Welcome!

News Feed Item

World Wildlife Day Highlights the Dangers of Wildlife Trafficking

TORONTO, ONTARIO -- (Marketwired) -- 02/28/14 -- At a time when the world's wildlife has never been more in danger of criminal exploitation, the United Nations has declared 3rd March World Wildlife Day as a celebration of wild fauna and flora and to raise awareness of illegal trade.

Just in time for World Wildlife Day, a new study published in the journal Biological Conservation describes the trafficking of wildlife and their products as one of the most profitable and attractive of all the illicit trades, possibly surpassed only by the trafficking of arms and drugs.

The article notes that several of the most notorious armed insurgent groups and terrorist organizations, including Darfur's Janjaweed and the Lord's Resistance Army led by the warlord Joseph Kony, among others - all now derive substantial profits from the illegal wildlife trade to fund their incursions, civil wars, and other acts of violence.

"Criminal organizations are systematically exploiting wildlife as a source of financing," said co-author Kelvin Alie of IFAW (International Fund for Animal Welfare). "And the corruption is spreading like a disease - into armies, border guards, police, judiciary, customs officers, embassy personnel, and even state diplomats in several countries, all of whom benefit from and actively facilitate the illegal wildlife trade."

Lead author, Dr Leo Douglas of the Center for Biodiversity and Conservation, American Museum of Natural History (AMNM), remarked: "The trade's attractivness is largely due to its relative lack of social stigma, small risk of arrest, and the woefully light penalties given to those few brought before the courts." Douglas notes that high-value wildlife are particularly attractive to criminal entities because their large scale killing and theft could be done quickly and inexpensively compared to the extraction of other high-value resources such as oil, gas, and most precious metals. "Wildlife products are classic "lootable resources," a subset of high-value natural resources that are relatively easy to steal, but particularly challenging to monitor from a crime-management perspective," said Douglas. Other natural resources that fall into this category include alluvial diamonds and gemstones, such as rubies.

The authors note that not only is the wildlife trade attracting huge profits, an extimated US$20-billion a year, criminologists have found that wildlife now serves a specialized role as "a form of currency" for terrorist and criminal organizations. Because wildlife commodities become the basis for the trade of drugs, ammunition, and humans, and a substitute for cash, the illegal wildlife trade has thus grown into a highly efficient form of money-laundering. Such exchanges appear particularly common among larger, more sophisticated criminal networks and terrorist organizations working across international borders.

The study illuminates that not only has the lucrative nature of the wildlife trade encouraged high-level corruption, and violence surrounding the mass-killing of large charismatic wildlife (such as lions, tigers, elephants, gorillas and rhinos), there was also simultaneously a more ominous dimension as rebel groups, insurgencies, and terror organizations were now also actively seeking out, capturing, and appropriating the profits of eco-tourism enterprises. For example, seizing on the profitability of high-value gorilla tourism, Congolese rebels murdered wildlife officers and captured licensed ecotourism operations only to begin their own to fulfill their economic ends. Similarly in Nepal, Maoist rebels have captured protected areas to begin unlicensed eco-tourism and trophy-hunting businesses to attract high-paying tourists.

Ecotourism is central to the tourism products and national economies for nations such as Botswana, Kenya, South Africa, and Tanzania.

"We are witnessing unprecedented attacks on wildlife and genuine ecotourism operations by emboldened criminals. Tackling wildlife crime can and must become a priority - not just for the sake of the animals and conservation but for national security and long-term economic sustainability," said Alie.

Trafficked wildlife is frequently smuggled under harrowing conditions in which many individuals die in transit. Because global demand for some species exceeds biological capacity, local or total extinctions of some species or sub-species have resulted. For example, several Rhino species or sub-species now face extinction. At risk of extinction due to poaching are also Sun Bears, Clouded Leopards, forest elephants, gorillas, tigers, orangutans, pangolins, among several other species. To stem this threat Douglas remarks that conservationists must actively link their knowledge about threatened wildlife to the international development, security, and political concerns with which the wildlife trade has become inextricably conjoined.

Please cite this article in press as: Douglas, L.R., Alie, K. High-value natural resources: linking wildlife conservation to international conflict, insecurity, and development concerns. Biol. Conserv. (2014), http://dx.doi.org/10.1016/j.biocon.2014.01.031

For more information, and to arrange an interview, please contact Leo R. Douglas or Kelvin Alie.

Contacts:
Res (Andreas) Krebs
Communications Officer
IFAW Canada
(416) 669-3459
[email protected]

Leo R. Douglas
Center for Biodiversity and Conservation
American Museum of Natural History (AMNH), New York City
[email protected] or [email protected]
1 (876) 807-4971

Kelvin Alie
Wildlife Trade Program
International Fund for Animal Welfare, Washington DC
[email protected]
1 (202) 536 1905

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"The reason Tier 1 companies are coming to us is we're able to narrow the gap where custom applications need to be built. They provide a lot of services, like IBM has Watson, and they provide a lot of hardware but how do you bring it all together? Bringing it all together they have to build custom applications and that's the niche that we are able to help them with," explained Peter Jung, Product Leader at Pulzze Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2,...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation of electronic systems, in CAD / CAM deployment, and also is a designer and manufacturer of advanced 3D scanners for professional applications.