Terrorist Use of Smuggling Tunnels
DOI:
https://doi.org/10.6000/1929-4409.2013.02.21Keywords:
Smuggling, tunnels, terrorism, operation pillar of cloud, operation pillar of defense, operation stones of shale, operation shale stonesAbstract
This article examines terrorists’ use of smuggling tunnels to finance terrorism and/or launch terrorist operations. Israel’s Operation Pillar of Cloud and Hamas’ Operation Stones of Shale are used to illustrate both the physical structure of smuggling tunnels and social networks of the people who build and use smuggling tunnels. The sociological factors of terrorists and criminals engaged in smuggling in the same country, such as the Gaza Strip and Egypt during peaceful times and the Gaza Strip and Israel during a state of war, is examined. The article proposes the application of open-source social-network models applicable to regional and transnational tunnel analysis during times of peace and war, employing intelligence from law enforcement and national security sources to improve border security.
References
Akano, O. (1986). The Effect of Smuggling on the Protection of Industries in Nigeria. Ibadan, Niser: Nigerian Institute of Social and Economic Research.
Akram, F. & Kirkpatrick, D.D. (2013). To block Gaza tunnels, Egypt lets sewage flow. The New York Times. Retrieved from http://www.nytimes.com/2013/02/21/world/middleeast/egypts-floods-smuggling-tunnels-to-gaza-with-sewage.html
Al Qaeda eyes bio attack from Mexico. (2009). The Washington Times. Retrieved from http://www.washingtontimes.com/ news/2009/jun/03/al-qaeda-eyes-bio-attack-via-mexico-border/ 9
Alster, P. (2013). The truth about Hamas' smuggling tunnels, IPT News, TribunePublié. Retrieved from http://www.crif.org/fr/ tribune/truth-about-hamas-smuggling-tunnels/35395
Attorneys General Reno and Madrazo sign letter to enhance cooperation. (1998 July 2). U.S. Department of Justice Press Release #312: 07-02-98. Retrieved from: http://www.justice.gov/opa/pr/1998/July/312ag.html
Beittel, J.S. (2013). Mexico’s drug trafficking organizations: Source and scope of the violence. United States Congressional Research Service. 7-5700, R41576. Retrieved from: www.crs.gov
Billingslea, W. (2004). Illicit cigarette trafficking and the funding of terrorism. Police Chief, 70(2), 49-54. NCJ 205099.
Caldwell, D., Ehlen, J.,& Harmon, R. (2004). Studies in Military Geography and Geology New York: Kluwer Academic. http://dx.doi.org/10.1007/978-1-4020-3105-2 DOI: https://doi.org/10.1007/978-1-4020-3105-2
Carrington, P. J., Scott, J., & Wasseman, S. (2005). Models and Methods in Social Network Analysis. Cambridge University Press. http://dx.doi.org/10.1017/CBO9780511811395 DOI: https://doi.org/10.1017/CBO9780511811395
Chumley, C.K. (2013). France agrees to list Hezbollah as terrorist group. The Washington Times. Retrieved from http://www.washingtontimes.com/news/2013/mar/29/france-agrees-list-hezbollah-terrorist-group/
Coles, N. (2001). It’s not what you know-it’s who you know that counts: Analyzing serious crime groups as social networks. British Journal of Criminology, 41, pp.580 to 594. http://dx.doi.org/10.1093/bjc/41.4.580 DOI: https://doi.org/10.1093/bjc/41.4.580
Dayan, Y. (2012). Analysis: IDF aware Operation Pillar of Defense in Gaza not a long-term solution to Palestinian rocker fire on south. Ynetnews. Retrieved from http://www.ynetnews.com/ articles/0,7340,L-4312017,00.html
Egypt moves to seal off Gaza smuggling tunnels. (2012). The Jerusalem Post. Retrieved from http://www.jpost.com/Middle East/Article.aspx?id=280388/
Exum, A. (2006). Hizballah at war: A military assessment. The Washington Institute for Near East Policy, Policy Focus #63. Retrieved from http://www.lebanonwire.com/0701MLN/ Hezbollah_at_war.pdf
Farquhar, S.C. (2011). Back to basics: A study of the second Lebanon war and operation CAST LEAD. Fort Leavenworth, KS: Combat Studies Institute Press.
Gaza tunnels being quickly rebuilt after Israel claimed to have successfully targeted smuggling network. (2012). CBSNews. Retrieved from http://www.cbsnews.com/8301-202_162-57558663/gaza-tunnels-being-quickly-rebuilt-after-israel-claimed-to-have-successfully-targeted-smuggling-network.html/
Gazans move quickly to rebuild bombed tunnels to bring in food, weapons. (2012). NBC News. Retrieved from http://worldnews.nbcnews.com/_news/2012/11/26/15454998-gazans-move-quickly-to-rebuild-bombed-tunnels-to-bring-in-food-weapons/lite
Grillo, I. (2009). Autumn of the Capo: The diary of a drug lord. Time Online. Retrieved from: www.time.com/time/world/article/ 0,8599,1899404,00.html
Hamas gunmen execute six ‘Israeli spies’ as Netanyahu hints at cease-fire. (2012). National Post. Retrieved from http://news.ntionalpost.com/2012/11/20/hamas-gunmen-execute-six-israeli-spies-on-busy-gaza-street-corner/
Heisman, M. and Snijders, T. (2003). Statistical analysis of longitudinal network data with changing composition. Sociological Methods and Research, 32: 253-87. http://dx.doi.org/10.1177/0049124103256096 DOI: https://doi.org/10.1177/0049124103256096
Ilan, S. & Haaretz Correspondent. (2008). In symbolic vote, Knesset okays MP’s post-Winograd speech. Haaertz. Retrieved from: http://www.haaretz.com/hasen/spages/951073.html.)
Israel: Rockets fired from Gaza Strip. (2013). Retrieved from Stratfor Global Intelligence website at http://www.stratfor.com/ analysis/update-israel-gaza-conflict
Israel’s military says explosive-filled tunnel explodes near soldiers on Israel-Gaza border. (2012). Fox News. Retrieved from http://www.foxnews.com/world/2012/11/08/israel-military-says-explosive-filled-tunnel-explodes-near-soldiers-on-israel/#ixzz2MQb34RqY
Kalman, M. (2012). Hamas victim dragged through streets of Gaza City. New York Daily News. Retrieved from http://www.nydailynews.com/.../hamas-victim-dragged-streets-collaborator-widow-article-1.1208004/
Karthika, S. & Bose, S. (2011a). Analyzing various social networking approaches for covert networks. Trends in Network and Communications, Communications in Computer and Information Science, 197, 558-566. http://dx.doi.org/10.1007/978-3-642-22543-7_57 DOI: https://doi.org/10.1007/978-3-642-22543-7_57
Karthika, S. & Bose, S. (2011b). A comparative study of social networking approaches in identifying the covert nodes. International Journal on Web Services Computing (IJWSC), 2, 65-78. http://dx.doi.org/10.5121/ijwsc.2011.2306 DOI: https://doi.org/10.5121/ijwsc.2011.2306
Katz, Y. & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C.: Potomac Books.
Kempster, N. (1998). U.S., Mexico Vow Better Communication Diplomacy: In wake of furor over Operation Casablanca, nations pledge to inform each other about sensitive activities. Los Angeles Times Online. Retrieved from: http://articles.latimes.com/1998/jul/03/news/mn-477
Killebrew, R. (2011). Not just about Mexico; not just about drugs. In The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico. Proceedings of the Joint Policy and Research Forum, A Joint CSL-HSPI Study, Retrieved from http://www.csl.army.mil/usacsl/publications/HybridThreatMonographInternetVersion.pdf
Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24, 43-52.
Lichtenwald, T.G. (2003). Drug smuggling behavior: A developmental smuggling model (Part 1). Forensic Examiner. National Criminal Justice Reference #NCJ209084 http://www.all-about-psychology.com/support-files/drug_smuggling_part_1. pdf
Lichtenwald, T.G. (2004). Drug smuggling behavior: A developmental smuggling model (Part 2). Forensic Examiner, National Criminal Justice Reference Service #NCJ209085. http://www.all-about-psychology.com/support-files/drug_smuggling_part_2.pdf
Lichtenwald, T.G., Perri, F.S., & MacKenzie, P.M. (2009). Smuggling multi-consignment contraband: Isolated incidence or a new trend? Inside Homeland Security, 7(2), NCJ # 227306 http://www.all-about-forensic-science.com/support-files/smuggling.pdf
Lichtenwald, T.G. & Perri, F. S. (2011). Smuggling tunnels: The need for a transnational analysis. Inside Homeland Security, 9(1), NCJ Number 23418. http://www.all-about-forensic-science.com/support-files/tunnels.pdf
Lintner, B. (2009). ‘Tunnels, guns and Kimchi: North Korea’s quest for dollars – Part I’. Yale Global. Retrieved from http://yaleglobal.yale.edu/content/NK-quest-for-dollars-part1
Mam, A. E., Kinney, J. B.,& Pollard, N.R. (2008). Social network and distance correlates of criminal associates involved in illicit drug production. Security Journal, 21, 77-94. http://dx.doi.org/10.1057/palgrave.sj.8350069 DOI: https://doi.org/10.1057/palgrave.sj.8350069
Marosi, R. (2011). Controversial Muslim cleric is arrested while sneaking into the U.S. Los Angeles Times. Retrieved from: http://articles.latimes.com/2011/jan/27/local/la-me-border-cleric-20110127
McGloin, J. M. & Kirk, D. S. (2010). An overview of social network analysis. Journal of Criminal Justice Education, 2, 169-181. http://dx.doi.org/10.1080/10511251003693694 DOI: https://doi.org/10.1080/10511251003693694
Mexico: Open access to U.S. security agencies ends. (2013). Retrieved from Stratfor Global Intelligence website at http://www.statfor.com/situation-report/mexico-open-acess-us-security-agencies-ends
Mexico security memo: Prevalent propaganda and promises to fight crime (2013 March 27). Retrieved from Stratford Global Intelligence website at http://www.stratfor.com/topics/ terrorism-and-security/tracking-mexicos-drug-cartels
Mexican and Canadian Drug Tunnels. (2010). Retrieved from http://www.terroristplanet.com/2010/02/mexican-and-canadian-drug-tunnels/
Miller, G. (2010). CIA acts on fear of al-Qaeda plot to hit in Europe. Washington Post. Retrieved from:http://www.washingtonpost. com/wpdyn/content/article/2010/09/28/AR2010092806935_pf.html
Mohamad Youssef Hammoud sentenced to 30 years in terrorism financing case. (2011). Retrieved from http://www.ice.gov/ news/releases/1101/110127charlotte.htm
Mora, E. (2010). Justice Department reports 60 percent increase in number of drug smuggling tunnels at U.S.-Mexican border. Retrieved from: http://www.cnsnews.com/node/64442
Morsell, C. (2009). Inside criminal networks, studies of organized crime. Springer Social Sciences-Criminology and Criminal Justice, 8, ISBN 978-0-387-09526-4.
Morin, M. (2007). Afghan tunnels prove tough to crack. Stars and Stripes. Retrieved from: http://www.afghanistannewscenter. com/news/2007/july/jul192007.html
Norton-Taylor, R. & Bowcot, O. (2010). Mumbai-style' terror attack on UK, France and Germany foiled, Drone attacks intercept militants based in Pakistan Western intelligence agencies confirm plot fears. Retrieved from http://www.guardian.co.uk/ world/2010/sep/29/terror-attack-plot-europe-foiled
Oladeji, K. (2010). Psychosocial Predictors of Smuggling Behaviour among Suspected Smugglers in Selected Border Areas in Nigeria. MMP Thesis, Unpublished. Ibadan: University of Ibadan.
Oladeji, M.O. (2010). Perception of smuggling among the Yoruba people of Oke-Ogun of South Western Nigeria. Internet Journal of Criminology, 1-13.
Olapegba, P.O. & Idemudia, E.S. (2012). Dispositional and contextual factors predicting smuggling behaviour among smugglers in border areas in Nigeria. Journal of Psychology, 3(2): 59-64. Retrieved from http://www.krepublishers.com/02-Journals/JP/JP-03-0-000-12-Web/JP-03-2-000-12-Abst-PDF/JP-03-2-059-12-086-Olapegba-P-O/JP-03-2-059-12-086-Olapegba-P-O-Tt.pdf DOI: https://doi.org/10.1080/09764224.2012.11885478
Perri, F.S., Lichtenwald, T.G., & MacKenzie, P.M. (2009). Evil Twins: The Crime-Terror Nexus, Forensic Examiner, 18(4), 16-29. http://www.all-about-psychology.com/support-files/crime-terror-nexus.pdf
Qin, J., Xu, J.J., Hu, D., Sageman, M., & Chen, H. (2005). Analyzing terrorist networks: A case study of the Global Salafi Jihad network. IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings. DOI: https://doi.org/10.1007/11427995_24
Pantucci, R. (2013). France confronts terror threat in Africa, risks attack at home. RUSI Royal United Services Institute Analysis. Retrieved from http://www.rusi.org/analysis/ commentary/ref:C50F7C5DB4E4D6/
Papachristos, A. V. (2011). The coming of a networked criminology. In J. MacDonald (ED.), Measuring crime and criminality (pp. 101-140). New Brunswick, N.J.: Transaction Publishers. DOI: https://doi.org/10.4324/9780203785997-5
Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2. Retrieved from http://www.hsaj.org
Roggio, W. & Lundquist, L. (2010). European terror plot begins to unravel. Retrieved from: http://www.longwarjournal.org/ archives/2010/09/european_terror_plot.php#ixzz2P9u72zHe
Rudoren, J. & Akram, F. (2012). Suspected collaborator with Israel killed on Gaza street. The New York Times. Retrieved from http://nytimes.com/2012/11/17/world/middleeast/suspect-collaborator-with-israel-executed-in-gaz.html
Russell, G. (2001). Mexico slowdown on the border. Time Magazine Online. Retrieved from: http://www.time.com/time/magazine/ article/0,9171,141219,00.html
Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press DOI: https://doi.org/10.9783/9780812206791
Schiff, Z. (2006). Kidnap soldiers in July was Hezbollah’s fifth attempt Israel told diplomats after learning of previous plans it would respond with military operations to kidnap attempts. Retrieved from: http://www.haaretz.com/news/kidnap-of-soldiers-in-july-was-hezbollah-s-fifth-attempt-1.197595
Shelley, L, (n.d.). The nexus of organized international criminals and terrorism. Retrieved from: http://pagespersoorange.fr/ societe.internationalede.criminologie/pdf/Intervention%20Shelley.pdf.
Shelley, J., Picarelli, A.I., Hart, D.M., Craig-Hart, P.A., Williams, P., Simon, S., & Covill, L. (2005). Methods and motives: Exploring links between transnational organized crime and international terrorism. Retrieved from http://www.ncjrs.gov/ pdffiles1/nij/grants/211207.pdf - DOI: https://doi.org/10.1007/s12117-005-1024-x
Slovakia's borders: Tunnel vision. (2012, July 24). [Web log post]. Retrieved from http://www.economist.com/blogs/ easternapproaches/2012/07/slovakias-borders/
Smuggling tunnel to Hong Kong uncovered. (2006). Space Daily. Retrieved from: http://www.spacedaily.com/reports/ Smuggling_Tunnel_To_Hong_Kong_Uncovered_999.html
Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methods, 31, 361-95. http://dx.doi.org/10.1111/0081-1750.00099 DOI: https://doi.org/10.1111/0081-1750.00099
Spagat, E. (2010). San Diego drug tunnel had railcar, tons of pot. Associated Press. Retrieved from http://www.wtopnews.com/ ?nid=104&sid=2104884
Startex. (2011, February 18). Last American Agent Killed in Mexico, Kiki Camarena. [Web Blog]. Retrieved from: http://www.officialcoldcaseinvestigations.com/showthread.php?t=13846
Stewart, S. & Reed, T. (2013 March 28). Mexico: The 'new narco-reality' is already here. Stratfor Global Intelligence. Retrieved from http://www.stratfor.com/weekly/mexico-new-narco-reality-already-here
Summary of Operation Pillar of Defense (2012). Retrieved from http://www.israelpolitik.org/2012/11/21/summary-of-operation-pillar-of-defense/
The fight against terrorism in the European Union. (2010).Retrieved from http://www.diplomatie.gouv.fr/en/french-foreign-policy-1/defence-security/terrorism/the-fight-against-terrorism-in-the/
The Gaza War. (2013). Retrieved from Wikipedia http://en.wikipedia.org/wiki/Gaza_War/ground-forces-enter-gaza-to-find-explosives-planted-along-border/
The Hybrid Threat: Crime, terrorism and insurgency in Mexico. (2012). Proceedings of the Joint Policy and Research Forum: A Joint CSL-HSPI Study. Retrieved from: http://www.csl.army.mil/usacsl/publications/HybridThreatMonographInternetVersion.pdf
Toameh, K.A. (2012). “How many millionaires live in the "impoverished" Gaza Strip?” Retrieved from http://www.gatestoneinstitute.org/3308/gaza-millionaires)
Topol, S.A. (2013). Twilight of Gaza’s smuggling tunnel millionaires. Retrieved from http://www.businessweek.com/articles/2013-01-31/twilight-of-gazas-smuggling-tunnel-millionaires
United States One Hundred Twelfth Congress – 2nd session. (3 January 2012). Border Tunnel Prevention Act of 2012. H.R.4119, Retrieved from http://www.govtrack.us/ congress/bills/112/hr4119/text
United States of America v. Manssor Arbabsiar and Gholam Shakuri. (2011). Retrieved from: http://www.justice.gov/opa/ documents/us-v-arbabsiar-shakuri-complaint.pdf
U.S. citizen with al Qaeda links arrested in Spain. (2010). Retrieved from http://www.reuters.com/article/2010/09/29/us-spain-alqaeda-idUSTRE68S1XQ20100929
U.S. Embassy Tel Aviv. (2009a, Feb. 9). Senior U.S. and Israeli officials discuss efforts to combat arms smuggling. Retrieved from http://wikileaks.org/cable/2009/02/09TELAVIV420.html
U.S. Embassy Tel Aviv. (2009b, Feb. 19). [cable]. IDF Deputy Chief of Staff discusses Gaza Operation Cast Lead and U.S. Egyptian roles to slow smuggling to Hamas Embassy. Retrieved from http://wikileaks.org/cable/2009/02/ 09TELAVIV422.html aka Wikileaks id #192857
Welch, W. (2006). In age of terror, US fears tunnels pose bigger threat. USA Today. Retrieved from: http://www.usatoday. com/news/nation/2006-03-01-tunnel-terror_x.htm
Zion, I.B. (2012). IDF ground forces briefly enter Gaza after finding tunnel packed with explosives. The Times of Israel. Retrieved from http://www.timesofisrael.com/idf-
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 International Journal of Criminology and Sociology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .