Adaptation and innovation is a core component of successful organization competition among states and their militaries, businesses and corporations—and as argued here, organized crime groups—especially transnational criminal organizations (TCOs). In order to gain supremacy organizations often introduce new technologies to foster this innovation, yet not all innovation is technological. Indeed, non-state actors are often incubators of novel practices and non-technological innovation to further their goals and often to survive. This brief assessment looks at non-technological innovation potentials among Mexican TCOs (criminal cartels and gangs).
Unmasking Maskirovka: Russia’s Cyber Influence Operations examines Russian ‘Information Operations’ (InfoOps) as a tool of strategic influence. This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed.
Several OODA Network Experts have published a new book on urban operations. This newly released anthology documents over a decade of writings on urban conflict: Blood and Concrete: 21st Century Conflict in Urban Centers and Megacities. The editors, Dave Dilegge, Robert J. Bunker, John P. Sullivan, and Alma Keshavarz assembled a
Domain experts have called into question the effectiveness of the International Criminal Court.
“Veteran police officer John Sullivan coined the term ‘urban siege’ in 2009 in the wake of the Mumbai attacks. The terrorists in India were highly organized and received guidance and real-time logistical support from offsite handlers in Pakistan. They were also hyper-connected: operatives were equipped with smartphones and used social
The National Incident Management System (NIMS) represents a core set of doctrine, concepts, principles, terminology, and organizational processes that enables effective, efficient, and collaborative incident management. The Incident Command System (ICS), as a component of NIMS, establishes a consistent operational framework that enables government, private sector, and nongovernmental organizations to
“Web browsing habits, email conversations and phone calls will be monitored by the government under new legislation set to be unveiled in May. The government is planning to announce the legislation in the Queen’s Speech in May, with Home Office confirming it believes such steps are necessary to tackle criminality
This study is based on open source research into the scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible overlap between criminal and terrorist activity in that country. The analyst examined those organized crime
Combatting networked threats requires new approaches to producing intelligence to support a range of operations. Contemporary networked threats include terrorism and insurgency. This paper describes the need for a distributed global network for the co-production of intelligence. It introduces the concept of Intelligence Preparation for Operations (IPO) and describes a
This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency service operations. Intelligence-led mitigation is a management philosophy and business process to proactively guide strategic, operational, and tactical decisions for mitigating the