Illicit Networks Targeting the Nexus Between Terrorists, Proliferators, and Narcotraffickers
Total Page:16
File Type:pdf, Size:1020Kb
CORE Metadata, citation and similar papers at core.ac.uk Provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2010-12 Illicit networks targeting the nexus between terrorists, proliferators, and narcotraffickers Dietz, Rebekah K. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/5008 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ILLICIT NETWORKS: TARGETING THE NEXUS BETWEEN TERRORISTS, PROLIFERATORS, AND NARCOTRAFFICKERS by Rebekah K. Dietz December 2010 Thesis Advisor: Zachary Davis Second Reader: Dorothy Denning Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED December 2010 Master’s Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Illicit Networks: Targeting the Nexus Between Terrorists, Proliferators, and Narcotraffickers 6. AUTHOR(S) Rebekah K. Dietz 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING N/A AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. government. IRB Protocol number: N/A 12a. DISTRIBUTION / AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE Approved for public release; distribution is unlimited A 13. ABSTRACT Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing states, under the guise of legitimate commerce, and without regard to sovereign borders or even human life. They are the main facilitators of proliferation, terrorism, and narcotics around the world—undeterred and, perhaps, undeterrable. This thesis offers a comparative analysis of three main types of illicit networks: terrorist, proliferation and narcotics networks. Using Jemaah Islamiyah, the A.Q. Khan proliferation network, and the Medellín drug ‘cartel’ as case studies, it examines their typologies, motivations, structures, characteristics, and sources and patterns of funding. It examines if and how illicit networks overlap, with special attention to intra-network (e.g., terrorist networks with other terrorist networks) and inter-network (e.g., terrorist networks with narcotics networks) overlap. It then explores how this information can inform U.S. counter-network activity. 14. SUBJECT TERMS 15. NUMBER OF Illicit, Networks, Terrorism, Proliferation, Narcotics, Jemaah Islamiyah, A.Q. Khan, Medellín cartel, PAGES Pablo Escobar, Social Network Analysis, Globalization, Nuclear Weapons, Trafficking, Uranium 135 Enrichment, Dual-Use 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20. LIMITATION OF CLASSIFICATION OF CLASSIFICATION OF THIS CLASSIFICATION OF ABSTRACT REPORT PAGE ABSTRACT Unclassified Unclassified Unclassified UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. 239-18 i THIS PAGE INTENTIONALLY LEFT BLANK ii Approved for public release; distribution is unlimited ILLICIT NETWORKS: TARGETING THE NEXUS BETWEEN TERRORISTS, PROLIFERATORS, AND NARCOTRAFFICKERS Rebekah K. Dietz Civilian, Department of the Navy B.A., University of California, Los Angeles, 2007 Submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS IN SECURITY STUDIES (DEFENSE DECISION-MAKING AND PLANNING) from the NAVAL POSTGRADUATE SCHOOL December 2010 Author: Rebekah K. Dietz Approved by: Zachary S. Davis, PhD Thesis Advisor Dorothy E. Denning, PhD Second Reader Harold A. Trinkunas, PhD Chairman, Department of National Security Affairs iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing states, under the guise of legitimate commerce, and without regard to sovereign borders or even human life. They are the main facilitators of proliferation, terrorism, and narcotics around the world—undeterred and, perhaps, undeterrable. This thesis offers a comparative analysis of three main types of illicit networks: terrorist, proliferation and narcotics networks. Using Jemaah Islamiyah, the A.Q. Khan proliferation network, and the Medellín drug ‘cartel’ as case studies, it examines their typologies, motivations, structures, characteristics, and sources and patterns of funding. It examines if and how illicit networks overlap, with special attention to intra-network (e.g., terrorist networks with other terrorist networks) and inter-network (e.g., terrorist networks with narcotics networks) overlap. It then explores how this information can inform U.S. counter- network activity. v THIS PAGE INTENTIONALLY LEFT BLANK vi TABLE OF CONTENTS I. INTRODUCTION........................................................................................................1 A. INTRODUCTION............................................................................................1 B. IMPORTANCE................................................................................................1 C. RESEARCH QUESTION ...............................................................................3 D. LITERATURE REVIEW ...............................................................................3 E. HYPOTHESES AND PROBLEMS ...............................................................9 F. METHODS AND SOURCES........................................................................10 G. THESIS OVERVIEW ...................................................................................11 II. TERRORIST NETWORKS: JEMAAH ISLAMIYAH .........................................13 A. INTRODUCTION..........................................................................................13 1. Why Terrorist Networks Are Important.........................................13 2. Why Jemaah Islamiyah Was Chosen as a Case Study ...................15 3. Roadmap.............................................................................................15 B. TERRORIST NETWORK TYPOLOGY....................................................16 C. CASE STUDY: JEMAAH ISLAMIYAH ....................................................22 1. Background/History ..........................................................................22 2. Motivation...........................................................................................23 3. Organizational Structure ..................................................................24 4. Sources and Patterns of Funding......................................................29 5. Network Overlap................................................................................30 a. Overlap With Other Terrorist Networks.................................30 b. Overlap With Dissimilar Networks.........................................32 c. Nature of Network Overlap.....................................................33 D. CONCLUSION ..............................................................................................35 III. PROLIFERATION NETWORKS: A.Q. KHAN....................................................37 A. INTRODUCTION..........................................................................................37 1. Why Proliferation Networks Are Important...................................37 2. Why the A. Q. Khan Network Was Chosen as a Case Study.........39 3. Roadmap.............................................................................................39 B. PROLIFERATION NETWORK TYPOLOGY..........................................40 C. CASE STUDY: THE A.Q. KHAN PROLIFERATION NETWORK ......46 1. Background/History ..........................................................................47 2. Motivation...........................................................................................48 3. Organizational Structure ..................................................................50 a. Star Turned Corporation ........................................................50