06.04.2013 Views

convergence

convergence

convergence

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Criminal State<br />

zones, criminal takeover, and oligarchic regimes.” 10 An innovative attribute of this framework<br />

is its inclusion of criminal states animated by religious or ideological motivations, such as<br />

Afghanistan’s Taliban or Lebanon’s Hizballah. These differ from the typical assumption of the<br />

venal motivations of criminals and criminal states. According to this pair of scholars, “Such a<br />

state is anathema to the modern state-form and criminal in its orientation because, ultimately,<br />

it was to merge with other conquered territories to form the new Caliphate envisioned by<br />

al-Qaeda.” 11 Less persuasive is their description of criminal states emerging from state failure<br />

and lawless zones. It can be argued that what they are describing here is a condition arising<br />

from the absence of a state, rather than an entity engaged in criminal activity.<br />

What we propose below is an exploratory effort to disaggregate further the basket of<br />

states referred to as criminal states, based not on their motivations or morphology but on their<br />

degree of criminalization. We have argued elsewhere that “increasingly, fighting transnational<br />

crime must mean more than curbing the traffic of counterfeit goods, drugs, weapons, and<br />

people; it must also involve preventing and reversing the criminalization of governments.” 12<br />

Likewise, to preserve the sovereignty of legitimate states, we must prevent and reverse this<br />

corrosive process. But to meet these challenges, we must distinguish between states with<br />

corrupt officials, states that operate large-scale criminal enterprises, and states that are themselves<br />

large-scale criminal enterprises. The typology developed below is intended to assist in<br />

this effort at differentiation. Four characterizations are proposed to describe differing levels<br />

of criminal network entanglement with the state. To be clear, the dynamics of transition from<br />

one level of criminal consolidation to another must be the focus of future research. We do not<br />

assume that these levels represent a linear progression in which a state progresses from one<br />

level to the next with inevitability. We do not yet know if that is true. We merely know that<br />

there are different degrees of state criminality and that effectively preventing or reversing the<br />

further decline into criminalization will require a full array of tools and approaches, as well as<br />

a high degree of sensitivity to individual case and context-specificity.<br />

Criminal Penetration<br />

As noted above, corruption and illicit networks exist in all states alongside the normal complement<br />

of governmental and civil society structures and networks. Their presence may be more<br />

or less extensive, more or less corrosive, and more or less disruptive, but they are always there.<br />

In some states there may be a terrorist or insurgent presence alongside traditional criminal<br />

networks and organizations. Though terrorists, insurgents, and criminals do not inevitably<br />

interact, it is well known that their mutual hesitation to interact has declined and such interactions<br />

are becoming more common. At a certain point, what we might call the normal—or an<br />

acceptable level of—consolidation among illicit networks within a state is exceeded, and a process<br />

of erosion or atrophy of the state itself may begin and the legitimacy of the state, already<br />

often tenuous, becomes even further compromised in the eyes of its citizens. The presence or<br />

expansion of criminality becomes an international security threat when the impact of criminal,<br />

insurgent, or terrorist activity is felt in other states. And such cross-border effects inevitably<br />

become dramatically more likely when groups on either side of a border establish persistent<br />

connectivity and interaction.<br />

157

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!