Advertisement

Introduction: Setting the Stage

  • Stuart S. BrownEmail author
  • Margaret G. Hermann
Chapter
Part of the International Political Economy Series book series (IPES)

Abstract

“It is a dream come true for criminals and terrorists to find a place where no one can look for them, and where they can mix with, ally with … and work with minimum interference from legal authority” (Levitsky, International Studies Review 10: 392–395, 2008). These safe havens have been called a variety of names from ‘dark corners’ (Crane, International Studies Review 10: 387–391, 2008) to “geopolitical black holes” (Naim, Illicit: How Smugglers, Traffickers, and Copycats Are Hijacking the Global Economy. New York: Anchor Books, 2005)—areas governed by transnational criminal, terrorist, and insurgent organizations that are outside effective state-based government control and are sustained by illicit economic activities. The Daniel Patrick Moynihan Institute of Global Affairs in its Mapping Global Insecurity Project has, to date, identified 150 such places around the globe and completed in-depth case studies of 80. We call these geographic locations ‘black spots,’ recognizing that they represent particular locations that do not fit within our usual definitions of a state. Much like the black holes in astronomy that defy the laws of Newtonian physics, these black spots defy the world as defined by the Westphalian state system. In effect, they provide us with a map of the world as viewed through the eyes of organizations engaged in transnational criminal activities. These black spots are the nodes connecting and facilitating the illicit activities of such organizations and their trafficking in drugs, weapons, people, money, natural resources, household goods, and violence. This chapter sets the stage for the rest of the book, describing the project, its methodology, and the various research questions it was intended to address such as the nature of black spots; how they are governed, financed, and operate; and how they challenge us to rethink sovereignty and the global economy. Throughout the book, we use examples from 80 in-depth case studies and the data that have resulted from asking the same questions of each case.

References

  1. Adams, Jackson, and Mohamad Albakajai. 2016. Cyberspace: A New Threat to the Sovereignty of the State. Management Studies 4 (6): 256–265.Google Scholar
  2. Adelman, Jonathan. 2014. Modeling Insecurity Flow Dynamics in Response to Degradation of Illicit Groups’ Safe Havens. Paper Presented at the Annual Meeting of the International Studies Association, Toronto, Canada, March 26–29.Google Scholar
  3. Benavides, E. Ben. 2015. Open Source Intelligence (OSInt) 2ool Kit on the Go. Online Book, Creative Commons.Google Scholar
  4. Calvery, Jennifer Shasky. 2012. Combating Transnational Organized Crime: International Money Laundering as a Threat to Our Financial System. Statement before the Subcommittee on Crime, Terrorism, and Homeland Security, Committee on the Judiciary, United States House of Representatives, February 8.Google Scholar
  5. Crane, David M. 2008. Dark Corners: The West African Joint Criminal Enterprise. International Studies Review 10: 387–391.Google Scholar
  6. George, Alexander L. 1979. Case Studies and Theory Development: The Method of Structured, Focused Comparison. In Diplomacy: New Approaches to History, Theory, and Policy, ed. P.G. Lauren. New York: Free Press.Google Scholar
  7. George, Alexander L., and Andrew Bennett. 2005. Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press.Google Scholar
  8. Levitsky, Melvyn. 2008. Dealing with Black Spots of Crime and Terror: Conclusions and Recommendations. International Studies Review 10: 392–395.Google Scholar
  9. Miraglia, P., R. Ochoa, and I. Briscoe. 2012. Transnational Organised Crime and Fragile States. OECD Development Cooperation Working Papers, Paris.Google Scholar
  10. Naim, Moises. 2005. Illicit: How Smugglers, Traffickers, and Copycats Are Hijacking the Global Economy. New York: Anchor Books.Google Scholar
  11. Rastler, John. (2013) Don’t Forget the Drugs: The Impact of Plan Colombia’s Cocaine Flows on US National Security. Master’s Thesis, Hertie School of Governance, Berlin.Google Scholar
  12. Roberts, Elise. 2016. Notes from Marseille, Rotterdam, and Marbella. Memo, Mapping Global Insecurity Project, Moynihan Institute of Global Affairs, July 23.Google Scholar
  13. Spencer, Bree. 2011. Akwesasne: A Complex Challenge to US Northern Security. National Strategy Forum (Special Issue), 20 (3 Summer): 45–50.Google Scholar
  14. Stanislawski, Bartosz H. 2006. Black Spots: Insecurity Beyond the Horizon. Unpublished Doctoral Dissertation, Maxwell School, Syracuse University (Retrieved from ProQuest Political Science. UMI Number: 3251822).Google Scholar
  15. ———. 2011. Black Spots: Breeding Grounds for Terrorism and Transnational Crime. National Strategy Forum (Special Issue), 20 (3 Summer): 5–10.Google Scholar
  16. Stoutzenberger, Timothy and Marc Barnett. 2016. Trafficking Trends in the Migrant Market. Paper presented at the annual meeting of the International Studies Association, Atlanta, March.Google Scholar
  17. Strange, Susan. 2010. The Retreat of the State: The Diffusion of Power in the World. Cambridge: Cambridge University Press.Google Scholar
  18. Van Schendel, Willem. 2005. Spaces of Engagement: How Borderlands, Illicit Flows, and Territorial States Interlock. In Illicit Flows and Criminal Things: States, Borders, and the Other Side of Globalization, ed. Willem van Schendel and Itty Abraham. Bloomington: Indiana University Press.Google Scholar
  19. Walker, Philip. 2011. The World’s Most Dangerous Borders: Afghanistan and Pakistan. Foreign Policy, June 24.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.Moynihan Institute of Global AffairsMaxwell School, Syracuse UniversitySyracuseUSA

Personalised recommendations