首页> 外文学位 >The Crime-Terror Nexus: Improvised Explosive Device Illicit Supply Intermediation
【24h】

The Crime-Terror Nexus: Improvised Explosive Device Illicit Supply Intermediation

机译:犯罪恐怖联盟:简易爆炸装置的非法供应中介

获取原文
获取原文并翻译 | 示例

摘要

This dissertation explored how illicit supply chain intermediation functions as the underlying infrastructure of buyer-seller exchanges of IED and related components; and how state and non-state actors, witting and unwitting entities converge into a criminal and terrorist nexus that employs these devices in support of parallel and divergent violent activities.;My interest in illicit intermediation stems from over 10 years of experience as a counter-IED analyst observing disjointed and mostly ineffective counter-intermediation efforts by governments and law enforcement. This analysis is based on my belief that by identifying the junctions between money, geography, transfer of IED materials, social networks, and state and non-state actors, the global threat networks employing IEDs can be disrupted.;Using a mixed methods research design, why intermediaries exist, how they operate, and the ways they influence the illicit supply chain were explored. Both qualitative and quantitative data were used to provide a holistic understanding of the research problem. The research design also encompassed a systems approach, supply chain intermediation analysis, and social network analysis. Together, these methodologies identified causal relationships and discerned patterns observed in the structure, organization, operations, and flow of information between intermediaries and their networks; and identified key systemic leverage points within the network structures that can potentially be influenced. The well-planned and orchestrated attack by the terrorist group, Lashkar-e Tayyiba on Mumbai, India in 2008 was used to frame the issue of illicit intermediation and the nexus between crime and terrorism, as well as to give context to the analysis used in this study.;Due to the complex nature of the subject, a scarcity of primary sources was a key limitation in this research. Instead, secondary data from journals, periodicals, academic work, etc. were used. These were validated through corroborating measures, and data were discarded or an explanation was provided where differences occurred.;Research results identified key systemic leverage points and vulnerabilities that can potentially destabilize an illicit intermediated supply chain network by influencing the linear interdependence between the intermediary, and the supplier and buyer. The expected contribution of this analysis is to identify counter-intermediation options designed for a layered approach consisting of the private, public, and civic sectors of society, and addressing structural and governance-related issues that may go far in diminishing, and perhaps defeating the power and influence of these illicit supply chain actors.
机译:本文探讨了非法供应链中介如何作为IED及其相关组件的买卖双方交换的基础设施。以及国家和非国家行为者,证人和不知情的实体如何融合为犯罪和恐怖分子的纽带,并利用这些手段支持平行和不同的暴力活动。我对非法中介的兴趣源于10多年的反击经验简易爆炸装置分析员观察到政府和执法部门进行的脱节和几乎无效的反中间努力。这种分析基于我的信念,即通过确定金钱,地理,简易爆炸装置材料的转移,社交网络以及国家和非国家行为者之间的联系,可以破坏使用简易爆炸装置的全球威胁网络。;使用混合方法研究设计探讨了中介机构的存在,中介机构的运作方式以及它们对非法供应链的影响方式。定性和定量数据均用于提供对研究问题的整体理解。研究设计还包括系统方法,供应链中介分析和社交网络分析。这些方法共同确定了中介机构及其网络之间的因果关系以及在结构,组织,运作和信息流中观察到的模式;并确定了可能受到影响的网络结构中的关键系统杠杆点。恐怖组织Lashkar-e Tayyiba在2008年对印度孟买进行了精心策划和精心策划的攻击,被用来勾勒非法中介问题和犯罪与恐怖主义之间的联系,并为由于该主题的复杂性,主要来源的缺乏是该研究的关键限制。取而代之的是,使用了来自期刊,期刊,学术著作等的辅助数据。这些都通过确证措施进行了验证,并丢弃了数据或在出现差异的地方提供了解释。供应商和买方。该分析的预期贡献在于,确定针对社会,私营部门,公共部门和公民部门组成的分层方法而设计的反中介方案,并解决可能会逐渐缩小甚至可能击败传统知识的结构和治理相关问题。这些非法供应链参与者的权力和影响。

著录项

  • 作者单位

    Saybrook University.;

  • 授予单位 Saybrook University.;
  • 学科 Peace studies.;Criminology.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 174 p.
  • 总页数 174
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 整形外科学(修复外科学);
  • 关键词

  • 入库时间 2022-08-17 11:54:27

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号