Abstract
Drug trafficking is a criminal threat of billion-dollar proportions. Drug traffickers exercise international influence and Australian policymakers therefore need to reconsider the framework on which current policy rests. If the so-called war-on-drugs is couched in those terms, then it makes sense to explore a war-like approach—the use of information warfare to defeat drug traffickers’ information processes that are vital to supporting their worldwide financial networks as well as their command and control arrangements. This chapter promotes discussion about a drugs policy that focuses on attacking the source of the illicit drug problem using cyber weapons.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
First generation warfare was characterised by the Age-of-Napoleon; forces armed with guns operating in close-order formations to defeat cavalry and infantry who were armed with swords and bayonets. Second generation warfare was the age of firepower, managed in such a way that enabled an army to win through attrition. Third generation warfare saw the advent of decentralised attacks based on manoeuvrability and strategy. Fourth generation warfare is much more irregular. In the main, it comprises asymmetric operations that are characterized by mismatch between the combatants’ resources with an emphasis is on bypassing the stronger force by the weaker (Lind 2004).
- 2.
An obscure area of the Internet that is distinguished by special search engine access, “password protect pages, unlinked websites and hidden content accessible only to those in the know” (Bartlett 2014: 3).
- 3.
John T. Stark (1990: 6) in his study Selective Assassination as an Instrument of National Policy argues that interception is a refined tactic of unconventional warfare.
References
Australian Army (1993) The fundamentals of land warfare. Department of Defence, Canberra
Australian Army (2002) The fundamentals of land warfare. Defence Publishing Service, Canberra
Australian Crime Commission (2005) Illicit Drug Data Report, 2003–04. Commonwealth of Australia, Canberra
Australian Criminal Intelligence Commission (2015) Illicit Drug Data Report, 2014–15. Commonwealth Government, Canberra
Bartlett J (2014) The dark net: inside the digital underworld. William Heinemann, London
Bevan D (1991) NCA to reveal Italian influence, Adelaide advertiser, 15 July
Booth M (1996) Opium: a history. Simon and Schuster, Ltd., London
Boyd N, Lowman J (1991) The politics of prostitution and drug control. In: Stenson K, Cowell D (eds) The politics of crime control. Sage Publications, London
Colby W, Forbath P (1978) Honorable men: my life in the CIA. Hutchinson, London
Cooper HHA (2009) Ethics and assassination. J Appl Sec Res 4(3):224–244
DeForest O, Chanoff D (1990) Slow burn: the rise and fall of American intelligence in Vietnam. Simon and Schuster, New York
Dunnigan JF (1996) Digital soldiers: the evolution of high-tech weaponry and tomorrow’s battlefield. St. Martin’s Press, New York
Fleetwood J (2014) Drug mules: women in the international cocaine trade. Palgrave Macmillan, London
Global Commission on Drug Policy (2011) War on drugs. Global Commission on Drug Policy, Geneva
Helms R, with Hood W (2003) A look over my shoulder: a life in the central intelligence agency. Random House, New York
Hughes DP (2018) Archer’s stakes in cyber space: methods to analyze force advantage. In: Prunckun H (ed) Cyber weaponry: issues and implications of digital arms. Dordrecht, Springer
Jordan DC (1999) Dirty Money and Democracies. University of Oklahoma Press, Norman
Katz SM (1990) Guards without frontiers: Israel’s war against terrorism. Arms and Armour, London
Kerin J (2002) Vengeance will be swift, says Sharon, The Weekend Australian, 30 November–1 December
Knox J, Gray DH (2014) The national and international threat of drug trafficking organizations. Glob Secur Stud 5(3)
Library of Congress, Federal Research Division (2002) A global overview of narcotics-funded terrorist and other extremist groups. Federal Research Division, Washington, DC
Lind WS (2004) Understanding fourth generation war. Mil Rev 84(5):15–17
Malbry DJ (1994) The role of the military. In: Perl RF (ed) Drugs and foreign policy: a critical review. Westview Press, Boulder
McCoy AW (1980) Drug traffic: narcotics and organized crime in Australia. Harper and Row, Sydney
McCoy AW (1991) The politics of heroin. Lawrence Hill Books, Brooklyn
Meinel C (2002) The happy hacker: a guide to (mostly) harmless computer hacking, 4th edn. American Eagle Publications, Inc., Sun City West
Meinel C (2003) Uberhacker II: more ways to break into a computer. Loompanics Unlimited, Port Townsend
Moore R (1969) The French connection: the world’s most crucial narcotics investigation. Little, Brown and Company, Boston
Natarajan M, Zanella M, Yu C (2015) Classifying the variety of drug trafficking organizations. J Drug Issues 45(4):409
Naylor RT (2004) Hot money and the politics of debt, 3rd edn. McGill-Queen’s University Press, Montreal
Oberweis T, Petrocelli M (2015) Drug enforcement administration. In: The encyclopedia of crime and punishment. Wiley, New York
Pratt SF (2011) Crossing off the names: the logic of military assassination. J Small Wars Insurg 26(1):3–34
Prunckun H (2005) Information warfare: can the concept be applied to the war-on-drugs? Aust Def Force J 169:52–62
Prunckun H (2007) Could the war-on-drugs be fought using intelligence-led cyber soldiers? J Aust Inst Prof Intell Off 15(1):2–13
Prunckun H (2012) Assassination: targeted killing of terrorists. In: Shanty F (ed) Counterterrorism: from the cold war to the war on terror, vol 1. Praeger, Santa Barbara, pp 359–362
Prunckun H (2015) How to undertake surveillance and reconnaissance. Pen & Sword Books, South Yorkshire
Prunckun H (2016) The paradox of fiction and terrorism’s overshadowing of organised crime as a law enforcement target. Salus J 4(2):62–81
Rand Corporation (1995) Information warfare: a two-edged sword. Rand Review 19:2. www.rand.org/publications/randreview/issues/RRR.fall95.cyber/infor_war.html. Accessed 10 Dec 2004
Rivers G (1985) The specialist: revelations of a counterterrorist. Stein and Day, Briarcliff Manor
Rose-Ackerman S, Palifka B (2016) Corruption and government: causes, consequences, and reform. Cambridge University Press, New York
Stafford D (2000) Secret agent: the true story of the special operations executive. BBC Worldwide Ltd., London
Stark JT (1990) Selective assassination as an instrument of National Policy. Loompanics Unlimited, Port Townsend
Sun Tzu (1963) The art of war (trans: Griffith SB). Oxford and Clarendon Press, London
United Nations (2016) World drug report, 2016. Office of Drugs and Crime, Vienna
United Nations, General Assembly Special Session (2016) Outcome document of the 2016 United Nations general assembly special session on the world drug problem: our joint commitment to effectively addressing and countering the world drug problem. United Nations Office on Drugs and Crime, New York
United Nations Office on Drugs and Crime (2011) Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. United Nations, Vienna
United States, Department of State (2016) International narcotic control strategy report, vol 1. Bureau for International Narcotic and Law Enforcement Affairs, Washington, DC
United States, National Commission on Terrorist Attacks Upon the United States (2004) 9/11 commission report: final report of the national commission on terrorist attacks upon the United States. US Government Printing Office, Washington, DC
UNODC (2016) World drug report, 2016. United Nations, New York
Wardlaw G, McDowell D, Schmidt J (1991) Australia’s illegal drug problem: a strategic intelligence assessment. Attorney-General’s Department, Canberra
Weatherburn D, Lind B (1999) Heroin harm minimisation: do we really have to choose between law enforcement and treatment? Crime and Justice Bulletin, Number 46, New South Wales Bureau of Crime Statistics and Research, Sydney
Wigginton M, Jensen C, Vinson J, Graves M (2014) Kidnapping for ransom and social learning theory. Homel Sec Rev 8(2):179–194
Wyler LS (2008) Weak and falling states: evolving security threats and US policy. Congressional Research Service, Washington, DC
Zetter K (2015) Countdown to zero day: Stuxnet and the launch of the World’s first digital weapon. Broadway Books, New York
Acknowledgements
The author thanks the editors of the Australian Defence Force Journal (Prunckun 2005) and the Journal of the Institute of Professional Intelligence Officers (Prunckun 2007) for permission to use his previously published material.
Principal Concepts
The principal concepts associated with this chapter are listed below. Demonstrate your understanding of each by writing a short definition or explanation in one or two sentences:
-
dark net;
-
drug-trafficking organizations;
-
fourth-generation warfare; and
-
war-on-drugs.
Study Questions
-
1.
Explain why organized criminal enterprises, in general, are a threat to civil society, and specifically, why are those that deal in illicit drugs?
-
2.
Explain why IT-based systems are important to drug-trafficking organizations’ illicit operations.
Learning Activity
Research the military term psyops and read about what it is and how it is used in warfare—both historically and in a contemporary setting. Then, using these examples as an ideas springboard, brainstorm parallel ideas that could be used in cyberspace; particularly, how disinformation could be used to undermine the confidence of drug traffickers’ personnel, partners, and/or third-party supporters in the legitimate world. List potential ethical implications of such a campaign and how, perhaps using legal advisors, you could keep the psycop within the restraints expected in law.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Prunckun, H. (2018). No Smoking Gun: Cyber Weapons and Drug Traffickers. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-74107-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74106-2
Online ISBN: 978-3-319-74107-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)