11.07.2015 Views

Natural Resources and Violent Conflict - WaterWiki.net

Natural Resources and Violent Conflict - WaterWiki.net

Natural Resources and Violent Conflict - WaterWiki.net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

where did it come from? 119<strong>and</strong> communities in Indonesia. The reform of property rights to devolvemanagement of resources to local communities with a vested interest intheir long-term security can also prove helpful.Use of New Technology. As with data exchange, many technologiesexist to help account for product inventory <strong>and</strong> trade. Also, as withdata exchange systems, technological developments in tracking havetended to precede policy rather than to have been driven by it.There are clear drawbacks to not employing technologically sophisticatedtracking methods. For example, the outdated paper-based certificatesor movement documents issued under CITES <strong>and</strong> the Baselconvention are easily forged. Paper documentation, when not supplementedby electronic verification, is unreliable; falsification of CITEScertificates is a common problem, particularly for high-value productssuch as caviar, as are the sale <strong>and</strong> theft of blank documents.Table 4.2 gives examples of technology applicable to the monitoringof logs, although the methods are readily adaptable elsewhere <strong>and</strong>should be seen as complementary rather than exclusionary. The technologieslisted are relatively self-explanatory: remote sensing <strong>and</strong>automatic cameras are clearly “large-scale” technologies that are notdesigned to measure individual logs but areas of operation <strong>and</strong> aggregatevolume of traffic. Microtaggants are microscopic particlescomposed of layers of different colored plastics—millions of permutationsare possible by combining several colors in different sequences.The coding sequences are then read with a X100 pocket microscope.Radio frequency identity tags can be read-only or read-write <strong>and</strong>can be programmed in the field or in advance. They are passive inthat they transmit data only when “excited” by a signal from an appropriatereader. Reflectors are read by laser devices <strong>and</strong> may be ofvalue to aerial surveillance teams trying to identify concession boundaries,log trucks carrying illegal loads, <strong>and</strong> the like, while satellitebasedsensors can be read over enormous distances but are relativelycumbersome.Element 4: Effective Compliance <strong>and</strong> Enforcement MeasuresCompliance refers to a state’s commitments under international law.Enforcement refers to a set of actions that a state may take within itsnational territory to ensure implementation of its international commitments,including adopting national laws <strong>and</strong> regulations, monitoringcontrolled activities, <strong>and</strong> deterring evasion of national regulations.Countries often sign up for controls but fail to pass adequate lawsor assign sufficient funds for their effective implementation. Responsibilitiesfor implementation of controls may be assigned to an agency

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!