Future Requirements to Combat Transnational

Future Requirements to Combat
Transnational Organized Crime
SOCNORTH – CANSOFCOM – JSOU Symposium
“SOF ROLE IN CTOC”
April 8, 2015
Celina B. Realuyo
Professor of Practice
William J. Perry Center for Hemispheric Defense Studies
National Defense University
[email protected]
Disclaimer: The views expressed in this presentation are those of the author and do not reflect the official policy or position of
the Center for Hemispheric Defense Studies, the National Defense University, the Department of Defense, or the U.S. Government.
Source: Celina B. Realuyo, WJPC
[email protected]
Leading National Security Issues in 2015
ISIL in Syria & Iraq
AQAP, Al Shabaab
Boko Haram
Radical Islam
vs. West
Paris Attacks
Russia/Ukraine
Drug Violence in
Latin America
Immigration Crisis
A Rising
China
U.S. and NATO in
Afghanistan
Ebola Outbreak
CYBERSECURITY AND PRIVACY
Iran and North
Korea’s
Nuclear
Ambitions
Source: Celina B. Realuyo, WJPC
[email protected]
Chairman Dempsey's 2-2-2-1 Strategic Concept
“Here's my elevator speech about
strategy. Two, two, two, one:
Two heavyweights will influence our
future strategy, Russia and China.
Two middleweights, North Korea and
Iran. Two networks, al-Qaida and
transnational organized crime from
our southern hemisphere. And one domain - cyber. And those things
have influenced, are influencing me
today and will influence you in the
future. One of them or more.”
-- General Martin E. Dempsey, Atlantic Council, May 14, 2014
Source: Celina B. Realuyo, WJPC
[email protected]
Globalization Has Empowered Illicit Networks
Source: LA Times
Global Supply Chain Management
Four Critical Elements
MATERIEL
MANPOWER
What is Moving?
What Resources are Accessed?
How is Technology Used?
Who is Moving?
Who is in Control?
Who is Enabling?
MONEY
MECHANISMS
Who is Funding?
How is Revenue Generated?
Where is Money Going?
What Modes of Conveyance?
Land, Air, Sea routes?
What about Cyberspace?
Source:
Celina
B. Realuyo
Source:
Celina
B. Realuyo
The Three Dimensions
of Global Security Threats
SPACE
DEPTH
Breakdown of
Borders
Non-linear cause
and effect
Transnational
Threats
Immense
complexity
INCREASED COMPLEXITY
Limitations on
Governance
Second and third
order of
consequences
Hot Pursuit?
TIME
Source: Celina B. Realuyo
24/7 around the
globe
Source: Celina B. Realuyo, WJPC
[email protected]
Convergence of Terror-Crime Networks
around the World
Facilitators
Security
Prosperity
Society
Governance
Terrorists
Criminals
“Terrorists are motivated by God while criminals are motivated by greed.”
-- Moises Naim
Source: Celina B. Realuyo, WJPC
[email protected]
The Convergence of Terror-Crime Networks
around the World
–
–
–
–
–
–
–
ISIL in Iraq, Syria and Beyond
Al Qaeda in the Arabian Peninsula
Al Shabaab in the Horn of Africa
Boko Haram in Nigeria
Taliban, Haqqani Network, Al Qaeda in Afghanistan
FARC in Colombia/Shining Path in Peru
Hezbollah and its Global Facilitators
National Security Challenges in the Americas
Weak
Institutions
Citizen
Security
Illicit
Networks
External
Actors
Inequality
Corruption
Natural
Disasters
Source: Celina B. Realuyo, WJPC
[email protected]
Combating the Convergence of Illicit Networks
United
Nations
Regional
Organizations
National
Strategies
Source: Celina B. Realuyo, WJPC
[email protected]
The New Global Security Environment
U.S. Strategies to Counter Transnational Threats
TRANSNATIONAL
THREATS
Counter-Terrorism
CounterProliferation
Counter-Narcotics
Cybersecurity
Counter-Crime
Source: Celina B. Realuyo, WJPC
[email protected]
The New Global Security Environment
in an Age of Globalization
Instruments of National Power
Interagency Cooperation
Diplomatic
Security
Prosperity
Society
Governance
Law
Enforcement
Information
Financial
Intelligence
Military
Economic
Source: Celina B. Realuyo, WJPC
[email protected]
Countering Illicit Trafficking via
Transit Zone Operations/Interdictions
Source: Celina B. Realuyo, WJPC
[email protected]
The New Global Security Environment
Threats from the Convergence of Illicit Networks
Illicit Activities
Narcotics
Trafficking
Security
Prosperity
Society
Governance
Human
Trafficking
Kidnapping
Arms
Trafficking
Counterfeiting
Financial
Crimes
Cybercrime
Corruption/
Extortion
Source: Celina B. Realuyo, WJPC
[email protected]
Critical Enablers of TOC and Illicit Networks
LEADERSHIP
ILLICIT
ACTIVITIES
CORRUPTION
TOC
LOGISTICS
TECHNOLOGY
WEAPONS
PERSONNEL
FINANCING
Source: Celina B. Realuyo, WJPC
[email protected]
Requirements to Better Address CTOC Gaps
Appreciate the Complexity of Illicit Networks
Understand TOC Business Models and Economics
Develop Cyber and Technological Capabilities vs. TOC
Identify and Exploit TOC Vulnerabilities
Source: Celina B. Realuyo, WJPC
[email protected]
UNCONVENTIONAL
WARFARE
FOREIGN
INTERNAL
DEFENSE
DIRECT ACTION
SOF ASSETS TO DETECT, DISMANTLE, AND DETER
TRANSNATIONAL ORGANIZED CRIME
SOF
COUNTERTERRORISM
SPECIAL
RECONNAISSA
NCE
Future SOF Requirements for CTOC
LEGAL FRAMEWORK FOR MILITARY ROLE IN CTOC
DEFINITION OF SUPPORT TO LAW ENFORCEMENT FOR CTOC
INTERAGENCY RULES OF ENGAGEMENT IN CTOC OPERATIONS
BUILDING PARTNER CAPACITY FOR CTOC
Source: Celina B. Realuyo, WJPC
[email protected]
NDAA FY2015 U.S. Expanded DOD CN/CT Authorities
Sec 1011: Extension of Authority to Support Unified CD and CT Campaign in Colombia
1021 Authority extended by two years (thru FY16)
Sec 1012: Extension and Modification of Authority of DOD to provide Support for CD
Activities of Other Governmental Agencies
1004 Authority extended by three years (thru FY17)
1004 Authority expanded to include activities to Counter Transnational Organized Crime
(CTOC)
Sec 1013: Extension and Expansion of Authority to Provide Additional Support for CD
Activities of Certain Foreign Governments
[1033 Authority previously extended thru FY16]
Sec 1014: Extension of Authority for Joint Task Forces to Provide Support to Law
Enforcement Agencies Conducting Counterterrorism Activities
1022 Authority expanded to support law enforcement agencies conducting Counter
Transnational Organized Crime (CTOC) activities
1022 Extended availability of funds through FY20
Sec 1015: Sense of Congress Regarding Security in the Western Hemisphere
DOD should continue its efforts to combat transnational organizations in the WESHEM
DOD should increase its maritime, aerial, and intelligence, surveillance, and
reconnaissance capabilities in the region
Source: U.S. Southern Command
Source: Celina B. Realuyo, WJPC
[email protected]
White House FY 2016 Budget Request
National Security Aspects
Keeping Americans Safe at Home and Abroad
1.
2.
3.
4.
5.
6.
7.
Degrading and Defeating the Islamic State of Iraq and the Levant (ISIL)
Countering Russian Pressure and Aggressive Action with our European Allies
Promoting Prosperity, Security and Good Governance in Central America
Protecting our Nation Against Cyber-Attacks
Confronting the Threat Posed by Infectious Diseases
Combating Prescription Drug and Heroin Abuse
Honoring Our Commitment to Veterans
Source: Celina B. Realuyo, WJPC
[email protected]
To Combat Terrorism, Crime, and Illicit Networks
Foster Collaboration and Communities of Interest
at the National, Regional, and International Levels
Facilitators
Terrorists
Criminals
VS.
Intelligence
Military
Law
Enforcement
Source: Celina B. Realuyo, WJPC
[email protected]