Terrorist Use of Smuggling Tunnels

Authors

  • Terrance G. Lichtenwald PMB 141, 6260 E. Riverside Blvd, Loves Park, IL 61111, USA
  • Frank S. Perri PMB 141, 6260 E. Riverside Blvd, Loves Park, IL 61111, USA

DOI:

https://doi.org/10.6000/1929-4409.2013.02.21

Keywords:

Smuggling, tunnels, terrorism, operation pillar of cloud, operation pillar of defense, operation stones of shale, operation shale stones

Abstract

This article examines terrorists’ use of smuggling tunnels to finance terrorism and/or launch terrorist operations. Israel’s Operation Pillar of Cloud and Hamas’ Operation Stones of Shale are used to illustrate both the physical structure of smuggling tunnels and social networks of the people who build and use smuggling tunnels. The sociological factors of terrorists and criminals engaged in smuggling in the same country, such as the Gaza Strip and Egypt during peaceful times and the Gaza Strip and Israel during a state of war, is examined. The article proposes the application of open-source social-network models applicable to regional and transnational tunnel analysis during times of peace and war, employing intelligence from law enforcement and national security sources to improve border security.

References

Akano, O. (1986). The Effect of Smuggling on the Protection of Industries in Nigeria. Ibadan, Niser: Nigerian Institute of Social and Economic Research.

Akram, F. & Kirkpatrick, D.D. (2013). To block Gaza tunnels, Egypt lets sewage flow. The New York Times. Retrieved from http://www.nytimes.com/2013/02/21/world/middleeast/egypts-floods-smuggling-tunnels-to-gaza-with-sewage.html

Al Qaeda eyes bio attack from Mexico. (2009). The Washington Times. Retrieved from http://www.washingtontimes.com/ news/2009/jun/03/al-qaeda-eyes-bio-attack-via-mexico-border/ 9

Alster, P. (2013). The truth about Hamas' smuggling tunnels, IPT News, TribunePublié. Retrieved from http://www.crif.org/fr/ tribune/truth-about-hamas-smuggling-tunnels/35395

Attorneys General Reno and Madrazo sign letter to enhance cooperation. (1998 July 2). U.S. Department of Justice Press Release #312: 07-02-98. Retrieved from: http://www.justice.gov/opa/pr/1998/July/312ag.html

Beittel, J.S. (2013). Mexico’s drug trafficking organizations: Source and scope of the violence. United States Congressional Research Service. 7-5700, R41576. Retrieved from: www.crs.gov

Billingslea, W. (2004). Illicit cigarette trafficking and the funding of terrorism. Police Chief, 70(2), 49-54. NCJ 205099.

Caldwell, D., Ehlen, J.,& Harmon, R. (2004). Studies in Military Geography and Geology New York: Kluwer Academic. http://dx.doi.org/10.1007/978-1-4020-3105-2 DOI: https://doi.org/10.1007/978-1-4020-3105-2

Carrington, P. J., Scott, J., & Wasseman, S. (2005). Models and Methods in Social Network Analysis. Cambridge University Press. http://dx.doi.org/10.1017/CBO9780511811395 DOI: https://doi.org/10.1017/CBO9780511811395

Chumley, C.K. (2013). France agrees to list Hezbollah as terrorist group. The Washington Times. Retrieved from http://www.washingtontimes.com/news/2013/mar/29/france-agrees-list-hezbollah-terrorist-group/

Coles, N. (2001). It’s not what you know-it’s who you know that counts: Analyzing serious crime groups as social networks. British Journal of Criminology, 41, pp.580 to 594. http://dx.doi.org/10.1093/bjc/41.4.580 DOI: https://doi.org/10.1093/bjc/41.4.580

Dayan, Y. (2012). Analysis: IDF aware Operation Pillar of Defense in Gaza not a long-term solution to Palestinian rocker fire on south. Ynetnews. Retrieved from http://www.ynetnews.com/ articles/0,7340,L-4312017,00.html

Egypt moves to seal off Gaza smuggling tunnels. (2012). The Jerusalem Post. Retrieved from http://www.jpost.com/Middle East/Article.aspx?id=280388/

Exum, A. (2006). Hizballah at war: A military assessment. The Washington Institute for Near East Policy, Policy Focus #63. Retrieved from http://www.lebanonwire.com/0701MLN/ Hezbollah_at_war.pdf

Farquhar, S.C. (2011). Back to basics: A study of the second Lebanon war and operation CAST LEAD. Fort Leavenworth, KS: Combat Studies Institute Press.

Gaza tunnels being quickly rebuilt after Israel claimed to have successfully targeted smuggling network. (2012). CBSNews. Retrieved from http://www.cbsnews.com/8301-202_162-57558663/gaza-tunnels-being-quickly-rebuilt-after-israel-claimed-to-have-successfully-targeted-smuggling-network.html/

Gazans move quickly to rebuild bombed tunnels to bring in food, weapons. (2012). NBC News. Retrieved from http://worldnews.nbcnews.com/_news/2012/11/26/15454998-gazans-move-quickly-to-rebuild-bombed-tunnels-to-bring-in-food-weapons/lite

Grillo, I. (2009). Autumn of the Capo: The diary of a drug lord. Time Online. Retrieved from: www.time.com/time/world/article/ 0,8599,1899404,00.html

Hamas gunmen execute six ‘Israeli spies’ as Netanyahu hints at cease-fire. (2012). National Post. Retrieved from http://news.ntionalpost.com/2012/11/20/hamas-gunmen-execute-six-israeli-spies-on-busy-gaza-street-corner/

Heisman, M. and Snijders, T. (2003). Statistical analysis of longitudinal network data with changing composition. Sociological Methods and Research, 32: 253-87. http://dx.doi.org/10.1177/0049124103256096 DOI: https://doi.org/10.1177/0049124103256096

Ilan, S. & Haaretz Correspondent. (2008). In symbolic vote, Knesset okays MP’s post-Winograd speech. Haaertz. Retrieved from: http://www.haaretz.com/hasen/spages/951073.html.)

Israel: Rockets fired from Gaza Strip. (2013). Retrieved from Stratfor Global Intelligence website at http://www.stratfor.com/ analysis/update-israel-gaza-conflict

Israel’s military says explosive-filled tunnel explodes near soldiers on Israel-Gaza border. (2012). Fox News. Retrieved from http://www.foxnews.com/world/2012/11/08/israel-military-says-explosive-filled-tunnel-explodes-near-soldiers-on-israel/#ixzz2MQb34RqY

Kalman, M. (2012). Hamas victim dragged through streets of Gaza City. New York Daily News. Retrieved from http://www.nydailynews.com/.../hamas-victim-dragged-streets-collaborator-widow-article-1.1208004/

Karthika, S. & Bose, S. (2011a). Analyzing various social networking approaches for covert networks. Trends in Network and Communications, Communications in Computer and Information Science, 197, 558-566. http://dx.doi.org/10.1007/978-3-642-22543-7_57 DOI: https://doi.org/10.1007/978-3-642-22543-7_57

Karthika, S. & Bose, S. (2011b). A comparative study of social networking approaches in identifying the covert nodes. International Journal on Web Services Computing (IJWSC), 2, 65-78. http://dx.doi.org/10.5121/ijwsc.2011.2306 DOI: https://doi.org/10.5121/ijwsc.2011.2306

Katz, Y. & Hendel, Y. (2012). Israel vs. Iran: The shadow war. Washington, D.C.: Potomac Books.

Kempster, N. (1998). U.S., Mexico Vow Better Communication Diplomacy: In wake of furor over Operation Casablanca, nations pledge to inform each other about sensitive activities. Los Angeles Times Online. Retrieved from: http://articles.latimes.com/1998/jul/03/news/mn-477

Killebrew, R. (2011). Not just about Mexico; not just about drugs. In The Hybrid Threat: Crime, Terrorism and Insurgency in Mexico. Proceedings of the Joint Policy and Research Forum, A Joint CSL-HSPI Study, Retrieved from http://www.csl.army.mil/usacsl/publications/HybridThreatMonographInternetVersion.pdf

Krebs, V. (2001). Mapping networks of terrorist cells. Connections, 24, 43-52.

Lichtenwald, T.G. (2003). Drug smuggling behavior: A developmental smuggling model (Part 1). Forensic Examiner. National Criminal Justice Reference #NCJ209084 http://www.all-about-psychology.com/support-files/drug_smuggling_part_1. pdf

Lichtenwald, T.G. (2004). Drug smuggling behavior: A developmental smuggling model (Part 2). Forensic Examiner, National Criminal Justice Reference Service #NCJ209085. http://www.all-about-psychology.com/support-files/drug_smuggling_part_2.pdf

Lichtenwald, T.G., Perri, F.S., & MacKenzie, P.M. (2009). Smuggling multi-consignment contraband: Isolated incidence or a new trend? Inside Homeland Security, 7(2), NCJ # 227306 http://www.all-about-forensic-science.com/support-files/smuggling.pdf

Lichtenwald, T.G. & Perri, F. S. (2011). Smuggling tunnels: The need for a transnational analysis. Inside Homeland Security, 9(1), NCJ Number 23418. http://www.all-about-forensic-science.com/support-files/tunnels.pdf

Lintner, B. (2009). ‘Tunnels, guns and Kimchi: North Korea’s quest for dollars – Part I’. Yale Global. Retrieved from http://yaleglobal.yale.edu/content/NK-quest-for-dollars-part1

Mam, A. E., Kinney, J. B.,& Pollard, N.R. (2008). Social network and distance correlates of criminal associates involved in illicit drug production. Security Journal, 21, 77-94. http://dx.doi.org/10.1057/palgrave.sj.8350069 DOI: https://doi.org/10.1057/palgrave.sj.8350069

Marosi, R. (2011). Controversial Muslim cleric is arrested while sneaking into the U.S. Los Angeles Times. Retrieved from: http://articles.latimes.com/2011/jan/27/local/la-me-border-cleric-20110127

McGloin, J. M. & Kirk, D. S. (2010). An overview of social network analysis. Journal of Criminal Justice Education, 2, 169-181. http://dx.doi.org/10.1080/10511251003693694 DOI: https://doi.org/10.1080/10511251003693694

Mexico: Open access to U.S. security agencies ends. (2013). Retrieved from Stratfor Global Intelligence website at http://www.statfor.com/situation-report/mexico-open-acess-us-security-agencies-ends

Mexico security memo: Prevalent propaganda and promises to fight crime (2013 March 27). Retrieved from Stratford Global Intelligence website at http://www.stratfor.com/topics/ terrorism-and-security/tracking-mexicos-drug-cartels

Mexican and Canadian Drug Tunnels. (2010). Retrieved from http://www.terroristplanet.com/2010/02/mexican-and-canadian-drug-tunnels/

Miller, G. (2010). CIA acts on fear of al-Qaeda plot to hit in Europe. Washington Post. Retrieved from:http://www.washingtonpost. com/wpdyn/content/article/2010/09/28/AR2010092806935_pf.html

Mohamad Youssef Hammoud sentenced to 30 years in terrorism financing case. (2011). Retrieved from http://www.ice.gov/ news/releases/1101/110127charlotte.htm

Mora, E. (2010). Justice Department reports 60 percent increase in number of drug smuggling tunnels at U.S.-Mexican border. Retrieved from: http://www.cnsnews.com/node/64442

Morsell, C. (2009). Inside criminal networks, studies of organized crime. Springer Social Sciences-Criminology and Criminal Justice, 8, ISBN 978-0-387-09526-4.

Morin, M. (2007). Afghan tunnels prove tough to crack. Stars and Stripes. Retrieved from: http://www.afghanistannewscenter. com/news/2007/july/jul192007.html

Norton-Taylor, R. & Bowcot, O. (2010). Mumbai-style' terror attack on UK, France and Germany foiled, Drone attacks intercept militants based in Pakistan Western intelligence agencies confirm plot fears. Retrieved from http://www.guardian.co.uk/ world/2010/sep/29/terror-attack-plot-europe-foiled

Oladeji, K. (2010). Psychosocial Predictors of Smuggling Behaviour among Suspected Smugglers in Selected Border Areas in Nigeria. MMP Thesis, Unpublished. Ibadan: University of Ibadan.

Oladeji, M.O. (2010). Perception of smuggling among the Yoruba people of Oke-Ogun of South Western Nigeria. Internet Journal of Criminology, 1-13.

Olapegba, P.O. & Idemudia, E.S. (2012). Dispositional and contextual factors predicting smuggling behaviour among smugglers in border areas in Nigeria. Journal of Psychology, 3(2): 59-64. Retrieved from http://www.krepublishers.com/02-Journals/JP/JP-03-0-000-12-Web/JP-03-2-000-12-Abst-PDF/JP-03-2-059-12-086-Olapegba-P-O/JP-03-2-059-12-086-Olapegba-P-O-Tt.pdf DOI: https://doi.org/10.1080/09764224.2012.11885478

Perri, F.S., Lichtenwald, T.G., & MacKenzie, P.M. (2009). Evil Twins: The Crime-Terror Nexus, Forensic Examiner, 18(4), 16-29. http://www.all-about-psychology.com/support-files/crime-terror-nexus.pdf

Qin, J., Xu, J.J., Hu, D., Sageman, M., & Chen, H. (2005). Analyzing terrorist networks: A case study of the Global Salafi Jihad network. IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings. DOI: https://doi.org/10.1007/11427995_24

Pantucci, R. (2013). France confronts terror threat in Africa, risks attack at home. RUSI Royal United Services Institute Analysis. Retrieved from http://www.rusi.org/analysis/ commentary/ref:C50F7C5DB4E4D6/

Papachristos, A. V. (2011). The coming of a networked criminology. In J. MacDonald (ED.), Measuring crime and criminality (pp. 101-140). New Brunswick, N.J.: Transaction Publishers. DOI: https://doi.org/10.4324/9780203785997-5

Ressler, S. (2006). Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, 2. Retrieved from http://www.hsaj.org

Roggio, W. & Lundquist, L. (2010). European terror plot begins to unravel. Retrieved from: http://www.longwarjournal.org/ archives/2010/09/european_terror_plot.php#ixzz2P9u72zHe

Rudoren, J. & Akram, F. (2012). Suspected collaborator with Israel killed on Gaza street. The New York Times. Retrieved from http://nytimes.com/2012/11/17/world/middleeast/suspect-collaborator-with-israel-executed-in-gaz.html

Russell, G. (2001). Mexico slowdown on the border. Time Magazine Online. Retrieved from: http://www.time.com/time/magazine/ article/0,9171,141219,00.html

Sageman, M. (2004). Understanding Terror Networks. Philadelphia: University of Pennsylvania Press DOI: https://doi.org/10.9783/9780812206791

Schiff, Z. (2006). Kidnap soldiers in July was Hezbollah’s fifth attempt Israel told diplomats after learning of previous plans it would respond with military operations to kidnap attempts. Retrieved from: http://www.haaretz.com/news/kidnap-of-soldiers-in-july-was-hezbollah-s-fifth-attempt-1.197595

Shelley, L, (n.d.). The nexus of organized international criminals and terrorism. Retrieved from: http://pagespersoorange.fr/ societe.internationalede.criminologie/pdf/Intervention%20Shelley.pdf.

Shelley, J., Picarelli, A.I., Hart, D.M., Craig-Hart, P.A., Williams, P., Simon, S., & Covill, L. (2005). Methods and motives: Exploring links between transnational organized crime and international terrorism. Retrieved from http://www.ncjrs.gov/ pdffiles1/nij/grants/211207.pdf - DOI: https://doi.org/10.1007/s12117-005-1024-x

Slovakia's borders: Tunnel vision. (2012, July 24). [Web log post]. Retrieved from http://www.economist.com/blogs/ easternapproaches/2012/07/slovakias-borders/

Smuggling tunnel to Hong Kong uncovered. (2006). Space Daily. Retrieved from: http://www.spacedaily.com/reports/ Smuggling_Tunnel_To_Hong_Kong_Uncovered_999.html

Snijders, T. A. B. (2001). The statistical evaluation of social network dynamics. Sociological Methods, 31, 361-95. http://dx.doi.org/10.1111/0081-1750.00099 DOI: https://doi.org/10.1111/0081-1750.00099

Spagat, E. (2010). San Diego drug tunnel had railcar, tons of pot. Associated Press. Retrieved from http://www.wtopnews.com/ ?nid=104&sid=2104884

Startex. (2011, February 18). Last American Agent Killed in Mexico, Kiki Camarena. [Web Blog]. Retrieved from: http://www.officialcoldcaseinvestigations.com/showthread.php?t=13846

Stewart, S. & Reed, T. (2013 March 28). Mexico: The 'new narco-reality' is already here. Stratfor Global Intelligence. Retrieved from http://www.stratfor.com/weekly/mexico-new-narco-reality-already-here

Summary of Operation Pillar of Defense (2012). Retrieved from http://www.israelpolitik.org/2012/11/21/summary-of-operation-pillar-of-defense/

The fight against terrorism in the European Union. (2010).Retrieved from http://www.diplomatie.gouv.fr/en/french-foreign-policy-1/defence-security/terrorism/the-fight-against-terrorism-in-the/

The Gaza War. (2013). Retrieved from Wikipedia http://en.wikipedia.org/wiki/Gaza_War/ground-forces-enter-gaza-to-find-explosives-planted-along-border/

The Hybrid Threat: Crime, terrorism and insurgency in Mexico. (2012). Proceedings of the Joint Policy and Research Forum: A Joint CSL-HSPI Study. Retrieved from: http://www.csl.army.mil/usacsl/publications/HybridThreatMonographInternetVersion.pdf

Toameh, K.A. (2012). “How many millionaires live in the "impoverished" Gaza Strip?” Retrieved from http://www.gatestoneinstitute.org/3308/gaza-millionaires)

Topol, S.A. (2013). Twilight of Gaza’s smuggling tunnel millionaires. Retrieved from http://www.businessweek.com/articles/2013-01-31/twilight-of-gazas-smuggling-tunnel-millionaires

United States One Hundred Twelfth Congress – 2nd session. (3 January 2012). Border Tunnel Prevention Act of 2012. H.R.4119, Retrieved from http://www.govtrack.us/ congress/bills/112/hr4119/text

United States of America v. Manssor Arbabsiar and Gholam Shakuri. (2011). Retrieved from: http://www.justice.gov/opa/ documents/us-v-arbabsiar-shakuri-complaint.pdf

U.S. citizen with al Qaeda links arrested in Spain. (2010). Retrieved from http://www.reuters.com/article/2010/09/29/us-spain-alqaeda-idUSTRE68S1XQ20100929

U.S. Embassy Tel Aviv. (2009a, Feb. 9). Senior U.S. and Israeli officials discuss efforts to combat arms smuggling. Retrieved from http://wikileaks.org/cable/2009/02/09TELAVIV420.html

U.S. Embassy Tel Aviv. (2009b, Feb. 19). [cable]. IDF Deputy Chief of Staff discusses Gaza Operation Cast Lead and U.S. Egyptian roles to slow smuggling to Hamas Embassy. Retrieved from http://wikileaks.org/cable/2009/02/ 09TELAVIV422.html aka Wikileaks id #192857

Welch, W. (2006). In age of terror, US fears tunnels pose bigger threat. USA Today. Retrieved from: http://www.usatoday. com/news/nation/2006-03-01-tunnel-terror_x.htm

Zion, I.B. (2012). IDF ground forces briefly enter Gaza after finding tunnel packed with explosives. The Times of Israel. Retrieved from http://www.timesofisrael.com/idf-

Downloads

Published

2013-06-17

How to Cite

Lichtenwald, T. G., & Perri, F. S. (2013). Terrorist Use of Smuggling Tunnels. International Journal of Criminology and Sociology, 2, 210–226. https://doi.org/10.6000/1929-4409.2013.02.21

Issue

Section

Articles