Chapter 15 "Communicate, Cooperate, and Collaborate (C3) through Public-Private Partnerships (P3) to Counter the Convergence of Illicit Networks" in BEYOND CONVERGENCE: World Without Order (2024)

Related papers

Network vs. Network: Countering Crime-Terror by Combining the Strengths of Law Enforcement, Military and Academia

Christian Azevedo, Sara Pollak Dudley

Perspectives On Terrorism, 2020

Can we tackle the crime-terror nexus in a new and meaningful way? The nexus between transnational crime and terrorism manifests itself in several ways, and for this reason, it is complex and dynamic. The fall of the Soviet Union and the birth of the information age in the late 21 th Century manifested in an increase of the intersection between crime and terrorism. Broad international efforts to disrupt terrorism over the last ten years generated sweeping changes in the application of military force, brought changes to legal frameworks for law enforcement and focused academic study on the essence and motivations of terrorist groups. In this article we discuss the changing world context of terrorism, the underpinnings of academic research on the crime-terror nexus and the influence of corruption and globalization. As practitioners, we then outline the challenges and frustrations of working in this field. We present a model to illustrate that bringing together the resources of law enforcement, academia, and the military can provide a structurally coherent instrument with which to challenge the ever-changing perplexities of this problem set.

View PDFchevron_right

Managing collaboration in public security networks in the fight against terrorism and organized crime

Naim Kapucu

International Review of Administrative Sciences

The fight against terrorism and organized crime requires collaboration between public security organizations. Due to a lack of strong hierarchical structure, managing networks is not similar to managing a single government agency. This study examines the factors influencing network effectiveness in the public security sector. The study highlighted the importance of inter-organizational trust, network leadership style, goal convergence, and organizational culture on network effectiveness. In order to find these relations between study variables, a self-reported survey was conducted with 305 current and previous public network leaders. The study found that inter-organizational trust and goal convergence have a positive relationship with network effectiveness, with co-producer network leadership being the most convenient leadership style for effectiveness. Points for practitioners Government and network managers should focus on establishing relationships to promote trust and decrease t...

View PDFchevron_right

Public-Private Partnerships in the Fight against Terrorism?

Oldrich Bures

"Based on a case study of the role of private financial institutions in the fight against terrorist financing, this article examines the rationales for, and actual results of, public-private partnerships in counterterrorism. It shows that there is still a lack of appreciation of the roles that regular private business play, both willingly and unwillingly, in the fight against terrorism. As profit, rather than security, maximizers, private sector actors may decide to take certain security risks rather than addressing them directly, which in contrast is expected from public agencies. As a consequence, public-private partnerships have not been the silver bullet that the representatives of public agencies had hoped for since 9/11. In fact, to many private sector representatives, they are more akin to public-private dictatorships."

View PDFchevron_right

Tackling Online Terrorist Content Together: Cooperation between Counterterrorism Law Enforcement and Technology Companies

Stuart Macdonald

GNET Report, 2023

Cooperation between law enforcement and tech companies is widely regarded as necessary to tackle online terrorist content. Both sectors have publicly stated their commitment to working together, and there have been examples of mutual cooperation. Yet there are also impediments to such collaboration, including different cultures and operating practices, and there have been high-profile instances of non-cooperation. The informality of existing collaborations has also led to concerns about censorship, mission creep and a lack of accountability and oversight.The focus of this report is how to resolve the impediments to closer law enforcement – tech sector cooperation, in order to realise the benefits of mutual collaboration, while simultaneously addressing concerns about due process and accountability. The report utilises an interview-based methodology to examine the experiences and opinions of personnel from both sectors with first-hand experience of mutual cooperation, and provide an empirically grounded insight to this under-researched topic. It concludes with four recommendations: the development of an experience exchange programme; the implementation of a takedown‑shutdown counterterrorism policing protocol; a joint upstreaming programme founded on a proactive preventative ethos; and the development of joint strategic research requirements.

View PDFchevron_right

Trans-Atlantic Dialogue on Combating Crime-Terror Pipelines Dismantling Converging Threat Networks to Strengthen Global Security

Vanessa Neumann

View PDFchevron_right

CHALLENGES OF PUBLIC-PRIVATE PARTNERSHIPS IN CYBERSECURITY

Julia Urbina-Pineda

View PDFchevron_right

The Fight against Terrorist Financing

ANNE CLUNAN

Political Science Quarterly, 2006

View PDFchevron_right

Convergence: Illicit Networks and National Security in the Age of Globalization

Robert J Bunker

2013

View PDFchevron_right

Networked Security Governance: Reflections on the E.U.’s Counterterrorism Approach

Artur Gruszczak

One of the objectives of the European Union has been to secure its territory and provide its citizens with personal safety. In the global war on terror the challenge of global threats must be met as effectively as possible. The E.U. had been developing its counterterrorist policy within an intergovernmental formula. In the aftermath of Sepember 11 it had to look for new supranational arrangements. The politics of insecurity strengthened by the effects of terrorist attacks on the European soil (Madrid 2004 and London 2005) inspired the E.U.’s institutions as well as the member states to establish a networked form of security governance based on information sharing, border control and virtual fencing as well as digital identification and management of identity through biometrics.

View PDFchevron_right

Varieties of Cooperation: Government Networks in International Security

Mette Eilstrup-Sangiovanni

Networked Politics: Agency, Power, and Governance, edited by Miles Kahler (Ithaca, N.Y.: Cornell University Press), 2009

View PDFchevron_right

Chapter 15 "Communicate, Cooperate, and Collaborate (C3) through Public-Private Partnerships (P3) to Counter the Convergence of Illicit Networks" in BEYOND CONVERGENCE: World Without Order (2024)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 6082

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.