Welcome!

News Feed Item

New Report Commissioned by Born Free USA Confirms Organized Crime, Government Corruption, and Militia Links to Elephant Poaching and the Ivory Trade

"Ivory's Curse: The Militarization and Professionalization of Poaching in Africa" reveals similarity between the illicit networks that enable terrorism, weapons, human trafficking, and ivory commercialization

WASHINGTON, April 21, 2014 /PRNewswire-USNewswire/ -- Today, Born Free USA and C4ADS released "Ivory's Curse: The Militarization and Professionalization of Poaching in Africa," one of the most shocking, rigorous and in-depth analyses of elephant poaching and the ivory trade to date. The report examines links to violent militias, organized crime, government corruption, and ivory trade to Asia. It further exposes the widespread transnational illicit participants deeply interwoven into the system that moves ivory. The full report is available at www.bornfreeusa.org/ivoryscurse.

According to Adam Roberts, CEO of Born Free USA, a global leader in wildlife conservation and animal welfare, "The elephant poaching crisis has reached historic levels and, shockingly, some elephant populations face extinction in my lifetime. Born Free USA sought to understand in a more robust way how destabilizing and corrupt individuals, as well as organized crime networks across Africa, place human security at risk and traffic in elephant ivory from slaughtered animals. Clearly, Ivory's Curse shows that defense, military, national security, and foreign policy leaders must play a role in stopping the elephant massacre across the continent." 

Roberts explains, "Our findings shine a bright light on Zimbabwe, Mozambique, Tanzania, Sudan, and Kenya, where poachers move across borders with near impunity, slaughter elephants with complete disregard, and use the ivory to fund violent operations across the continent.  Global leaders cannot stand by while the human tragedy and poaching crisis continue."

Varun Vira, Senior Analyst at C4ADS and co-author of the report commissioned by Born Free USA, said, "Ivory is a conflict, crime, and corruption issue with severe human impact. It has been a conflict resource for decades, just like blood diamonds or coltan in Central Africa, only without the same level of global attention."

One elephant yields about 20 pounds of ivory worth approximately $30,000. It is estimated that between 35,000 and 50,000 may have been killed in 2013. At this rate, the ivory trade could be worth one billion dollars annually, and will likely increase with the escalating retail price of ivory.

Ivory's Curse provides detailed regional case studies on the ivory trade, including:

  • From Sudan, government-allied militias complicit in the Darfur genocide fund their operations by poaching elephants hundreds of miles outside North Sudan's borders.
  • In the DRC, state security forces patronize the very rebels they are supposed to fight, providing them with weapons and support in exchange for ivory.
  • Zimbabwean political elites, including those under international sanction, are seizing wildlife spaces that either are, or likely will soon be, used as covers for poaching operations.
  • In East Africa, al-Shabaab and Somali criminal networks are profiting off Kenyan elephants killed by poachers using weapons leaked from local security forces.
  • Mozambican organized crime has militarized and consolidated to the extent it is willing to battle the South African army and well-trained ranger forces for rhino horn.
  • In Gabon and the Republic of Congo, ill-regulated forest exploitation is bringing East Asian migrant laborers, and East Asian organized crime, into contact with Central Africa's last elephants.
  • In Tanzania, political elites have aided the industrial-scale depletion of East Africa's largest elephant population.

Vira explains, "Subsistence elephant poaching barely exists anymore. Impoverished locals may pull the triggers but they source to organized crime, which controls the scale of the poaching and nearly all profits. Saving both elephants and local communities will require moving from the bush into the world of global illicit networks in order to target transnational criminal profits. There are infinitely more young Africans willing to shoulder guns and kill elephants than there are containers full of ivory."

Roberts concludes, "No one should ever buy ivory, but they should also contribute resources to organizations like Born Free USA that help equip rangers on the ground, and should pressure political leaders to take action to end the corruption. As long as supply chains remain unbroken and consumer demand remains insatiable, poachers will ply their deadly trade to supply the marketplace."   

The Born Free USA team has focused on wildlife trafficking for more than two decades, and advocated vociferously for the 1989 Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) uplisting of African elephants to Appendix I, thus shutting down the commercial international trade in elephant ivory. The organization maintains a global wildlife trade program and is at the forefront of campaigns to protect imperiled species, including from the trade in elephant ivory, rhino horn, tiger bone, lion trophies, and bear gallbladders.

Through litigation, legislation, and public education, Born Free USA leads vital campaigns against animals in entertainment, exotic "pets," trapping and fur, and the destructive international wildlife trade. Born Free USA brings to North America the message of "compassionate conservation" — the vision of the U.K.-based Born Free Foundation, established in 1984 by Bill Travers and Virginia McKenna, stars of the iconic film "Born Free," along with their son Will Travers. Born Free's mission is to end suffering of wild animals in captivity, conserve threatened and endangered species, and encourage compassionate conservation globally. More at www.bornfreeusa.org; www.twitter.com/bornfreeusa; and www.facebook.com/bornfreeusa.

C4ADS is a 501c3 nonprofit organization dedicated to data-driven analysis and evidence-based reporting of conflict and security issues worldwide. C4ADS' approach leverages nontraditional investigative techniques and emerging analytical technologies. The organization recognizes the value of working on the ground in the field, capturing local knowledge, and collecting original data to inform analysis, as well as employing cutting-edge technology to manage and analyze data. The result is an innovative analytical approach to conflict prevention and mitigation. More at www.c4ads.org.

SOURCE Born Free USA

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver secure solutions for storing and moving sensitive financial data around the world without touching terrestrial networks. In his session at 20th Cloud Expo, Cliff Beek, President of Cloud Constellation Corporation, d...
Deep learning has been very successful in social sciences and specially areas where there is a lot of data. Trading is another field that can be viewed as social science with a lot of data. With the advent of Deep Learning and Big Data technologies for efficient computation, we are finally able to use the same methods in investment management as we would in face recognition or in making chat-bots. In his session at 20th Cloud Expo, Gaurav Chakravorty, co-founder and Head of Strategy Development ...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
There is only one world-class Cloud event on earth, and that is Cloud Expo – which returns to Silicon Valley for the 21st Cloud Expo at the Santa Clara Convention Center, October 31 - November 2, 2017. Every Global 2000 enterprise in the world is now integrating cloud computing in some form into its IT development and operations. Midsize and small businesses are also migrating to the cloud in increasing numbers. Companies are each developing their unique mix of cloud technologies and service...
Cloud resources, although available in abundance, are inherently volatile. For transactional computing, like ERP and most enterprise software, this is a challenge as transactional integrity and data fidelity is paramount – making it a challenge to create cloud native applications while relying on RDBMS. In his session at 21st Cloud Expo, Claus Jepsen, Chief Architect and Head of Innovation Labs at Unit4, will explore that in order to create distributed and scalable solutions ensuring high availa...
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, presented an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He then expounded on the industry issues he frequently came up against as an analyst, and ...
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across supply chain networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost and time for product recall as well as advance trade. Are you curious about Blockchain and how it can provide you with new opportunities for innovation and growth? In her session at 20th Cloud Exp...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...