker supplied personnel can be
combined with disaffected individuals
recruited from the general population
(Recrt Rte) to provide terrorists with basic
and advanced training
Woodcock and Musa 2012
19
The Violence Generation Model
Violence Sensitivity
Affection/Disaffection
Ratio Policy Concern
Affected
Deprivation
Satisfaction
Affected/Disaffected
Ratio
Violence Warning
Threshold
Violent Social Activity
Violence Multiplier
Disaffected
Enhanced Deprivation
Terrorist Casualty
Events
The Violence Generation Model calculates the level of violence based
on notional levels of affection and disaffection caused by deprivation
and satisfaction, social violence sensitivity, and the violence warning
threshold. Enhanced deprivation can be caused by feelings of insecurity
and threat due to violence and terrorist-generated casualties
Woodcock and Musa 2012
20
Model-generated output shows the production of violent activity (Violence) and AD
Concern output when the ratio of affected to disaffected individuals rises above the
AD POL Warn threshold. The AD Concern output triggers policy cycle-based
activities that generate instructions for creating a new policy (Soc New Pol)
Woodcock and Musa 2012
21
Terrorist Losses
Available Trained
Advanced Terrorists
Potential Terrorist
Events
Risk and Security
Assessments
Advanced Terrorist
Team Size
Actual Terrorist
Events
Security Investment
Security Level
Damage and
Casualties
Security Losses
Security Policy Actions
Entity Security and Terrorist Activity models calculate the level of
security based on security investment and losses. Security investment
levels can be increased due to government policy actions. Terrorist
events can take place when adequate advanced trained terrorists are
available and the security level is sufficiently low
Woodcock and Musa 2012
22
Impact of security investment and loss and terrorist
availability on terrorist outcomes
Team Size
1
2
3
4
5
6
Terr Evnts
26
13
9
7
6
5
Tot Casults
1396
727
418
342
290
281
Terrst Loss
26
26
27
28
30
30
Selected output from the Entity Security and Terrorist Activity Models
with a security investment rate of 0% per time step, an initial security
level of 100, and a security loss rate of 0.0004 (0.04% per time step).
Increasing the terrorist team size (Team Size) reduces the total number
of actual terrorist events (Terr Evnts) due to staffing considerations.
Smaller teams can become involved in a larger number of events and
may generate more total casualties (Tot Casults) and fewer terrorist
losses (Terrst Loss)
Woodcock and Musa 2012
23
Affection/DisaffectionRelated Policy Concern
Formulate and
Implement
Social Policy
Evaluate
Social Policy
Change
Social Policy
Corruption
Losses
New Social
Policy
Social Policy
Termination
A Social Policy Cycle Model for Violence Management
SecurityRelated Policy Concern
Formulate and
Implement
Security Policy
Corruption
Losses
Evaluate
Security Policy
Change
Security Policy
New Security
Policy
Security Policy
Termination
A Security Policy Cycle Model for Entity Security Management
Woodcock and Musa 2012
24
Violence Management
Social Policy Cycle parameters set
at 0.8 and corruption 0.0 generates
a single burst of violent activity
(Violence) when AF DF Ratio
exceeds AD POL Warn threshold
Setting the Social Policy Cycle
parameters at 0.8 and corruption
parameters at 0.04 generated
bursts of violent activity followed by
continuous violence due to an
inability of a government entity to
reduce disaffection to sufficiently
low levels caused by corruption
Woodcock and Musa 2012
25
Violence Management
Social policy cycle parameters set at 0.1
and corruption 0.0 generate a longer
period of violence compared with the
situation involving parameter values of
0.8 when the AF DF Ratio exceeds the
AD POL Warn threshold
Social policy cycle parameter values
0.1 and corruption 0.04 generated a
period of violent activity followed by
continuous violence
Woodcock and Musa 2012
26
Entity Security Management
PCM parms Fin Sec Lvl
0
88.7
0.02
95.8
0.04
102
0.06
105
0.08
106.8
0.1
108
Tot Evnts
70
57
39
32
29
26
Act Evnts
27
25
21
16
15
13
Sec New Pol Tot Casult
0
1496
10.5
1358
16
1114
18
846
19
840
20
727
Impact of policy cycle parameter values (PCM parms) on security level (Fin
Sec Lvl), potential (Tot Events) and actual (Act Evnts) terrorist events and total
casualties (Tot Casult) with security political sensitivity (Sec Pol Sens) set at
0.2; security investment (Sec Invest) was set at 0.01; and corruption set at zero
Corrruption Fin Sec Lvl
0
108
0.02
94.8
0.04
91.7
0.06
90.6
0.08
90
0.1
89.6
Tot Evnts
26
50
64
65
66
66
Act Evnts
13
26
27
27
27
27
Sec New Pol Tot Casult
20
727
4
1396
1.8
1496
1
1496
0.7
1496
0.5
1496
Impact of policy cycle corruption (Corruption) on security level (Fin Sec Lvl),
potential (Tot Events) and actual (Act Evnts) events and total casualties (Tot
Casult) with security political sensitivity (Sec Pol Sens) set at 0.2, the security
investment (Sec Invest) set at 0.01, and the policy cycle parameters set at 0.1
Woodcock and Musa 2012
27
Toward an Integrated Model …
Affection
Violence & Casualty
Impact
Disaffection
Govt. Social Policy
Cycle Impact
Level of Violence
Recruitment Rate
Recruited Terrorists
Govt. Counter-Narco
Actions
Narco Support to
Terrorist Training
Trained Terrorists
Narco-Supplied
Terrorist Personnel
Available Terrorists
Terrorist Losses
Narco-Related
Security Losses
Target Security
Govt. Security Policy
Cycle Impact
Terrorist Event
Narco-Related
Corruption Impact
Security Assessment
Woodcock and Musa 2012
Casualties
28
Looking forward, additional studies are needed to
assess the narcotics trafficker involvement in at
least the following activities





Support to terrorist training; increased training capacity, increased rate of recruitment of
disaffected individuals.
Supply of trained terrorist personnel into the terrorist advanced training activities.
Security reduction impact of narcotics traffickers and impact of corruption on securityrelated protective measures.
Corruption impacts on policy implementation to prevent social deprivation and
disaffection.
Vulnerability generation and intelligence-related terrorist personnel deployment.
The authors believe that modeling these activities can
provide a deeper understanding of the relationship between
drug trafficking and terrorist activities as well as the role of
the policy-maker in countering these threats
Woodcock and Musa 2012
29