|By PR Newswire||
|April 21, 2014 06:05 AM EDT||
WASHINGTON, April 21, 2014 /PRNewswire-USNewswire/ -- Today, Born Free USA and C4ADS released "Ivory's Curse: The Militarization and Professionalization of Poaching in Africa," one of the most shocking, rigorous and in-depth analyses of elephant poaching and the ivory trade to date. The report examines links to violent militias, organized crime, government corruption, and ivory trade to Asia. It further exposes the widespread transnational illicit participants deeply interwoven into the system that moves ivory. The full report is available at www.bornfreeusa.org/ivoryscurse.
According to Adam Roberts, CEO of Born Free USA, a global leader in wildlife conservation and animal welfare, "The elephant poaching crisis has reached historic levels and, shockingly, some elephant populations face extinction in my lifetime. Born Free USA sought to understand in a more robust way how destabilizing and corrupt individuals, as well as organized crime networks across Africa, place human security at risk and traffic in elephant ivory from slaughtered animals. Clearly, Ivory's Curse shows that defense, military, national security, and foreign policy leaders must play a role in stopping the elephant massacre across the continent."
Roberts explains, "Our findings shine a bright light on Zimbabwe, Mozambique, Tanzania, Sudan, and Kenya, where poachers move across borders with near impunity, slaughter elephants with complete disregard, and use the ivory to fund violent operations across the continent. Global leaders cannot stand by while the human tragedy and poaching crisis continue."
Varun Vira, Senior Analyst at C4ADS and co-author of the report commissioned by Born Free USA, said, "Ivory is a conflict, crime, and corruption issue with severe human impact. It has been a conflict resource for decades, just like blood diamonds or coltan in Central Africa, only without the same level of global attention."
One elephant yields about 20 pounds of ivory worth approximately $30,000. It is estimated that between 35,000 and 50,000 may have been killed in 2013. At this rate, the ivory trade could be worth one billion dollars annually, and will likely increase with the escalating retail price of ivory.
Ivory's Curse provides detailed regional case studies on the ivory trade, including:
- From Sudan, government-allied militias complicit in the Darfur genocide fund their operations by poaching elephants hundreds of miles outside North Sudan's borders.
- In the DRC, state security forces patronize the very rebels they are supposed to fight, providing them with weapons and support in exchange for ivory.
- Zimbabwean political elites, including those under international sanction, are seizing wildlife spaces that either are, or likely will soon be, used as covers for poaching operations.
- In East Africa, al-Shabaab and Somali criminal networks are profiting off Kenyan elephants killed by poachers using weapons leaked from local security forces.
- Mozambican organized crime has militarized and consolidated to the extent it is willing to battle the South African army and well-trained ranger forces for rhino horn.
- In Gabon and the Republic of Congo, ill-regulated forest exploitation is bringing East Asian migrant laborers, and East Asian organized crime, into contact with Central Africa's last elephants.
- In Tanzania, political elites have aided the industrial-scale depletion of East Africa's largest elephant population.
Vira explains, "Subsistence elephant poaching barely exists anymore. Impoverished locals may pull the triggers but they source to organized crime, which controls the scale of the poaching and nearly all profits. Saving both elephants and local communities will require moving from the bush into the world of global illicit networks in order to target transnational criminal profits. There are infinitely more young Africans willing to shoulder guns and kill elephants than there are containers full of ivory."
Roberts concludes, "No one should ever buy ivory, but they should also contribute resources to organizations like Born Free USA that help equip rangers on the ground, and should pressure political leaders to take action to end the corruption. As long as supply chains remain unbroken and consumer demand remains insatiable, poachers will ply their deadly trade to supply the marketplace."
The Born Free USA team has focused on wildlife trafficking for more than two decades, and advocated vociferously for the 1989 Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) uplisting of African elephants to Appendix I, thus shutting down the commercial international trade in elephant ivory. The organization maintains a global wildlife trade program and is at the forefront of campaigns to protect imperiled species, including from the trade in elephant ivory, rhino horn, tiger bone, lion trophies, and bear gallbladders.
Through litigation, legislation, and public education, Born Free USA leads vital campaigns against animals in entertainment, exotic "pets," trapping and fur, and the destructive international wildlife trade. Born Free USA brings to North America the message of "compassionate conservation" — the vision of the U.K.-based Born Free Foundation, established in 1984 by Bill Travers and Virginia McKenna, stars of the iconic film "Born Free," along with their son Will Travers. Born Free's mission is to end suffering of wild animals in captivity, conserve threatened and endangered species, and encourage compassionate conservation globally. More at www.bornfreeusa.org; www.twitter.com/bornfreeusa; and www.facebook.com/bornfreeusa.
C4ADS is a 501c3 nonprofit organization dedicated to data-driven analysis and evidence-based reporting of conflict and security issues worldwide. C4ADS' approach leverages nontraditional investigative techniques and emerging analytical technologies. The organization recognizes the value of working on the ground in the field, capturing local knowledge, and collecting original data to inform analysis, as well as employing cutting-edge technology to manage and analyze data. The result is an innovative analytical approach to conflict prevention and mitigation. More at www.c4ads.org.
SOURCE Born Free USA
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 07:30 PM EDT Reads: 240
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 07:30 PM EDT Reads: 167
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 07:30 PM EDT Reads: 214
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 07:15 PM EDT Reads: 254
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 07:15 PM EDT Reads: 192
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 8, 2015 07:15 PM EDT Reads: 134
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 07:15 PM EDT Reads: 230
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 07:00 PM EDT
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 07:00 PM EDT Reads: 179
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 07:00 PM EDT Reads: 157
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 06:45 PM EDT Reads: 255
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 06:45 PM EDT Reads: 202
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Oct. 8, 2015 06:00 PM EDT Reads: 134
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 06:00 PM EDT Reads: 225