Welcome!

News Feed Item

World Wildlife Day Highlights the Dangers of Wildlife Trafficking

TORONTO, ONTARIO -- (Marketwired) -- 02/28/14 -- At a time when the world's wildlife has never been more in danger of criminal exploitation, the United Nations has declared 3rd March World Wildlife Day as a celebration of wild fauna and flora and to raise awareness of illegal trade.

Just in time for World Wildlife Day, a new study published in the journal Biological Conservation describes the trafficking of wildlife and their products as one of the most profitable and attractive of all the illicit trades, possibly surpassed only by the trafficking of arms and drugs.

The article notes that several of the most notorious armed insurgent groups and terrorist organizations, including Darfur's Janjaweed and the Lord's Resistance Army led by the warlord Joseph Kony, among others - all now derive substantial profits from the illegal wildlife trade to fund their incursions, civil wars, and other acts of violence.

"Criminal organizations are systematically exploiting wildlife as a source of financing," said co-author Kelvin Alie of IFAW (International Fund for Animal Welfare). "And the corruption is spreading like a disease - into armies, border guards, police, judiciary, customs officers, embassy personnel, and even state diplomats in several countries, all of whom benefit from and actively facilitate the illegal wildlife trade."

Lead author, Dr Leo Douglas of the Center for Biodiversity and Conservation, American Museum of Natural History (AMNM), remarked: "The trade's attractivness is largely due to its relative lack of social stigma, small risk of arrest, and the woefully light penalties given to those few brought before the courts." Douglas notes that high-value wildlife are particularly attractive to criminal entities because their large scale killing and theft could be done quickly and inexpensively compared to the extraction of other high-value resources such as oil, gas, and most precious metals. "Wildlife products are classic "lootable resources," a subset of high-value natural resources that are relatively easy to steal, but particularly challenging to monitor from a crime-management perspective," said Douglas. Other natural resources that fall into this category include alluvial diamonds and gemstones, such as rubies.

The authors note that not only is the wildlife trade attracting huge profits, an extimated US$20-billion a year, criminologists have found that wildlife now serves a specialized role as "a form of currency" for terrorist and criminal organizations. Because wildlife commodities become the basis for the trade of drugs, ammunition, and humans, and a substitute for cash, the illegal wildlife trade has thus grown into a highly efficient form of money-laundering. Such exchanges appear particularly common among larger, more sophisticated criminal networks and terrorist organizations working across international borders.

The study illuminates that not only has the lucrative nature of the wildlife trade encouraged high-level corruption, and violence surrounding the mass-killing of large charismatic wildlife (such as lions, tigers, elephants, gorillas and rhinos), there was also simultaneously a more ominous dimension as rebel groups, insurgencies, and terror organizations were now also actively seeking out, capturing, and appropriating the profits of eco-tourism enterprises. For example, seizing on the profitability of high-value gorilla tourism, Congolese rebels murdered wildlife officers and captured licensed ecotourism operations only to begin their own to fulfill their economic ends. Similarly in Nepal, Maoist rebels have captured protected areas to begin unlicensed eco-tourism and trophy-hunting businesses to attract high-paying tourists.

Ecotourism is central to the tourism products and national economies for nations such as Botswana, Kenya, South Africa, and Tanzania.

"We are witnessing unprecedented attacks on wildlife and genuine ecotourism operations by emboldened criminals. Tackling wildlife crime can and must become a priority - not just for the sake of the animals and conservation but for national security and long-term economic sustainability," said Alie.

Trafficked wildlife is frequently smuggled under harrowing conditions in which many individuals die in transit. Because global demand for some species exceeds biological capacity, local or total extinctions of some species or sub-species have resulted. For example, several Rhino species or sub-species now face extinction. At risk of extinction due to poaching are also Sun Bears, Clouded Leopards, forest elephants, gorillas, tigers, orangutans, pangolins, among several other species. To stem this threat Douglas remarks that conservationists must actively link their knowledge about threatened wildlife to the international development, security, and political concerns with which the wildlife trade has become inextricably conjoined.

Please cite this article in press as: Douglas, L.R., Alie, K. High-value natural resources: linking wildlife conservation to international conflict, insecurity, and development concerns. Biol. Conserv. (2014), http://dx.doi.org/10.1016/j.biocon.2014.01.031

For more information, and to arrange an interview, please contact Leo R. Douglas or Kelvin Alie.

Contacts:
Res (Andreas) Krebs
Communications Officer
IFAW Canada
(416) 669-3459
[email protected]

Leo R. Douglas
Center for Biodiversity and Conservation
American Museum of Natural History (AMNH), New York City
[email protected] or [email protected]
1 (876) 807-4971

Kelvin Alie
Wildlife Trade Program
International Fund for Animal Welfare, Washington DC
[email protected]
1 (202) 536 1905

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"I will be talking about ChatOps and ChatOps as a way to solve some problems in the DevOps space," explained Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...