Neil Bennett - Terrorist Finance Networks

17
Terrorist Finance Networks Neil Bennett

description

This is a presentation delivered by Neil Bennett, at the STFC Futures / RUSI Conference Series: Data for Security and Resilience 2014

Transcript of Neil Bennett - Terrorist Finance Networks

Page 1: Neil Bennett - Terrorist Finance Networks

Terrorist Finance Networks

Neil Bennett

Page 2: Neil Bennett - Terrorist Finance Networks
Page 3: Neil Bennett - Terrorist Finance Networks
Page 4: Neil Bennett - Terrorist Finance Networks

Hawala Transaction Example

Subject B

Subject A

1. Subject A in Saudi Arabia wishes to transfer $2000 to Subject B in Quetta, Pakistan

Transaction

Code (TA)

3. Subject A provides the access code to Subject B

At the same time Hawaladar 1 provides the code to Hawaladar 2 in QTA who agrees to pay the $2k

Settlement of funds

(post transaction)

5. Hawaladars 1 & 2 settle the resulting imbalance of funds, if necessary, at a later date. Bank / electronic Transfer or cash courier used. Alternatively goods or services are exchanged / offered to settle the debt

Hawaladar 1

2. Subject A approaches Hawaladar 1 based in Saudi Arabia who accepts the business and provides Subject A with a Transaction code (e.g. part of a banknote serial). Hawaladar 1 updates his ledgers

Ledgers

4. Hawaladar 2 provides the $2000 to Subject B on receipt of the correct access code. Hawalada 2 updates his ledgers

Ledgers

Hawaladar 2

Communication

(could be via e-mail)

Page 5: Neil Bennett - Terrorist Finance Networks
Page 6: Neil Bennett - Terrorist Finance Networks
Page 7: Neil Bennett - Terrorist Finance Networks
Page 8: Neil Bennett - Terrorist Finance Networks
Page 9: Neil Bennett - Terrorist Finance Networks

Garmser Branch Quetta Affiliated BranchNimroz Branch

Lashkar Gah Branch

Kandahar City Branch

Wesh Branch

Page 10: Neil Bennett - Terrorist Finance Networks

“Expect less from trying to dry up terrorist money and more from following the money for intelligence, as a tool to hunt terrorists,

understand their networks, and disrupt their operations”

National Commission on Terrorist Attacks Upon the United States, July 2004

Page 11: Neil Bennett - Terrorist Finance Networks

System and Enterprise• Threat is a SYSTEM

– … “combination of interacting elements organised to achieve one or more stated purposes”

The system can be described by a set of functions and activities

• ENTERPRISE: many system links have transactional characteristics– exchange of funding for goods, sharing of resources and so on

• This perspective enables workflows to be visualised and disrupted

• Systems Approach is portable to other problem sets

Page 12: Neil Bennett - Terrorist Finance Networks

Approach• System/Function leads to Vulnerabilities leads to Actions

► All Vulnerabilities are linked to Actions: weak points are stressed ◄ All Actions link to Vulnerabilities: designed to generate effects

RED Capability (ILoDs)

SUPPLY

FINANCE

EXPERTISE

INFORM

DIRECT

DEPLOY

Store

Transport

Manufacture

Acquire

Assemble

Raise

Move

Store

Use

Recruit

Train

Co-ordinate

Plan

Lead

Int.collect

R&D

Emplace

Initiate

RED Capability (ILoDs)

SUPPLY

FINANCE

EXPERTISE

INFORM

DIRECT

DEPLOY

Store

Transport

Manufacture

Acquire

Assemble

Raise

Move

Store

Use

Recruit

Train

Co-ordinate

Plan

Lead

Int.collect

R&D

Emplace

Initiate

Functions Vulnerabilities Actions

Page 13: Neil Bennett - Terrorist Finance Networks

What does this Mean?

• Investigations and Delivery of Effect– Understand the System – “Understanding”– Identify Vulnerabilities– Highlight Intervention opportunities– Synchronise activity to deliver Interventions

• Law Enforcement• Cross-Govt and Inter-Agency• With Partners

– Evaluate ‘effect’ achieved – Impact/Benefit Analysis

Page 14: Neil Bennett - Terrorist Finance Networks

Context/Understanding/Analysis

• Geo Spatial Intelligence• Human Intelligence• Financial Intelligence• Communications

Intelligence• Imagery Intelligence• Open Source

Intelligence

• Signals Intelligence• Forensics and

Biometrics• Seized Media• Chemical • Meteorological • Technical• Identity Intelligence

Page 15: Neil Bennett - Terrorist Finance Networks

Operationalising Effect

IEDsPhones

Electronic MediaNotebooksDetentionBiometrics

All Source IntelligenceActivity Reporting

Statistics

EXPLOITATION

ANALYSIS

TARGETING

Military Action (where possible)

UN Designation, sanctions etc

Intelligence Collection

Info/Influence Campaign

Arrests/Detention

Intervention

Financial Disruption

Understand – Plan – Deliver - Assess

Page 16: Neil Bennett - Terrorist Finance Networks

Hard v Soft• Social Media• High Performance

Analytics• Sociology• Link and Entity Extraction• Natural Language

Processing • Anthropology• Semantic Search• Node Disambiguation

• Graph Databasing• Pattern and Prediction• Visualisation• Fuzzy Link Analysis• Machine Learning• Psychology• Web Science• Predictive Modelling• Linguistic Analysis in

microblogs

Page 17: Neil Bennett - Terrorist Finance Networks