Welcome!

News Feed Item

Groundbreaking Report Commissioned by Born Free USA Uncovers Ivory Supply Chain from Poached African Elephants to Markets in Asia

"Chinese traffickers are present in virtually every African range state, and operate at nearly every point along the ivory supply chain," according to new report

WASHINGTON, Aug. 27, 2014 /PRNewswire-USNewswire/ -- Today, Born Free USA and C4ADS released a groundbreaking report, Out of Africa: Mapping the Global Trade in Illicit Elephant Ivory, which focuses on the ivory supply chain and the trafficking of ivory from the bush in Africa to retail markets tens of thousands of miles away in Asia. This information comes four months after the groups' shocking report, Ivory's Curse: The Militarization and Professionalization of Poaching in Africa, which detailed the poaching crisis and its links to violent militias, organized crime, and government corruption. View the full report at www.bornfreeusa.org/OutOfAfrica

According to Adam M. Roberts, CEO of Born Free USA, "The ivory trade is operating today at the highest level since the 1989 commercial ivory trade ban. Our investigation reveals that between 2009 and June 2014, there were more than 90 large-scale ivory seizures, collectively weighing almost 170 tons that bear the hallmarks of international organized crime. This would amount to approximately 229,729 elephants killed and trafficked in fewer than six years."

"It is well known that East Asian nationals, and, in particular, the Chinese, drive the modern ivory trade. However, the scale we found in our investigation was shocking; Chinese traffickers are present in virtually every single African range state, and operate at nearly every point along the ivory supply chain," Roberts explains.  

Varun Vira, Chief of Analysis at C4ADS and co-author of the report commissioned by Born Free USA, said, "The ivory trade is worth billions of dollars but is still talked about as if it were an unprofessional, disorganized, and artisanal industry, of concern only to conservationists. In reality, it is a highly organized, complex global crime that has avoided consequence for decades. However, our report reveals that there may be as few as 100 large-scale ivory containers moving annually that drive the vast majority of the entire illegal trade. Focusing efforts on intercepting these containers and tracing back their owners and facilitators can have a real impact on the trade." 

Out of Africa provides a detailed examination of the illicit ivory supply chain, including: 

  • Illegal ivory flows primarily in containers through the international shipping system. At least 100 containers may be moving annually, the majority through a small number of chokepoints.
  • A large majority of all of the illegal ivory is accounted for within a small number of transactions; through a small number of ports and airports; and to a small number of criminal networks.
  • Just the three ports of Mombasa, Dar es Salaam, and Zanzibar in Kenya and Tanzania exit the majority of shipments, pointing to the need for more carefully-targeted enforcement efforts.
  • The top three airports in the chain are in Nairobi, Addis Ababa, and Johannesburg.
  • Traffickers able to operate from the forest to the market can earn more than 2,500% in profit margins.
  • Ivory and wildlife trafficking networks operate within a networked black market that has a high degree of convergence with other forms of organized crime activity. Ivory traffickers do not necessarily run guns or narcotics themselves, but they rely on -- and help enrich -- facilitators who are interwoven into the systems that enable terrorist financing, drugs, weapons, and human trafficking.

Roberts adds, "The greatest challenge to combat the wildlife trade is a lack of adequate information on how the trade functions. Our report seeks to bridge that gap, providing actionable insights, and replicable and scalable processes, to help mobilize tangible action for the policy, intelligence, and law enforcement communities." 

The Born Free USA team has focused on wildlife trafficking for more than two decades, and advocated vociferously for the 1989 Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) uplisting of African elephants to Appendix I, thus shutting down the commercial international trade in elephant ivory. The organization maintains a global wildlife trade program and is at the forefront of campaigns to protect imperiled species, including from the trade in elephant ivory, rhino horn, tiger bone, lion trophies, and bear gallbladders.

Through litigation, legislation, and public education, Born Free USA leads vital campaigns against animals in entertainment, exotic "pets," trapping and fur, and the destructive international wildlife trade. Born Free USA brings to North America the message of "compassionate conservation" — the vision of the U.K.-based Born Free Foundation, established in 1984 by Bill Travers and Virginia McKenna, stars of the iconic film "Born Free," along with their son Will Travers. Born Free's mission is to end suffering of wild animals in captivity, conserve threatened and endangered species, and encourage compassionate conservation globally. More at www.bornfreeusa.org; www.twitter.com/bornfreeusa; and www.facebook.com/bornfreeusa.

C4ADS is a 501c3 nonprofit organization dedicated to data-driven analysis and evidence-based reporting of conflict and security issues worldwide. C4ADS' approach leverages nontraditional investigative techniques and emerging analytical technologies. The organization recognizes the value of working on the ground in the field, capturing local knowledge, and collecting original data to inform analysis, as well as employing cutting-edge technology to manage and analyze data. The result is an innovative analytical approach to conflict prevention and mitigation. More at www.c4ads.org.

SOURCE Born Free USA

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...