LEADER 03638nam 2200661 450 001 9910790894503321 005 20230126203615.0 010 $a0-16-092295-X 010 $a0-16-092040-X 035 $a(CKB)2550000001141583 035 $a(EBL)3571653 035 $a(SSID)ssj0001326322 035 $a(PQKBManifestationID)11740932 035 $a(PQKBTitleCode)TC0001326322 035 $a(PQKBWorkID)11520024 035 $a(PQKB)10877679 035 $a(MiAaPQ)EBC3571653 035 $a(Au-PeEL)EBL3571653 035 $a(CaPaEBR)ebr10888138 035 $a(OCoLC)929518172 035 $a(EXLCZ)992550000001141583 100 $a20130903d2013 uy| 0 101 0 $aeng 135 $aur|n#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aConvergence $eillicit networks and national security in the age of globalization /$fedited by Michael Miklaucic and Jacqueline Brewer ; with a foreword by Admiral James G. Stavridis, USN 210 1$aWashington, DC :$cPublished for the Center for Complex Operations, Institute for National Strategic Studies by National Defense University Press; sold by the U.S. Government Printing Office,$d2013. 215 $a1 online resource (280 pages) 300 $a"April 2013." 311 $a0-16-091923-1 320 $aIncludes bibliographical references. 327 $a""Book Title""; ""Contents""; ""Foreword""; ""Acknowledgments""; ""Introduction""; ""Part I. A Clear and Present Danger""; ""Chapter 1: Deviant Globalization ""; ""Chapter 2: Lawlessness and Disorder: An Emerging Paradigm for the 21st Century ""; ""Chapter 3: Can We Estimate the Global Scale and Impact of Illicit Trade? ""; ""Part II. Complex Illicit Operations""; ""Chapter 4: The Illicit Supply Chain ""; ""Chapter 5: Fixers, Super Fixers, and Shadow Facilitators: How Networks Connect ""; ""Chapter 6: The Geography of Badness: Mapping the Hubs of the Illicit Global Economy "" 327 $a""Chapter 7: Threat Finance: A Critical Enabler for Illicit Networks """"Chapter 8: Money Laundering into Real Estate ""; ""Part III. The Attack on Sovereignty""; ""Chapter 9: The Criminal State ""; ""Chapter 10: How Illicit Networks Impact Sovereignty ""; ""Chapter 11: Counterinsurgency, Counternarcotics, and Illicit Economies in Afghanistan: Lessons for State-Building ""; ""Part IV. Fighting Back""; ""Chapter 12: Fighting Networks with Networks ""; ""Chapter 13: The Department of Defense's Role in Combating Transnational Organized Crime "" 327 $a""Chapter 14: Collaborating to Combat Illicit Networks Through Interagency and International Efforts """"About the Contributors"" 606 $aTelecommunication systems$xSecurity measures 606 $aComputer security 606 $aTransnational crime$xSocial networks 606 $aSovereignty$xSocial networks 615 0$aTelecommunication systems$xSecurity measures. 615 0$aComputer security. 615 0$aTransnational crime$xSocial networks. 615 0$aSovereignty$xSocial networks. 676 $a364.135 702 $aMiklaucic$b Michael 702 $aBrewer$b Jacqueline 702 $aStavridis$b James 712 02$aNational Defense University.$bCenter for Technology and National Security Policy.$bCenter for Complex Operations, 712 02$aNational Defense University.$bInstitute for National Strategic Studies, 712 02$aNational Defense University Press, 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790894503321 996 $aConvergence$92007456 997 $aUNINA