Advertisement

Cyber Weaponry pp 143-156 | Cite as

No Smoking Gun: Cyber Weapons and Drug Traffickers

  • Henry Prunckun
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

Drug trafficking is a criminal threat of billion-dollar proportions. Drug traffickers exercise international influence and Australian policymakers therefore need to reconsider the framework on which current policy rests. If the so-called war-on-drugs is couched in those terms, then it makes sense to explore a war-like approach—the use of information warfare to defeat drug traffickers’ information processes that are vital to supporting their worldwide financial networks as well as their command and control arrangements. This chapter promotes discussion about a drugs policy that focuses on attacking the source of the illicit drug problem using cyber weapons.

Keywords

Cyber weapons Drug trafficking Psyops Offensive weapons Organized crime 

Notes

Acknowledgements

The author thanks the editors of the Australian Defence Force Journal (Prunckun 2005) and the Journal of the Institute of Professional Intelligence Officers (Prunckun 2007) for permission to use his previously published material.

Principal Concepts

The principal concepts associated with this chapter are listed below. Demonstrate your understanding of each by writing a short definition or explanation in one or two sentences:
  • dark net;

  • drug-trafficking organizations;

  • fourth-generation warfare; and

  • war-on-drugs.

Study Questions

  1. 1.

    Explain why organized criminal enterprises, in general, are a threat to civil society, and specifically, why are those that deal in illicit drugs?

     
  2. 2.

    Explain why IT-based systems are important to drug-trafficking organizations’ illicit operations.

     

Learning Activity

Research the military term psyops and read about what it is and how it is used in warfare—both historically and in a contemporary setting. Then, using these examples as an ideas springboard, brainstorm parallel ideas that could be used in cyberspace; particularly, how disinformation could be used to undermine the confidence of drug traffickers’ personnel, partners, and/or third-party supporters in the legitimate world. List potential ethical implications of such a campaign and how, perhaps using legal advisors, you could keep the psycop within the restraints expected in law.

References

  1. Australian Army (1993) The fundamentals of land warfare. Department of Defence, CanberraGoogle Scholar
  2. Australian Army (2002) The fundamentals of land warfare. Defence Publishing Service, CanberraGoogle Scholar
  3. Australian Crime Commission (2005) Illicit Drug Data Report, 2003–04. Commonwealth of Australia, CanberraGoogle Scholar
  4. Australian Criminal Intelligence Commission (2015) Illicit Drug Data Report, 2014–15. Commonwealth Government, CanberraGoogle Scholar
  5. Bartlett J (2014) The dark net: inside the digital underworld. William Heinemann, LondonGoogle Scholar
  6. Bevan D (1991) NCA to reveal Italian influence, Adelaide advertiser, 15 JulyGoogle Scholar
  7. Booth M (1996) Opium: a history. Simon and Schuster, Ltd., LondonGoogle Scholar
  8. Boyd N, Lowman J (1991) The politics of prostitution and drug control. In: Stenson K, Cowell D (eds) The politics of crime control. Sage Publications, LondonGoogle Scholar
  9. Colby W, Forbath P (1978) Honorable men: my life in the CIA. Hutchinson, LondonGoogle Scholar
  10. Cooper HHA (2009) Ethics and assassination. J Appl Sec Res 4(3):224–244CrossRefGoogle Scholar
  11. DeForest O, Chanoff D (1990) Slow burn: the rise and fall of American intelligence in Vietnam. Simon and Schuster, New YorkGoogle Scholar
  12. Dunnigan JF (1996) Digital soldiers: the evolution of high-tech weaponry and tomorrow’s battlefield. St. Martin’s Press, New YorkGoogle Scholar
  13. Fleetwood J (2014) Drug mules: women in the international cocaine trade. Palgrave Macmillan, LondonCrossRefGoogle Scholar
  14. Global Commission on Drug Policy (2011) War on drugs. Global Commission on Drug Policy, GenevaGoogle Scholar
  15. Helms R, with Hood W (2003) A look over my shoulder: a life in the central intelligence agency. Random House, New YorkGoogle Scholar
  16. Hughes DP (2018) Archer’s stakes in cyber space: methods to analyze force advantage. In: Prunckun H (ed) Cyber weaponry: issues and implications of digital arms. Dordrecht, SpringerGoogle Scholar
  17. Jordan DC (1999) Dirty Money and Democracies. University of Oklahoma Press, NormanGoogle Scholar
  18. Katz SM (1990) Guards without frontiers: Israel’s war against terrorism. Arms and Armour, LondonGoogle Scholar
  19. Kerin J (2002) Vengeance will be swift, says Sharon, The Weekend Australian, 30 November–1 DecemberGoogle Scholar
  20. Knox J, Gray DH (2014) The national and international threat of drug trafficking organizations. Glob Secur Stud 5(3)Google Scholar
  21. Library of Congress, Federal Research Division (2002) A global overview of narcotics-funded terrorist and other extremist groups. Federal Research Division, Washington, DCGoogle Scholar
  22. Lind WS (2004) Understanding fourth generation war. Mil Rev 84(5):15–17Google Scholar
  23. Malbry DJ (1994) The role of the military. In: Perl RF (ed) Drugs and foreign policy: a critical review. Westview Press, BoulderGoogle Scholar
  24. McCoy AW (1980) Drug traffic: narcotics and organized crime in Australia. Harper and Row, SydneyGoogle Scholar
  25. McCoy AW (1991) The politics of heroin. Lawrence Hill Books, BrooklynGoogle Scholar
  26. Meinel C (2002) The happy hacker: a guide to (mostly) harmless computer hacking, 4th edn. American Eagle Publications, Inc., Sun City WestGoogle Scholar
  27. Meinel C (2003) Uberhacker II: more ways to break into a computer. Loompanics Unlimited, Port TownsendGoogle Scholar
  28. Moore R (1969) The French connection: the world’s most crucial narcotics investigation. Little, Brown and Company, BostonGoogle Scholar
  29. Natarajan M, Zanella M, Yu C (2015) Classifying the variety of drug trafficking organizations. J Drug Issues 45(4):409CrossRefGoogle Scholar
  30. Naylor RT (2004) Hot money and the politics of debt, 3rd edn. McGill-Queen’s University Press, MontrealGoogle Scholar
  31. Oberweis T, Petrocelli M (2015) Drug enforcement administration. In: The encyclopedia of crime and punishment. Wiley, New YorkGoogle Scholar
  32. Pratt SF (2011) Crossing off the names: the logic of military assassination. J Small Wars Insurg 26(1):3–34CrossRefGoogle Scholar
  33. Prunckun H (2005) Information warfare: can the concept be applied to the war-on-drugs? Aust Def Force J 169:52–62Google Scholar
  34. Prunckun H (2007) Could the war-on-drugs be fought using intelligence-led cyber soldiers? J Aust Inst Prof Intell Off 15(1):2–13Google Scholar
  35. Prunckun H (2012) Assassination: targeted killing of terrorists. In: Shanty F (ed) Counterterrorism: from the cold war to the war on terror, vol 1. Praeger, Santa Barbara, pp 359–362Google Scholar
  36. Prunckun H (2015) How to undertake surveillance and reconnaissance. Pen & Sword Books, South YorkshireGoogle Scholar
  37. Prunckun H (2016) The paradox of fiction and terrorism’s overshadowing of organised crime as a law enforcement target. Salus J 4(2):62–81Google Scholar
  38. Rand Corporation (1995) Information warfare: a two-edged sword. Rand Review 19:2. www.rand.org/publications/randreview/issues/RRR.fall95.cyber/infor_war.html. Accessed 10 Dec 2004
  39. Rivers G (1985) The specialist: revelations of a counterterrorist. Stein and Day, Briarcliff ManorGoogle Scholar
  40. Rose-Ackerman S, Palifka B (2016) Corruption and government: causes, consequences, and reform. Cambridge University Press, New YorkCrossRefGoogle Scholar
  41. Stafford D (2000) Secret agent: the true story of the special operations executive. BBC Worldwide Ltd., LondonGoogle Scholar
  42. Stark JT (1990) Selective assassination as an instrument of National Policy. Loompanics Unlimited, Port TownsendGoogle Scholar
  43. Sun Tzu (1963) The art of war (trans: Griffith SB). Oxford and Clarendon Press, LondonGoogle Scholar
  44. United Nations (2016) World drug report, 2016. Office of Drugs and Crime, ViennaCrossRefGoogle Scholar
  45. United Nations, General Assembly Special Session (2016) Outcome document of the 2016 United Nations general assembly special session on the world drug problem: our joint commitment to effectively addressing and countering the world drug problem. United Nations Office on Drugs and Crime, New YorkGoogle Scholar
  46. United Nations Office on Drugs and Crime (2011) Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes. United Nations, ViennaGoogle Scholar
  47. United States, Department of State (2016) International narcotic control strategy report, vol 1. Bureau for International Narcotic and Law Enforcement Affairs, Washington, DCGoogle Scholar
  48. United States, National Commission on Terrorist Attacks Upon the United States (2004) 9/11 commission report: final report of the national commission on terrorist attacks upon the United States. US Government Printing Office, Washington, DCGoogle Scholar
  49. UNODC (2016) World drug report, 2016. United Nations, New YorkGoogle Scholar
  50. Wardlaw G, McDowell D, Schmidt J (1991) Australia’s illegal drug problem: a strategic intelligence assessment. Attorney-General’s Department, CanberraGoogle Scholar
  51. Weatherburn D, Lind B (1999) Heroin harm minimisation: do we really have to choose between law enforcement and treatment? Crime and Justice Bulletin, Number 46, New South Wales Bureau of Crime Statistics and Research, SydneyGoogle Scholar
  52. Wigginton M, Jensen C, Vinson J, Graves M (2014) Kidnapping for ransom and social learning theory. Homel Sec Rev 8(2):179–194Google Scholar
  53. Wyler LS (2008) Weak and falling states: evolving security threats and US policy. Congressional Research Service, Washington, DCGoogle Scholar
  54. Zetter K (2015) Countdown to zero day: Stuxnet and the launch of the World’s first digital weapon. Broadway Books, New YorkGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Australian Graduate School of Policing and SecurityCharles Sturt UniversitySydneyAustralia

Personalised recommendations