Lexington Books
Pages: 228
Trim: 6¼ x 9¼
978-0-7391-8043-3 • Hardback • January 2015 • $133.00 • (£102.00)
978-1-4985-0991-6 • Paperback • November 2016 • $57.99 • (£45.00)
978-0-7391-8044-0 • eBook • January 2015 • $55.00 • (£42.00)
David M. Blum is an operations research analyst for the U.S. Air Force serving as a civilian member of the Air Staff. He received his PhD in management science and engineering from Stanford University.
J. Edward Conway is a senior manager for a multinational advisory firm, where he focuses on corporate intelligence. A former analyst for the U.S. Department of Defense, he received his PhD in international relations from the University of St Andrews in Scotland.
Foreword David D. McKiernan, General (Retired), U.S. Army
Chapter One: Introduction: The Threat Finance Cell J. Edward Conway
Chapter Two: Intelligence Analysis: An Operator’s Perspective Colonel Clayton O. Sheffield, U.S. Army
Chapter Three: Where Counterinsurgency Meets Counter Threat Finance Brian A. Gordon
Chapter Four: From People to Processes: Collecting Intelligence That Matters David M. Blum & Brian A. Gordon
Chapter Five: Al-Qa’ida in Iraq’s Financial Ledgers Benjamin Bahney and Howard J. Shatz
Chapter Six: Cost Accounting: Auditing the Taliban in Helmand Province, Afghanistan Brian A. Gordon and J. Edward Conway
Chapter Seven: Using Financial Data to Analyze Terrorist Motivations: The Case of Al-Qa’ida in Iraq’s Payrolls Benjamin Bahney and Howard J. Shatz
Chapter Eight: Social Network Analysis: Understanding Threat Financial Networks David M. Blum and Brian A. Gordon
Chapter Nine: Scenario Planning: The “Master” of Spin Boldak and The Chaman Border Crossing David Blum and J. Edward Conway
Chapter Ten: Decision Analysis: Rank-Ordering Members of the Insurgent Group As’aib Ahl al-Haqq J. Edward Conway
Chapter Eleven: Designing Courses of Action: From Problem-setting to Problem-solving J. Edward Conway
Chapter Twelve: Conclusion J. Edward Conway and David Blum
In one of the few books on the subject, Counterterrorism and Threat Finance Analysis during Wartime, J. Edward Conway argues that it is a mistake to think that the imperative to deploy civilian analysts to combat zones is fast diminishing. . . .[This book] is an excellent addition to the already existing literature on the subject. The hands-on experience and knowledge of the editors makes it a must-read for all experts and students of terrorism-related subjects. It should be a required reading for all counter threat finance analysts.
— The Washington Book Review
The threat finance discipline required a consolidated primer for those new to the field, and now it exists. This book is engaging and the contributing authors’ experiences as forward deployed threat finance analysts, clearly helped them develop and refine the methodologies outlined in these chapters. The next generation of threat finance analysts won’t have to learn through trial and error, but now have proven techniques to accelerate their effectiveness in supporting our country’s efforts to identify and disrupt the financial networks that are the lifeblood of every terrorist organization. Moreover, the methodologies in this book can be ‘dual use weapons’ in the fight to defend the country and protect the financial system. They are not only relevant to the military and intelligence communities, but can be applied to the field of private sector compliance as well.
— Kirk E. Meyer, Founding Director, Afghanistan Threat Finance Cell
This much-needed volume captures and clearly explains the lessons learned from a decade's worth of threat finance activity. Each of the authors were, or still are, battlefield practitioners in this discipline, and now have made an academic contribution to match their achievements in the field. This work lays the intellectual foundations for tactics, techniques, policies, and doctrine for future threat finance activities—it is a must read for anyone in the business.
— Steven Kiser, former DoD co-lead, Iraq Threat Finance Cell
Much has been written about the ‘war of ideas’ in counterterrorism, but this book considers the problem as a war of resources. By focusing on threat finance analysis, it provides an important primer for intelligence scholars and practitioners. Detailed case studies also fill an important gap for current strategists and future historians of the wars in Iraq and Afghanistan.
— Joshua Rovner, Director, Security and Strategy Program, Southern Methodist University