Hail to the King (and pay his nephew a bribe)

Originally Published by the Global Initiative Against Transnational Organized Crime, Available Here.

Dino Bouterse sits in jail, facing a formidable set of charges. According to prosecutors he traffics drugs, smuggles weapons, and openly consorts with terrorists. While lurid, the case would hardly be notable, save for who Dino Bouterse is and where he is being charged. Mr. Bouterse is the son of President Desi Bouterse of Suriname. While his crimes took place in Suriname, he effectively enjoyed immunity from prosecution there. It wasn’t until he was lured to Panama that he could be arrested, extradited, and put on trial in the United States.

Dino Bouterse is far from unique. Throughout the world, the relatives of heads of state have been caught consorting with transnational organized crime. The association is often mutually beneficial. A key challenge for organized crime groups is identify how best they can avoid enforcement of the law. Frequently, this leads them to bribe local security and justice officials on a large. However, it is far more efficient to bribe one high-level individual who enjoys the ability to impact government policy more broadly. The friends and family of a State’s leader can often have such an impact, especially in states in which the Executive wields absolute or a large degree of control.

More rarely, relatives of a head of state engage directly in organized crime. Dino Bouterse fell into this category, reportedly conspiring to import cocaine to the United States. A more notorious example is Rifaat Al-Assad, the younger brother of former Syrian President Hafaz Al-Assad, who was reportedly deeply involved in drug trafficking and car theft in the 1980s and 1990s. The rational behind this engagement in the illicit involves a mix of opportunity and reward. The obvious opportunity involves the inviolability these individuals, their position rendering them capable of evading legal responsibility for their acts. In some cases, as with Rifaat Al-Assad, their influence enables them to employ state resources to further their criminal endeavors. Collusion with or engagement in organized crime can be financially lucrative for the relatives of government leaders, enabling them to profit from their government ties, even if they do not receive a formal government salary.

The international community is challenged in its attempts to hold individuals such as Mr. Al-Assad or Mr. Bouterse accountable. They enjoy both effective immunity from prosecution and extradition in their home countries. Diplomatic concerns may also effectively stymie international efforts at prosecution. However, as Dino Bouterse’s case shows, when international will exists the relatives of heads of state can still be held accountable for their actions.

Illicit enterprises are certainly not the only entities to leverage family members of a national leader to gain a business edge. Teodoro Nguema Obiang Mangue, son of Equatorial Guinea’s President, reportedly pocketed large bribes from foreign timber companies seeking to operate in the country. In Guinea (Conakry), the wife of General Lansana Conté, the nation’s former leader, reportedly assisted a small international mining company in gaining access to highly profitable iron deposits. Licit businesses do not pay under duress, but rather because they crave access and advantage over their competitors.

Hoping for Brave New World

Originally Published by the Global Initiative Against Transnational Organized Crime, Available Here.

The boat was packed. Five hundred men and women were on board, hailing from Ghana, Somalia Eritrea, and a kaleidoscope of other countries. Sailing north from the Libyan coast the boat was within sight of its destination when it began taking on water, and then capsized. While coast guard vessels rescued some of the migrants, few knew how to swim. The bodies floating in the surf off the Italian island of Lampadusa were a grim reminder of the desperate journey many embark on for a better life, and the often-fatal dangers they face.

While migration is no crime, the challenges of negotiating complex immigration or asylum procedures in destination countries, or transiting the complex geographical routes across inhospitable terrains leads many to seek the assistance of smuggling groups to help them navigate their passage. As a consequence, migrant smuggling is becoming all pervasive in the modern world. Migrant smuggling denotes a situation in which an individual willing contracts with a third party to be transported into another country without having formal documentation or consent to enter that country.

The demand for illicit migration is driven by the economic discrepancies between the developed and developing world. The salaries of Europe, the U.S., Canada, and Australia far higher than what can be earned in many developing countries. For millions of young adults facing bleak job market in low-income areas of Africa, Latin America, and Asia, the most viable way to achieve financial success is to engage in a risky, and often unsuccessful migration to the developed world. Others, fleeing from war or oppressive governments, may have little choice but to migrate and hope for the best.

Specialized migrant smuggling organizations have arisen to cater to this demand. The market is lucrative, generating more than $6.75 billion annually for the groups involved. Migrant smuggling is often facilitated by a vast number of different groups, each specializing in moving people through one distinct geographic area. Some of the gangs are highly complex, able to supply doctored passports or maintain fleets of migrant smuggling vessels. More frequently, the smugglers are minimally organized and low tech. Successfully moving someone across a land border requires an intimate knowledge of the territory and the operational habits of border guards, creating a low bar for prospective migrant smugglers who live alongside an international border.

The largest flows of illicit migrants move via two well defined corridors: from Central America into the United States, and from Africa into Europe. The Latin America-US corridor is one of the most well-traveled illicit migration routes in the world. Migrants, mainly from Mexico, Central, and South America, along with smaller numbers of Asian and African migrants, attempt to cross Mexico’s border with the U.S. in areas that are remote yet have access to roads. Historically most the migrant smugglers in the area have been small, locally based organizations. This has shifted over the last decade, as Mexico’s powerful drug trafficking organizations have moved into the market. The UNODC Global Threat Assessment estimated that this high traffic route may be used by upwards of three million migrants every year.

The other large migration corridor extends from Africa to Europe. Routes extend from sub-Saharan Africa either across the Saharan desert and on to the North African Coast, or to the West African coast. At either of these end points, the smuggled migrants face a daunting sea voyage. From West Africa, migrants attempt to reach Spain’s Canary Islands. From North Africa, migrants attempt to cross the Mediterranean, often aiming for Italy. Historically, the number of migrants smuggled along these routes and into Europe has been a far smaller than what is seen along the US-Mexico border, but with the increasing instability in North Africa and the Sahel, these numbers have been rising exponentially. 92 migrants were recently found dead in the northern deserts towards the Libyan border, the majority of which were children. A European intelligence officer recently estimated that 3000 migrants pass through the Agadez region of Niger each week, and that represents fifty per cent of the migrants landing on the shores of Lampedusa.

Whichever route they take, smuggled migrants often face extreme danger. Once outside of their own country, they become dependent on smuggling groups for their survival. This dependence can open the smuggled individual to physical and sexual abuse at the hands of the smugglers, as well as forced labour and coercive demands for money. The line between migrant smuggling and human trafficking is particularly fine. Migrants may start off a journey as willing participants, however their vulnerability can lead to their exploitation at the hands of criminal groups. Finally, corrupt security officials who control the areas migrants must pass through also frequently victimize them.

Migrant smuggling is unlikely to dissipate in the near future. Populations are continuing to grow in many nations in the developing world, creating a fierce battle for available jobs. Young adults who are financially and physically able are likely to continue to try to reach high-wage countries in North America and Europe. While for some the migration will end happily, for far too many their efforts to get a better life will lead to abuse, injury, or death in the clear waters of the Mediterranean or somewhere in the vast Sahara.

Las Jefas: The Changing Role of Women in Latin American Drug Trafficking Organizations

A presentation organized as part of the Carr Center's Working Group on Human Trafficking and Modern Slavery. Matt Herbert, Pre-Doctoral Fellow, The World Peace Foundation and PhD Candidate, Fletcher School of Law & Diplomacy presented: "Las Jefas: The Changing Role of Women in Latin American Drug Trafficking Organizations" this event took place on Dec. 12, 2013.

Good things don’t come to an end. They spread….

Originally Published by the World Peace Foundation Reinventing Peace Blog

This post is the second of a two-part series on Somali piracy by Matt Herbert and David Knoll. 

Maritime piracy, thought by many to be a quaint relic of history, is booming. Modern-day buccaneers have upgraded from swords to AK-47s and spyglasses to GPS, but their motive remains the same: profit. Traditionally, pirate groups made a risk-reward calculation: operations that had higher earning potential also came with higher risk of interdiction. Somali pirates have upended this risk-reward tradeoff, by pioneering hijack-ransom piracy, a technique that minimizes their risk, while maximizing their profits. While successful, so far this type of piracy has remained limited to the waters near Somalia. This article will explore whether this innovative technique is poised to spread beyond the Horn of Africa.

Of late, the international community has found success in the fight against Somali piracy. Intensive efforts by an international naval flotilla in the western Indian Ocean, new protection efforts by shipping companies, and increasing chaos in Somalia have led to a dramatic drop in the number of Somali pirate attacks.

Somali Pirate Attacks

(Data from ICC/International Maritime Bureau – Piracy And Armed Robbery Against Ships Reports from 2004-2012)

While an impressive and laudable achievement, the international community’s recent triumph has highlighted a concerning global trend: the rise of piracy in the 21st century. Over the last quarter century the number of reported acts of maritime piracy have tripled; the number of unreported acts is likely higher. The drivers of this increase are the mega-trends of the 21st century: trade, inequality, and geo-demographics. The globalization-driven increase in international maritime trade has increased the number of targets for pirates. Developing countries have experienced rapid economic growth associated with this boom, but the growth has been unequal, birthing a large dislocated population, bereft of opportunity, and thus willing to take risks. This massive group comprises the recruiting ground for potential pirates. Finally, there has been a dramatic increase of urban populations in littoral zones. The clustering of dispossessed populations in urban areas with easy access to maritime targets is acting as a long-term driver of maritime attacks. The presence of organized crime groups in many of these areas will help to ensure that piracy in the coming years will be well organized, professional, and difficult to stop.

Pic 2.png

(Data from ICC International Maritime Bureau – Piracy And Armed Robbery Against Ships Reports from 2004-2012)

The most financially lucrative form of piracy in the modern age has been hijack-ransom. While structural conditions – state weakness, existence of organized groups, and proximity to high value vessels – allowed the development of Somali piracy, it was their innovative technique that made them successful. Techniques can, and often do, spread, which begs the question: can ransom-hijack model piracy spread and if so, where?

Innovation diffusion theory is a useful framework for understanding how hijack-ransom piracy might spread. The concept explains how innovations proliferate through networks. There are five characteristics of an innovation that make it more or less diffusible: relative advantage, compatibility, trialability, observability, and complexity. Looking at the first four characteristics, hijack-ransom piracy comes out as easily transferable. The relative advantage—high profitability and low risk—is obvious. The technique is compatible with the practices and equipment available to most maritime criminal groups. And because it does not require extensive retooling in terms of gear, hijack-ransom piracy is trialable. A group can try this type of piracy and if they don’t like it, revert to their previous operational model without much lost investment. Lastly, the Somali style piracy is easily observable—it happens in the open and garners worldwide press coverage. Any group thinking of adopting the method will see numerous examples of the success of hijack-ransom piracy.

It is the last characteristic, complexity, which potentially hinders the diffusion of Somali-style piracy. The infrastructure necessary to support hijack-ransom piracy is more complex than is commonly assumed. In addition to the intricacy of the operations themselves, hijack-ransom pirate organizations require a number of key specialists, in addition to the foot soldiers that make up the bulk of the groups. They need negotiators to communicate with shipping companies to secure ransoms. Logisticians ensure that adequate food, water, and qat are available for a prolonged hostage situation. Finally, sustaining pirate operations, during the commandeering phase, and especially during the hostage state, is expensive, so investors are required.

The complexity of hijack-ransom piracy means that any diffusion of the technique must include the transfer of both tacit and explicit knowledge to potential adopter groups. Tacit knowledge is expert knowledge that is not easily expressed. For example this would include the knowledge of how to find a valuable ship, how to keep hostages alive, and how to negotiate with an international shipping company. Explicit knowledge is direct and easily expressed knowledge. Explicit knowledge is the operational knowledge an adopter could gain from reading a descriptive newspaper account of a pirate attack. Tacit knowledge, on the other hand, can only be transferred directly from an expert to a new user.

Knowledge is transferred through two types of communication channels: mass and interpersonal. Mass communication is unidirectional and reaches large, heterogeneous audiences. It includes such mediums as newspapers and television. Interpersonal communication is interactive and takes place between individuals or in small groups. Explicit information travels effectively and swiftly via mass communication channels. There has certainly been enough coverage of Somali piracy in the international press to provide a potential adopter with all the required explicit information. However, explicit knowledge alone is not sufficient: without tacit knowledge a pirate group will not have enough information to adopt hijack-ransom piracy. For innovation to spread, both explicit and tacit information must reach a potential adopter.

Tacit information is transmitted via interpersonal channels, which are interactive, allowing for back and forth between a potential adopter and a current user. Interpersonal interaction mostly occurs between people who know each other, or in other words, individuals or groups that share common characteristics: religion, ideology, ethnicity, or geographic proximity.

Therefore, in looking at the locations where hijack-ransom piracy could spread, one of the key markers is the existence of actors who have network connections to Somalia’s pirate groups. These actors are the ones that Somali pirates interact with most frequently and are positioned to receive the tacit knowledge necessary to adopt Somali hijack-ransom piracy. There are two likely networks through which Somali piracy might diffuse: the Somali Diaspora and Al-Qaeda linked groups. The Somali Diaspora is global, though it has concentrations in East Africa, Europe and the U.S. There is anecdotal evidence of connections between Al-Qaeda (and affiliates) and Somali pirates, and there is certainly enough circumstantial evidence to assume that information passes between the groups. Additionally, the areas of southern Somalia under Al-Shabaab control represent the largest area “held” by an Al-Qaeda affiliated group, and have attracted a host of international militants.

In addition to looking at areas with pirate-linked network presence, we also looked at areas with the structural conditions in place to support hijack-ransom piracy. These are: state weakness, existence of organized groups, and proximity to high value vessels. Pirate groups must have a secure area to organize and a harbor to secure the hijacked vessel without fear of interdiction. They do not require a completely failed state, merely ungoverned coastal territory in which they can operate unhindered.  The complexity of hijack-ransom piracy makes the presence of organized armed groups necessary for piracy to be effective. These groups have the organizational and financial capital necessary to carry out sophisticated hijack-ransom pirate operations. And most obviously, pirate groups must be located near high value shipping. Hijack-ransom piracy takes the revenue-generation capacity of a vessel hostage, so pirates need to be near not just international shipping, but high value vessels to make the enterprise worthwhile.

To find potential diffusion areas, we overlaid the two sets of vectors (structural conditions and Somali pirate networks) and looked for areas where all the factors intersected. We found four areas to which Somali piracy could potential spread. The first is in Southeast Asia, primarily in Indonesian, Malaysian and Filipino waters, which have a long history of piracy and a high concentration of global shipping. The region has several Al-Qaeda affiliate organizations, which have a history of sending personnel to various Al-Qaeda operational theaters. The second is the Gulf of Guinea, which has recently seen a spike in piracy, although thus far not the hijack-ransom variety. The region hosts a number of organized militant and piratic groups who would likely be interested in the technique, as well as the presence of Boko Haram, which is believed to have received some training in Somalia. The third is the Strait of Hormuz; however, the proximity of this area to Somalia increases the likelihood that pirates interested in operating around the Strait will opt for bases in Somalia. The last area is the Libyan coast, which is close to high value global shipping going through the Suez Canal. Despite being proximal to developed countries with powerful navies, Libya has all the factors to make it susceptible to hijack-ransom piracy: the state is weak, and there is a concentrated presence of organized crime groups, many of which are associated with Al-Qaeda. There is even a Somali Diaspora presence in the area associated with illicit maritime activities.

It’s important to highlight what this analysis is and is not. It is not intended to be a Magic 8 Ball, able to predict precisely if and where hijack-ransom piracy where emerge. Neither should it be read as an assertion that the Somali Diaspora, or, for that matter Al-Qaeda members, are all latent pirates. They are not. However, they do represent networks with strong internal communication that could facilitate the spread of knowledge between disparate regions. With this analysis, we have tried to think critically about how Somali model piracy could spread, what conditions may facilitate it, and the role of various networks in the diffusion of the innovation. The utility of pinpointing areas at risk – such as the Gulf of Guinea and Libya – is that it enables national governments and the international community to proactively work to mitigate the chance the technique might emerge. Sound policy and well-designed aid programs can address some, though not all, of the structural factors – state weakness and the ability of organized crime groups to operate with impunity – as well as some of the mega-trends – inequality and societal dislocation – which foster piracy in the first place. Such proactive policies are expensive, but they are a fraction of the tens of billions of dollars which hijack-ransom could annually cost the global economy.