TY - GEN
T1 - Developing intelligence in the field of financing terror - An analytical model of anti-terror inter agency and cross border cooperation
T2 - 10th European Conference on Information Warfare and Security 2011, ECIW 2011
AU - Bligh, Alexander
PY - 2011
Y1 - 2011
N2 - This paper presents and analyzes the major challenges facing counter-terrorism players and proposes some ways to counter the always-present intelligence deficits in the field of financing terrorism and the threat of financing terrorism. However, this is in no way a recipe. The proposals introduced here are intended to raise awareness and to suggest new approaches, and thus encourage fresh thinking on old issues, in the hope that this will shed light on a narrow angle of the free world's war on terror. This paper is based on the paper "Security through Science", presented at the 2005 NATO sponsored "Advanced Research Workshop" at the University of Konstanz, Germany, and later published (Bligh 2006). I have developed this model for a variety of uses, the issue of "dirty money" among them. It attempts to map the needs and major obstacles, and to offer possible solutions based on the integration of an analytical model with the most advanced technological hardware and software available to national entities at the present time. The approach adopted here integrates an existing computerized platform, used by the U.S. and NATO, with the SWIFT system, along with an original analytical model, proposed here, that can be used by all system members. The system will operate along lines similar to current agreements governing the global and national use of credit cards and ATMs. Nevertheless, it is worth noting that the conflict between privacy and security is particularly acute here because the possession of financial assets is one of the most sensitive types of personal data possible. The paper is divided to the following sections: the current map of terror and intelligence as related to the financial dimension; the main challenges and a possible approach to a partial solution; and a proposed methodology for developing intelligence.
AB - This paper presents and analyzes the major challenges facing counter-terrorism players and proposes some ways to counter the always-present intelligence deficits in the field of financing terrorism and the threat of financing terrorism. However, this is in no way a recipe. The proposals introduced here are intended to raise awareness and to suggest new approaches, and thus encourage fresh thinking on old issues, in the hope that this will shed light on a narrow angle of the free world's war on terror. This paper is based on the paper "Security through Science", presented at the 2005 NATO sponsored "Advanced Research Workshop" at the University of Konstanz, Germany, and later published (Bligh 2006). I have developed this model for a variety of uses, the issue of "dirty money" among them. It attempts to map the needs and major obstacles, and to offer possible solutions based on the integration of an analytical model with the most advanced technological hardware and software available to national entities at the present time. The approach adopted here integrates an existing computerized platform, used by the U.S. and NATO, with the SWIFT system, along with an original analytical model, proposed here, that can be used by all system members. The system will operate along lines similar to current agreements governing the global and national use of credit cards and ATMs. Nevertheless, it is worth noting that the conflict between privacy and security is particularly acute here because the possession of financial assets is one of the most sensitive types of personal data possible. The paper is divided to the following sections: the current map of terror and intelligence as related to the financial dimension; the main challenges and a possible approach to a partial solution; and a proposed methodology for developing intelligence.
KW - Banking
KW - Intelligence
KW - Money laundering
KW - Security
KW - Terrorism
UR - http://www.scopus.com/inward/record.url?scp=84872938454&partnerID=8YFLogxK
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84872938454
SN - 9781622765362
T3 - 10th European Conference on Information Warfare and Security 2011, ECIW 2011
SP - 31
EP - 37
BT - 10th European Conference on Information Warfare and Security 2011, ECIW 2011
Y2 - 7 July 2011 through 8 July 2011
ER -