convergence
convergence
convergence
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The Criminal State<br />
zones, criminal takeover, and oligarchic regimes.” 10 An innovative attribute of this framework<br />
is its inclusion of criminal states animated by religious or ideological motivations, such as<br />
Afghanistan’s Taliban or Lebanon’s Hizballah. These differ from the typical assumption of the<br />
venal motivations of criminals and criminal states. According to this pair of scholars, “Such a<br />
state is anathema to the modern state-form and criminal in its orientation because, ultimately,<br />
it was to merge with other conquered territories to form the new Caliphate envisioned by<br />
al-Qaeda.” 11 Less persuasive is their description of criminal states emerging from state failure<br />
and lawless zones. It can be argued that what they are describing here is a condition arising<br />
from the absence of a state, rather than an entity engaged in criminal activity.<br />
What we propose below is an exploratory effort to disaggregate further the basket of<br />
states referred to as criminal states, based not on their motivations or morphology but on their<br />
degree of criminalization. We have argued elsewhere that “increasingly, fighting transnational<br />
crime must mean more than curbing the traffic of counterfeit goods, drugs, weapons, and<br />
people; it must also involve preventing and reversing the criminalization of governments.” 12<br />
Likewise, to preserve the sovereignty of legitimate states, we must prevent and reverse this<br />
corrosive process. But to meet these challenges, we must distinguish between states with<br />
corrupt officials, states that operate large-scale criminal enterprises, and states that are themselves<br />
large-scale criminal enterprises. The typology developed below is intended to assist in<br />
this effort at differentiation. Four characterizations are proposed to describe differing levels<br />
of criminal network entanglement with the state. To be clear, the dynamics of transition from<br />
one level of criminal consolidation to another must be the focus of future research. We do not<br />
assume that these levels represent a linear progression in which a state progresses from one<br />
level to the next with inevitability. We do not yet know if that is true. We merely know that<br />
there are different degrees of state criminality and that effectively preventing or reversing the<br />
further decline into criminalization will require a full array of tools and approaches, as well as<br />
a high degree of sensitivity to individual case and context-specificity.<br />
Criminal Penetration<br />
As noted above, corruption and illicit networks exist in all states alongside the normal complement<br />
of governmental and civil society structures and networks. Their presence may be more<br />
or less extensive, more or less corrosive, and more or less disruptive, but they are always there.<br />
In some states there may be a terrorist or insurgent presence alongside traditional criminal<br />
networks and organizations. Though terrorists, insurgents, and criminals do not inevitably<br />
interact, it is well known that their mutual hesitation to interact has declined and such interactions<br />
are becoming more common. At a certain point, what we might call the normal—or an<br />
acceptable level of—consolidation among illicit networks within a state is exceeded, and a process<br />
of erosion or atrophy of the state itself may begin and the legitimacy of the state, already<br />
often tenuous, becomes even further compromised in the eyes of its citizens. The presence or<br />
expansion of criminality becomes an international security threat when the impact of criminal,<br />
insurgent, or terrorist activity is felt in other states. And such cross-border effects inevitably<br />
become dramatically more likely when groups on either side of a border establish persistent<br />
connectivity and interaction.<br />
157