Penthouses to Prisons

Intelligence Briefing

Intelligence Briefing

Conflict Advisory

Summary Briefing

How trusted professionals embedded in the UAE economy were exposed as part of a covert extremist and financial crime network

In April 2026, UAE security authorities dismantled a coordinated Iran-linked network embedded across the country's real estate, logistics, energy, financial, and compliance sectors. The individuals arrested weren't shadowy outsiders - they were brokers, engineers, compliance professionals, and clerics operating within legitimate institutions, building trusted access while working beneath the threshold of visibility. This briefing examines the network in detail and what it means for your organisation.

What's Inside

  • A full account of the UAE’s April 2026 counterterrorism operation, including the dismantling of an Iran-linked network aligned with Wilayat al-Faqih ideology and a parallel Hezbollah- and Iran-funded case using fictitious commercial cover.
  • A Themis investigation into the 27 individuals arrested, revealing a cross-sector network spanning real estate, logistics, energy, finance and consultancy, with early-career professionals deliberately targeted for their access.
  • Detailed case studies of individuals operating within legitimate institutions, including a luxury real estate broker, a compliance-linked logistics professional, and a senior oil and gas executive.
  • An analysis of how Iran-aligned networks build covert access over time, targeting young professionals, influencers and individuals embedded within religious and institutional structures.
  • A deep dive into the arrest of Daniel Kinahan in Dubai, highlighting the convergence of drug trafficking, sanctions evasion and state-linked financial flows.
  • A critical examination of shared responsibility in transnational financial crime, challenging Gulf-centric narratives and highlighting the UAE’s proactive enforcement approach.
  • Practical guidance on moving from static due diligence to network-based risk management, including insider threat detection, third-party exposure, and identifying hidden connections.

Sample Pages

No items found.
No items found.

Download Now

Gain valuable insights with our latest publication. Get your copy now to explore key findings, expert analysis, and practical recommendations that help you stay informed and ahead of the curve.

Similar Publications