Skip to main content

No Smoking Gun: Cyber Weapons and Drug Traffickers

  • Chapter
  • First Online:
  • 840 Accesses

Abstract

Drug trafficking is a criminal threat of billion-dollar proportions. Drug traffickers exercise international influence and Australian policymakers therefore need to reconsider the framework on which current policy rests. If the so-called war-on-drugs is couched in those terms, then it makes sense to explore a war-like approach—the use of information warfare to defeat drug traffickers’ information processes that are vital to supporting their worldwide financial networks as well as their command and control arrangements. This chapter promotes discussion about a drugs policy that focuses on attacking the source of the illicit drug problem using cyber weapons.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    First generation warfare was characterised by the Age-of-Napoleon; forces armed with guns operating in close-order formations to defeat cavalry and infantry who were armed with swords and bayonets. Second generation warfare was the age of firepower, managed in such a way that enabled an army to win through attrition. Third generation warfare saw the advent of decentralised attacks based on manoeuvrability and strategy. Fourth generation warfare is much more irregular. In the main, it comprises asymmetric operations that are characterized by mismatch between the combatants’ resources with an emphasis is on bypassing the stronger force by the weaker (Lind 2004).

  2. 2.

    An obscure area of the Internet that is distinguished by special search engine access, “password protect pages, unlinked websites and hidden content accessible only to those in the know” (Bartlett 2014: 3).

  3. 3.

    John T. Stark (1990: 6) in his study Selective Assassination as an Instrument of National Policy argues that interception is a refined tactic of unconventional warfare.

References

  • Australian Army (1993) The fundamentals of land warfare. Department of Defence, Canberra

    Google Scholar 

  • Australian Army (2002) The fundamentals of land warfare. Defence Publishing Service, Canberra

    Google Scholar 

  • Australian Crime Commission (2005) Illicit Drug Data Report, 2003–04. Commonwealth of Australia, Canberra

    Google Scholar 

  • Australian Criminal Intelligence Commission (2015) Illicit Drug Data Report, 2014–15. Commonwealth Government, Canberra

    Google Scholar 

  • Bartlett J (2014) The dark net: inside the digital underworld. William Heinemann, London

    Google Scholar 

  • Bevan D (1991) NCA to reveal Italian influence, Adelaide advertiser, 15 July

    Google Scholar 

  • Booth M (1996) Opium: a history. Simon and Schuster, Ltd., London

    Google Scholar 

  • Boyd N, Lowman J (1991) The politics of prostitution and drug control. In: Stenson K, Cowell D (eds) The politics of crime control. Sage Publications, London

    Google Scholar 

  • Colby W, Forbath P (1978) Honorable men: my life in the CIA. Hutchinson, London

    Google Scholar 

  • Cooper HHA (2009) Ethics and assassination. J Appl Sec Res 4(3):224–244

    Article  Google Scholar 

  • DeForest O, Chanoff D (1990) Slow burn: the rise and fall of American intelligence in Vietnam. Simon and Schuster, New York

    Google Scholar 

  • Dunnigan JF (1996) Digital soldiers: the evolution of high-tech weaponry and tomorrow’s battlefield. St. Martin’s Press, New York

    Google Scholar 

  • Fleetwood J (2014) Drug mules: women in the international cocaine trade. Palgrave Macmillan, London

    Book  Google Scholar 

  • Global Commission on Drug Policy (2011) War on drugs. Global Commission on Drug Policy, Geneva

    Google Scholar 

  • Helms R, with Hood W (2003) A look over my shoulder: a life in the central intelligence agency. Random House, New York

    Google Scholar 

  • Hughes DP (2018) Archer’s stakes in cyber space: methods to analyze force advantage. In: Prunckun H (ed) Cyber weaponry: issues and implications of digital arms. Dordrecht, Springer

    Google Scholar 

  • Jordan DC (1999) Dirty Money and Democracies. University of Oklahoma Press, Norman

    Google Scholar 

  • Katz SM (1990) Guards without frontiers: Israel’s war against terrorism. Arms and Armour, London

    Google Scholar 

  • Kerin J (2002) Vengeance will be swift, says Sharon, The Weekend Australian, 30 November–1 December

    Google Scholar 

  • Knox J, Gray DH (2014) The national and international threat of drug trafficking organizations. Glob Secur Stud 5(3)

    Google Scholar 

  • Library of Congress, Federal Research Division (2002) A global overview of narcotics-funded terrorist and other extremist groups. Federal Research Division, Washington, DC

    Google Scholar 

  • Lind WS (2004) Understanding fourth generation war. Mil Rev 84(5):15–17

    Google Scholar 

  • Malbry DJ (1994) The role of the military. In: Perl RF (ed) Drugs and foreign policy: a critical review. Westview Press, Boulder

    Google Scholar 

  • McCoy AW (1980) Drug traffic: narcotics and organized crime in Australia. Harper and Row, Sydney

    Google Scholar 

  • McCoy AW (1991) The politics of heroin. Lawrence Hill Books, Brooklyn

    Google Scholar 

  • Meinel C (2002) The happy hacker: a guide to (mostly) harmless computer hacking, 4th edn. American Eagle Publications, Inc., Sun City West

    Google Scholar 

  • Meinel C (2003) Uberhacker II: more ways to break into a computer. Loompanics Unlimited, Port Townsend

    Google Scholar 

  • Moore R (1969) The French connection: the world’s most crucial narcotics investigation. Little, Brown and Company, Boston

    Google Scholar 

  • Natarajan M, Zanella M, Yu C (2015) Classifying the variety of drug trafficking organizations. J Drug Issues 45(4):409

    Article  Google Scholar 

  • Naylor RT (2004) Hot money and the politics of debt, 3rd edn. McGill-Queen’s University Press, Montreal

    Google Scholar 

  • Oberweis T, Petrocelli M (2015) Drug enforcement administration. In: The encyclopedia of crime and punishment. Wiley, New York

    Google Scholar 

  • Pratt SF (2011) Crossing off the names: the logic of military assassination. J Small Wars Insurg 26(1):3–34

    Article  Google Scholar 

  • Prunckun H (2005) Information warfare: can the concept be applied to the war-on-drugs? Aust Def Force J 169:52–62

    Google Scholar 

  • Prunckun H (2007) Could the war-on-drugs be fought using intelligence-led cyber soldiers? J Aust Inst Prof Intell Off 15(1):2–13

    Google Scholar 

  • Prunckun H (2012) Assassination: targeted killing of terrorists. In: Shanty F (ed) Counterterrorism: from the cold war to the war on terror, vol 1. Praeger, Santa Barbara, pp 359–362

    Google Scholar 

  • Prunckun H (2015) How to undertake surveillance and reconnaissance. Pen & Sword Books, South Yorkshire

    Google Scholar 

  • Prunckun H (2016) The paradox of fiction and terrorism’s overshadowing of organised crime as a law enforcement target. Salus J 4(2):62–81

    Google Scholar 

  • Rand Corporation (1995) Information warfare: a two-edged sword. Rand Review 19:2. www.rand.org/publications/randreview/issues/RRR.fall95.cyber/infor_war.html. Accessed 10 Dec 2004

  • Rivers G (1985) The specialist: revelations of a counterterrorist. Stein and Day, Briarcliff Manor

    Google Scholar 

  • Rose-Ackerman S, Palifka B (2016) Corruption and government: causes, consequences, and reform. Cambridge University Press, New York

    Book  Google Scholar 

  • Stafford D (2000) Secret agent: the true story of the special operations executive. BBC Worldwide Ltd., London

    Google Scholar 

  • Stark JT (1990) Selective assassination as an instrument of National Policy. Loompanics Unlimited, Port Townsend

    Google Scholar 

  • Sun Tzu (1963) The art of war (trans: Griffith SB). Oxford and Clarendon Press, London

    Google Scholar 

  • United Nations (2016) World drug report, 2016. Office of Drugs and Crime, Vienna

    Book  Google Scholar 

  • United Nations, General Assembly Special Session (2016) Outcome document of the 2016 United Nations general assembly special session on the world drug problem: our joint commitment to effectively addressing and countering the world drug problem. United Nations Office on Drugs and Crime, New York

    Google Scholar 

  • United Nations Office on Drugs and Crime (2011) Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. United Nations, Vienna

    Google Scholar 

  • United States, Department of State (2016) International narcotic control strategy report, vol 1. Bureau for International Narcotic and Law Enforcement Affairs, Washington, DC

    Google Scholar 

  • United States, National Commission on Terrorist Attacks Upon the United States (2004) 9/11 commission report: final report of the national commission on terrorist attacks upon the United States. US Government Printing Office, Washington, DC

    Google Scholar 

  • UNODC (2016) World drug report, 2016. United Nations, New York

    Google Scholar 

  • Wardlaw G, McDowell D, Schmidt J (1991) Australia’s illegal drug problem: a strategic intelligence assessment. Attorney-General’s Department, Canberra

    Google Scholar 

  • Weatherburn D, Lind B (1999) Heroin harm minimisation: do we really have to choose between law enforcement and treatment? Crime and Justice Bulletin, Number 46, New South Wales Bureau of Crime Statistics and Research, Sydney

    Google Scholar 

  • Wigginton M, Jensen C, Vinson J, Graves M (2014) Kidnapping for ransom and social learning theory. Homel Sec Rev 8(2):179–194

    Google Scholar 

  • Wyler LS (2008) Weak and falling states: evolving security threats and US policy. Congressional Research Service, Washington, DC

    Google Scholar 

  • Zetter K (2015) Countdown to zero day: Stuxnet and the launch of the World’s first digital weapon. Broadway Books, New York

    Google Scholar 

Download references

Acknowledgements

The author thanks the editors of the Australian Defence Force Journal (Prunckun 2005) and the Journal of the Institute of Professional Intelligence Officers (Prunckun 2007) for permission to use his previously published material.

Principal Concepts

The principal concepts associated with this chapter are listed below. Demonstrate your understanding of each by writing a short definition or explanation in one or two sentences:

  • dark net;

  • drug-trafficking organizations;

  • fourth-generation warfare; and

  • war-on-drugs.

Study Questions

  1. 1.

    Explain why organized criminal enterprises, in general, are a threat to civil society, and specifically, why are those that deal in illicit drugs?

  2. 2.

    Explain why IT-based systems are important to drug-trafficking organizations’ illicit operations.

Learning Activity

Research the military term psyops and read about what it is and how it is used in warfare—both historically and in a contemporary setting. Then, using these examples as an ideas springboard, brainstorm parallel ideas that could be used in cyberspace; particularly, how disinformation could be used to undermine the confidence of drug traffickers’ personnel, partners, and/or third-party supporters in the legitimate world. List potential ethical implications of such a campaign and how, perhaps using legal advisors, you could keep the psycop within the restraints expected in law.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henry Prunckun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prunckun, H. (2018). No Smoking Gun: Cyber Weapons and Drug Traffickers. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74107-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74106-2

  • Online ISBN: 978-3-319-74107-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics