convergence
convergence
convergence
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Introduction<br />
networks will operate wherever a profit can be made. No corner of the world is untouched by<br />
transnational organized crime, and many illicit networks have multicontinental areas of operations.<br />
Take, for example, the Sinaloa Cartel, which operates on five continents, earns billions<br />
of dollars, and has successfully diversified beyond drugs to other criminal activities such as<br />
kidnapping and money laundering.<br />
Beyond their global operations, deviant entrepreneurs worldwide have demonstrated<br />
that they can effectively shut down large urban spaces (such as the favelas of Brazil) and even<br />
whole subregions (such as the Tri-Border Area where Argentina, Brazil, and Paraguay meet),<br />
while usurping their host states’ basic functional capacity. They can and do provide social<br />
services to local constituencies ranging from community protection to the provision of such<br />
public goods as disaster relief, dispute resolution, and even garbage collection. The examples<br />
are too numerous to mention in full but include Hizballah in Lebanon, criminal syndicates<br />
in the favelas of Brazil’s megacities, the Movement for the Emancipation of the Niger Delta<br />
in Nigeria, and drug-trafficking organizations such as the now defunct Medellín Cartel in<br />
Colombia. Over time, as the illicit economy grows and nonstate actors provide an increasing<br />
range of social goods, a security and political vacuum emerges from the gradual erosion of state<br />
power, legitimacy, and capacity, and the state is displaced by the same illicit networks that are<br />
eating away at its legitimacy.<br />
In addition to defying both borders and law enforcers, transnational illicit networks are<br />
unrestrained by legislation, unimpeded by morality, empowered by vast amounts of cash,<br />
and able to take advantage of all the latest technological developments. They use technology<br />
for communications, even encrypted, to identify and recruit individuals with needed skills<br />
and to exchange tradecraft secrets and lessons with other illicit groups and networks around<br />
the world, manage their global enterprises, and plan global collaboration and operations.<br />
Globalization involving the crossborder integration of value-added economic activity has<br />
dominated international economic activity in recent years. For the past several decades, this<br />
sort of economic activity has grown twice as fast as overall global economic growth. And while<br />
new technologies have drawn the world’s communities into ever-closer physical and economic<br />
proximity, they have not eliminated local differences in economic opportunities, moral attitudes<br />
toward different sorts of economic activity, or the capacity of law enforcement agencies in<br />
different parts of the world, resulting in what might be referred to as a “lumpy” environment.<br />
Illicit networks depend on and benefit from the same technologies and innovations that help<br />
legal private industry navigate this lumpy environment. This presents a substantial challenge<br />
to government agencies that cannot adapt or adopt the technologies as rapidly as their networked<br />
tormentors.<br />
The old paradigm of fighting terrorism and transnational crime separately, utilizing<br />
distinct sets of tools and methods, may not be sufficient to meet the challenges posed by<br />
the <strong>convergence</strong> of these networks into a crime-terror-insurgency nexus. Violent nonstate<br />
actors, including terrorist organizations and insurgent movements, seek to collaborate with<br />
criminal networks—and in some cases become criminal networks—in order to finance acts of<br />
terrorism and purchase the implements of destruction and killing. Terrorists and insurgents<br />
can tap into the global illicit marketplace to underwrite their activities and acquire weapons<br />
and other supplies vital to their operations. On the other hand, many transnational criminal<br />
xv