• About Us
  • Mission
  • Media
  • Blog
  • Contact Us
  • @Asymmetrica_
AsymmetricaAsymmetrica
AsymmetricaAsymmetrica
  • Home

Migration, Trafficking and Network Disruption

Migration, Trafficking and Network Disruption

Migration, Trafficking and Network Disruption

May 1, 2015 No Comments

On Tuesday, April 28th, I had the distinct pleasure and honor to participate in the Thought Leadership Forum at Columbia University’s School of International and Public Affairs (SIPA), a semi-annual event that celebrates the launch of the Journal of International Affairs, the most prestigious academic journal in the field. Columbia University is also my four-time alma mater, so to say I was pleased would be an understatement.

The journal always publishes in a single-issue format: like a book, collecting essays centering on one topic. The current issue is Migration.

Columbia JIA Migration issue

My contribution, Never Mind the Metrics: Disrupting Human Trafficking By Other Means, makes the argument that, unlike the broader category of human migration, human trafficking is particularly challenging to measure and map. Even the UNODC, which has the most comprehensive data, does not have adequate measurements, because it relies on prosecutions of human trafficking in member countries. That is problematic because: a) even in some EU countries there is no statute against human trafficking; b) most human trafficking cases are prosecuted under different statutes, such as prostitution, kidnapping, or labor violations; c) human trafficking does not exist as a term in many languages and it is therefore translated as “to kidnap and sell someone,” which completely misses the point that many victims of trafficking start out as voluntary clients for smuggling who then end up indentured through a debt bondage system.

I argue for an approach that has worked well for us at Asymmetrica: follow the money to find the links to other crimes. There are always links to other crimes: where people move, so do drugs, weapons and money. Trafficking victims also often work in businesses that are also money laundering operations: women in karaoke bars, brothels, massage parlors; men in construction or mining.

Criminal networks are adaptive and extensive. Bringing down one cell involved in one activity has little long-term impact.

Much greater impact is achieved by attacking a network at various points for multiple crimes with several authorities at once. This is what we in security circles call a “swarm tactic.” It requires a sophisticated vulnerability assessment of the network by someone who can oversee and or at least work with different authorities (whether counter-terrorist or counter-organized crime; whether diplomatic, intelligence or law enforcement) and coordinate them to overcome their stovepiped structure and limited budgets. Not only is such a “swarm” effective to disrupt and degrade criminal networks (including those that traffic humans), but it yields far greater bang-for-the-buck efficiencies for the competent law enforcement authorities.

 

 

Loading

Tags: human trafficking; Columbia University; Journal of International Affairs; vulnerability assessment; swarm tactic
No Comments
0
Share

Leave a Reply

Cancel Reply

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

© 2015 · www.asymmetrica.com

  • About Us
  • Mission
  • Media
  • Blog
  • Contact Us
  • @Asymmetrica_
Prev Next