Homeland Security: The Sworn Duty of Public Officials The United States has a unique position amongst the countries of the world;...
Thursday, February 18, 2016
Narco Cartels as The Greatest Domestic Threat
Narco Cartels as The Greatest Domestic Threat
There are many threats to the domestic security of the United States that go beyond the actions of terrorism. Subversion, corruption of public officials, and high rates of crime all threaten the American citizen. The “group” that constitutes the greatest threat to the United States is the same threat post- 9/11 as it was pre-911, the drug cartels, which are also known as Drug Trading Organizations (DTO's). The larger of these DTO's are the Sinaloa cartel, the Gulf cartel, Los Zetas, the Juarez cartel, the Jalisco New Generation cartel, and Los Cabelleros Templarios.
Although mass casualty terror attacks generate news headlines, the incidence of such attacks within the United States is rare. The persistence, intensity, and scope of cartel activity qualifies them for evaluation as the highest priority security threat. A 2013 Texas Department of Public Safety (DPS) report identifies DTO activity as a significant threat to Texas (Texas Public Safety Threat Overview 2013, 2013, p.2). This underscores that domestic threats are not limited to foreign supported ideological enemies, but that there is an overlap in threat between DTO's and specifically terrorist organizations. Longmire and Longmire suggest that such characteristics of the DTO's as “The tactics, strategy, organization, and even (to a limited extent) the goals” are consistent with those of the terrorist organizations(2008, p.35). Björnehed reinforces this idea by identifying that criminal organizations and terrorist organisations “both emphasize secrecy and concealment from law enforcement officials” (2004, p.308). This can be seen in DTO alliances with domestic criminal gangs; The DPS report makes the point that “Gangs working with the Mexican cartels are involved in a level of crime that affects the entire state”(Texas Public Safety Threat Overview 2013, 2013, p.20). An additional reason to view the DTO's as a serious threat involves subversion in destroying law enforcement capability through corruption and violent intimidation; The DPS report also points out that DTO's have a history of corrupting public officials in Mexico and that the DTO's “ also seek to corrupt public officials in the US” (Texas Public Safety Threat Overview 2013, 2013, p.34).
Currently, the United States addresses the cartels under two auspices; the War on Drugs, and as an organized crime issue. A full discussion of the War on Drugs is beyond this paper, but a concept that is not explored fully is that the drug cartels arose as a reaction to the prohibition on drugs. However, the consideration of drug legalization will not provide an option for destroying the DTO's. Their operations have expanded into areas beyond the drug markets, and ”The most brutal dto [drug trafficking organizations] battles are not over customers or suppliers but over ports and trade routes”. (Morris, 2013, p.31).
There are three strategies to combating not just the DTO's, but other violent and subversive groups including organized criminals and ideological terrorists.
The first strategy involves the recognition that violent subversive groups, whether they be criminal or ideological, and whether they be foreign or domestic, present a threat to the security and well being of every American citizen. A legal solution must be created that is both pragmatic regarding the existential threat these groups present and that is efficient in terms of combating them. One issue is the schizophrenic nature of the way that we deal with even foreign sponsored terror groups. Clarke demonstrates that we have combated terrorist organizations with a “blend between a war-fighting approach (GWOT) ..., including the use of military trials for prosecution, and a law enforcement approach...)”( 2013, p. 57) . This dual approach is complicated by the diffuse command structure for operations. Crenshaw discusses this issue; “Responsibility for dealing with terrorism is widely distributed, and lines of jurisdiction tend to be blurred and overlapping, with no clear institutional monopoly of the issue” (2001, p.330). Without a clear and legal framework to operate within, our legal system has been equally ambivalent towards setting constant operational guidelines. Breinholt examines the constantly changing legal framework of anti-terror operations in the context of “...American courts, which operate on the basis of historical precedent, remain available and are willing, when necessary, to redraw the lines between collective security and personal liberty” (2004, p.141).
The second strategy lies in effective intelligence regarding threat groups. Intelligence gathering and sharing has been hindered by self-imposed restrictions, some based on Constitutional protections and others based on political pandering. However, Davis asserts that the “need for improved sharing of intelligence information between local, state, and federal law enforcement agencies was recognized as early as the 1964 Warren Commission report” (2010, p. 39). In a callous disregard for the lives of Americans, reforms of the 1970's were “based on a presumption that domestic terrorism could be handled by investigating crimes after they were committed rather than preventing them” (Powers, 2004, p. 45). Without effective intelligence, the third strategy cannot be employed.
The final strategy lies in targeted, or decapitation methods. The most effective method of addressing terrorism is also the most direct; the targeted elimination, through killing or capture, of terrorist leaders and facilitators. Wilner concludes that “The literature on targeted killings suggests that their use diminishes the coercive and operational capability of violent, non-state groups in a number of ways”(2010, p. 312). This is where effective intelligence comes into play. Barba discusses the futility of undirected force, “The undiscerning use of force in terrorism can be as productive as cutting off one of hydra’s heads”(2014, p.62). Targets under consideration for these tactics should include those that commit acts of terror, those that directly support terrorist acts, and those that plan or coordinate terrorist acts. Levitt asserts that “Individuals who provide such support must be recognized as terrorists of the same caliber as those who use that support to execute attacks” (2004, p.33). Zussman, Zussman, & Yisrael found that the use of assassination was valuable to the Israeli counterterror strategy; however, this conclusion was qualified by the selection of the targeting; “It is reasonable to assume that an assassination would be most effective in reducing the capabilities of a terrorist organization if the target is a senior leader with specialized knowledge and skills”(2005, p.4).
In conclusion, DTO's are the most significant threat to America, but have not been combated effectively. In oder to deal with DTO's and other violent, criminal, terrorist, and subversive groups, the underlying security framework must recognize the threat these groups present and be configured in a way to effectively deal with them while remaining on Constitutional grounds. The proper intelligence must be created and shared efficiently to identify the critical points at which the third strategy must be employed. The third strategy is to destroy the effectiveness of these organizations by decapitation leadership and removing their support structure.
Barba, P. E. S. (2014, June). Breaking terrorists’ will to fight (Thesis). Monterey, California: Naval Postgraduate School. Retrieved from https://calhoun.nps.edu/handle/10945/42721
Björnehed, E. (2004). Narco-Terrorism: The merger of the War on Drugs and the War on Terror. Global Crime, 6(3-4), 305–324. doi:10.1080/17440570500273440
Breinholt, J. (2004). How about a little perspective: The USA PATRIOT Act and the uses and abuses of history. Texas Review of Law & Politics, 9(1), 17–61.
Clarke, D. A. (2013, September). Making U.S. security and privacy rights compatible (Thesis). Monterey California. Naval Postgraduate School. Retrieved October 17, 2014 from https://calhoun.nps.edu/handle/10945/37603
Crenshaw, M. (2001). Counterterrorism policy and the political process. Studies in Conflict & Terrorism, 24(5), 329–337. doi:10.1080/105761001750434204
Davis, L. M. (2010). Long-term effects of law enforcement’s post-9/11 focus on counterterrorism and homeland security. Santa Monica, CA: RAND Corp. Retrieved September 22, 2014 from http://public.eblib.com/choice/publicfullrecord.aspx?p=669776
Levitt, M. (2004). Untangling the terror web: Identifying and counteracting the phenomenon of crossover between terrorist groups. The SAIS Review of International Affairs, 24(1), 33–48.
Longmire, S. M., & Longmire, J. P. (2008). Redefining terrorism: Why Mexican drug trafficking is more than just organized crime. Journal of Strategic Security, 1(1), 35–52. doi:http://dx.doi.org.southuniversity.libproxy.edmc.edu/10.5038/1944-04126.96.36.199
Morris, E. K. (2013). Think again: Mexican drug cartels. Foreign Policy, (203), 30–33,8.
Powers, R. G. (2004). A bomb with a long fuse. American History, 39(5), 42–47.
Texas Public Safety Threat Overview 2013. (2013). Texas Department of Public Safety. Retrieved January 15, 2015 from http://www.txdps.state.tx.us/director_staff/media_and_communications/threatOverview.pdf
Wilner, A. S. (2010). Targeted killings in Afghanistan: Measuring coercion and deterrence in counterterrorism and counterinsurgency. Studies in Conflict & Terrorism, 33(4), 307–329. doi:10.1080/10576100903582543
Zussman, A., Zussman, N., & Yisrael, B. (2005). Targeted killings: Evaluating the effectiveness of a counterterrorism policy. Banḳ Yiśraʼel, Maḥlaḳat ha-meḥḳar. Retrieved Retrieved January 24, 2015 from http://boi.gov.il/deptdata/mehkar/papers/dp0502e.pdf