View the Executi" /> Operationalizing Counter Threat Finance Strategies

Text Browser Navigation Bar: Main Site Navigation and Search | Current Page Navigation | Current Page Content

U.S. Army War College >> Strategic Studies Institute >> Publications >> Operationalizing Counter Threat Finance Strategies

Login to "My SSI" Contact

U.S. Army War College >> Strategic Studies Institute >> Publications >> Details

Operationalizing Counter Threat Finance Strategies

Authored by Dr. Shima D. Keene.

Operationalizing Counter Threa... Cover Image

Brief Synopsis

View the Executive Summary

This Letort Paper describes effective Counter Threat Finance strategies as a specific area where the capability of U.S. and allied militaries can be augmented for the purpose of targeted action against adversaries. With appropriate analysis and exploitation, financial data can be used to reveal patterns of enemy behavior, motivations, and possible intentions as well as lifestyles and networks, all of which will impact directly upon military operations within a counterinsurgency environment. The targeting of the financial, and perhaps more importantly, the economic base of an organization, will not only impact the operational capability of that organization, but can ultimately lead to its destruction. To date, these strategies have been used predominantly for the purpose of disruption. However, the potential application of such strategies goes far beyond—they have the potential to be a multifaceted weapon, capable not only of disruption of the enemy, but of detecting impending instability. Specific recommendations are proposed for making best use of the potential for financial intelligence as part of an integrated strategy for both forecasting and countering contemporary security threats.

You may also be interested in the following titles:

Survey: Operationalizing Counter Threat Finance Strategies

1. How would you rate the writing and overall quality? (5 best - 1 Worst)

2. Is the content relevant for influencing present and future debates?

Also by the Author/Editor:

Extremist Migration: A Foreign Jihadist Fighter Threat Assessment
Silent Partners: Organized Crime, Irregular Groups, and Nation-States
Maintaining Information Dominance in Complex Environments
Exit Strategy: Rule of Law and the U.S. Army
Corruption, Legitimacy, and Stability: Implications for the U.S. Army
Lethal and Legal? The Ethics of Drone Strikes
The Effective Use of Reserve Personnel in the U.S. Military: Lessons from the United Kingdom Reserve Model

View other pubs in the following categories:

Homeland Security and Defense
Military Change and Transformation
Military Strategy and Policy
21st Century Warfare

  • Download it Now!

  • Hardcopies

    • Study is: Available via Download Only
    • For out of stock or digital only publications, refer to the new GPO on-demand site. For a small fee, receive many prior publications. Click here to visit.
    • All materials on our website are available as a free download.