The Resource Operationalizing counter threat finance strategies, Shima D. Keene

Operationalizing counter threat finance strategies, Shima D. Keene

Label
Operationalizing counter threat finance strategies
Title
Operationalizing counter threat finance strategies
Statement of responsibility
Shima D. Keene
Creator
Contributor
Author
Publisher
Subject
Genre
Language
eng
Summary
"This Letort Paper describes effective counter threat finance strategies as a specific area where the capability of U.S. and allied militaries can be augmented for the purpose of targeted action against adversaries. With appropriate analysis and exploitation, financial data can be used to reveal patterns of enemy behavior, motivations, and possible intentions as well as lifestyles and networks, all of which will impact directly upon military operations within a counterinsurgency environment. The targeting of the financial, and perhaps more importantly, the economic base of an organization, will not only impact the operational capability of that organization, but can ultimately lead to its destruction. To date, these strategies have been used predominantly for the purpose of disruption. However, the potential application of such strategies goes far beyond -- they have the potential to be a multifaceted weapon, capable not only of disruption of the enemy, but of detecting impending instability. Specific recommendations are proposed for making best use of the potential for financial intelligence as part of an integrated strategy for both forecasting and countering contemporary security threats"--Publisher's web site
Member of
Cataloging source
AWC
http://library.link/vocab/creatorName
Keene, Shima D
Government publication
federal national government publication
Index
no index present
LC call number
HV6431
LC item number
.K3852 2014
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Army War College (U.S.)
  • Army War College (U.S.)
Series statement
Letort papers
http://library.link/vocab/subjectName
  • Terrorism
  • Terrorism
  • National security
  • National security
  • Terrorism
  • Terrorism
Label
Operationalizing counter threat finance strategies, Shima D. Keene
Instantiates
Publication
Note
  • "December 2014."
  • Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
Bibliography note
Includes bibliographical references (pages 30-34)
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
black and white
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Introduction : the challenges -- The root causes of insecurity and conflict -- Conflict as a necessary evil -- What is threat finance? -- Financial intelligence -- Security economics -- Brief history of threat finance -- CTF efforts to date -- Private sector -- Smart sanctions -- What counter threat finance strategies can do -- Sources of financial information -- Howe effective has CTF been to date? -- Conclusions -- Future counter threat finance strategies : recommendations for the U.S. Army
Control code
898180426
Dimensions
unknown
Extent
1 online resource (xi, 34 pages).
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
008-000-01131-1
Specific material designation
remote
System control number
(OCoLC)898180426
Label
Operationalizing counter threat finance strategies, Shima D. Keene
Publication
Note
  • "December 2014."
  • Paper version available for sale by the Superintendent of Documents, U.S. Government Publishing Office
Bibliography note
Includes bibliographical references (pages 30-34)
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
black and white
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Introduction : the challenges -- The root causes of insecurity and conflict -- Conflict as a necessary evil -- What is threat finance? -- Financial intelligence -- Security economics -- Brief history of threat finance -- CTF efforts to date -- Private sector -- Smart sanctions -- What counter threat finance strategies can do -- Sources of financial information -- Howe effective has CTF been to date? -- Conclusions -- Future counter threat finance strategies : recommendations for the U.S. Army
Control code
898180426
Dimensions
unknown
Extent
1 online resource (xi, 34 pages).
Form of item
online
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
008-000-01131-1
Specific material designation
remote
System control number
(OCoLC)898180426

Library Locations

  • St. Louis Mercantile LibraryBorrow it
    1 University Blvd, St. Louis, MO, 63121, US
    38.710138 -90.311107
  • Thomas Jefferson LibraryBorrow it
    1 University Blvd, St. Louis, MO, 63121, US
    38.710138 -90.311107
  • University ArchivesBorrow it
    703 Lewis Hall, Columbia, MO, 65211, US
  • University of Missouri-St. Louis Libraries DepositoryBorrow it
    2908 Lemone Blvd, Columbia, MO, 65201, US
    38.919360 -92.291620
  • University of Missouri-St. Louis Libraries DepositoryBorrow it
    2908 Lemone Blvd, Columbia, MO, 65201, US
    38.919360 -92.291620
  • Ward E Barnes Education LibraryBorrow it
    8001 Natural Bridge Rd, St. Louis, MO, 63121, US
    38.707079 -90.311355
Processing Feedback ...