Welcome!

News Feed Item

World Wildlife Day Highlights the Dangers of Wildlife Trafficking

TORONTO, ONTARIO -- (Marketwired) -- 02/28/14 -- At a time when the world's wildlife has never been more in danger of criminal exploitation, the United Nations has declared 3rd March World Wildlife Day as a celebration of wild fauna and flora and to raise awareness of illegal trade.

Just in time for World Wildlife Day, a new study published in the journal Biological Conservation describes the trafficking of wildlife and their products as one of the most profitable and attractive of all the illicit trades, possibly surpassed only by the trafficking of arms and drugs.

The article notes that several of the most notorious armed insurgent groups and terrorist organizations, including Darfur's Janjaweed and the Lord's Resistance Army led by the warlord Joseph Kony, among others - all now derive substantial profits from the illegal wildlife trade to fund their incursions, civil wars, and other acts of violence.

"Criminal organizations are systematically exploiting wildlife as a source of financing," said co-author Kelvin Alie of IFAW (International Fund for Animal Welfare). "And the corruption is spreading like a disease - into armies, border guards, police, judiciary, customs officers, embassy personnel, and even state diplomats in several countries, all of whom benefit from and actively facilitate the illegal wildlife trade."

Lead author, Dr Leo Douglas of the Center for Biodiversity and Conservation, American Museum of Natural History (AMNM), remarked: "The trade's attractivness is largely due to its relative lack of social stigma, small risk of arrest, and the woefully light penalties given to those few brought before the courts." Douglas notes that high-value wildlife are particularly attractive to criminal entities because their large scale killing and theft could be done quickly and inexpensively compared to the extraction of other high-value resources such as oil, gas, and most precious metals. "Wildlife products are classic "lootable resources," a subset of high-value natural resources that are relatively easy to steal, but particularly challenging to monitor from a crime-management perspective," said Douglas. Other natural resources that fall into this category include alluvial diamonds and gemstones, such as rubies.

The authors note that not only is the wildlife trade attracting huge profits, an extimated US$20-billion a year, criminologists have found that wildlife now serves a specialized role as "a form of currency" for terrorist and criminal organizations. Because wildlife commodities become the basis for the trade of drugs, ammunition, and humans, and a substitute for cash, the illegal wildlife trade has thus grown into a highly efficient form of money-laundering. Such exchanges appear particularly common among larger, more sophisticated criminal networks and terrorist organizations working across international borders.

The study illuminates that not only has the lucrative nature of the wildlife trade encouraged high-level corruption, and violence surrounding the mass-killing of large charismatic wildlife (such as lions, tigers, elephants, gorillas and rhinos), there was also simultaneously a more ominous dimension as rebel groups, insurgencies, and terror organizations were now also actively seeking out, capturing, and appropriating the profits of eco-tourism enterprises. For example, seizing on the profitability of high-value gorilla tourism, Congolese rebels murdered wildlife officers and captured licensed ecotourism operations only to begin their own to fulfill their economic ends. Similarly in Nepal, Maoist rebels have captured protected areas to begin unlicensed eco-tourism and trophy-hunting businesses to attract high-paying tourists.

Ecotourism is central to the tourism products and national economies for nations such as Botswana, Kenya, South Africa, and Tanzania.

"We are witnessing unprecedented attacks on wildlife and genuine ecotourism operations by emboldened criminals. Tackling wildlife crime can and must become a priority - not just for the sake of the animals and conservation but for national security and long-term economic sustainability," said Alie.

Trafficked wildlife is frequently smuggled under harrowing conditions in which many individuals die in transit. Because global demand for some species exceeds biological capacity, local or total extinctions of some species or sub-species have resulted. For example, several Rhino species or sub-species now face extinction. At risk of extinction due to poaching are also Sun Bears, Clouded Leopards, forest elephants, gorillas, tigers, orangutans, pangolins, among several other species. To stem this threat Douglas remarks that conservationists must actively link their knowledge about threatened wildlife to the international development, security, and political concerns with which the wildlife trade has become inextricably conjoined.

Please cite this article in press as: Douglas, L.R., Alie, K. High-value natural resources: linking wildlife conservation to international conflict, insecurity, and development concerns. Biol. Conserv. (2014), http://dx.doi.org/10.1016/j.biocon.2014.01.031

For more information, and to arrange an interview, please contact Leo R. Douglas or Kelvin Alie.

Contacts:
Res (Andreas) Krebs
Communications Officer
IFAW Canada
(416) 669-3459
akrebs@ifaw.org

Leo R. Douglas
Center for Biodiversity and Conservation
American Museum of Natural History (AMNH), New York City
lrd2107@columbia.edu or accessleo@gmail.com
1 (876) 807-4971

Kelvin Alie
Wildlife Trade Program
International Fund for Animal Welfare, Washington DC
kalie@ifaw.org
1 (202) 536 1905

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Stratoscale, the software company developing the next generation data center operating system, exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016.Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere, IT is empowered to take control of their data ce...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...