Cultural Racketeering in Egypt—Predicting Patterns in Illicit Activity: Quantitative Tools of the 21St-Century Archaeologist Katie A
Total Page:16
File Type:pdf, Size:1020Kb
Cultural Racketeering in Egypt—Predicting Patterns in Illicit Activity: Quantitative Tools of the 21st-Century Archaeologist Katie A. Paul, The Antiquities Coalition University, revealed the value of technology in continuing to effectively work toward preservation even away from the trenches and baulks (Cunliffe, 2012). Abstract The Arab Spring uprisings of 2011 facilitated social movements Heritage crimes across the world take a number of different that redefined the modern world. These uprisings also served forms: socio-cultural/political destruction or cultural cleansing as the catalyst for cultural racketeering, or the systematic (Mali, Afghanistan, Iraq, Egypt) (Baker, Ismael, & Ismael, theft of art and antiquities by organized criminal syndicates. 2010); illegal excavation carried out by individuals as well as Although the widespread looting and destruction of sites is at the gang and mafia level; criminally organized looting on well known, it is not extensively documented. There are few an industrial scale like that carried out by gangs and mafia, detailed numbers on cultural racketeering in Egypt, and many also known as cultural racketeering (Lehr, 2013); damage and of the numbers that do exist fail to critically examine the issue looting of heritage sites as a result of land encroachment for at large. However, the range of updates that stream from development, agriculture, or squatting (India, Bolivia, Egypt, news reports and social media on the continuous looting and and dozens of other nations worldwide); and museum and destruction of heritage in Egypt since the 2011 revolution has facility looting (Iraq, Afghanistan, Greece, Egypt). Despite provided a new look at a measureable pattern of illicit heritage the evidence for these heritage crimes, there are few numbers crimes. Media and social media reports of heritage threats in that exist on the overall scale of looting and encroachment in Egypt were collected over a three year period and dissected Egypt, the region, or internationally. Many of the numbers that to extract the credible information and demographics that do exist are either outdated or based on estimates or customs each contained. The data was then graphed and analyzed seizures rather than examining the issue at large. for patterns. The graphic analysis demonstrated that both Despite the range of threats to heritage and nations facing individuals and groups seeking to steal Egypt’s cultural heritage crises, Egypt was specifically chosen as the subject patrimony are not selective or prone to single attacks; they of this study because of its unique position of being one undertake their efforts repeatedly and at a variety of places of the few nations that is exposed to all of these threats with clear evidence of recurring patterns and cycles. simultaneously. In addition, the timing of the crisis that Studying these reports provides a route for researchers to caused the security breakdown, serving as the catalyst for the reconcile the lack of traditional data covering huge areas of heritage crimes, correlates with the culmination of increasing land. Examining all of the available information on heritage usage and connectivity in communications and social media crimes to determine patterns is a critical element in identifying technology, which was coincidently one of the driving forces the stage of progress these crimes have reached so that the behind the revolution itself. The same tools that gave voice appropriate course of action can be taken to thwart criminal to the revolutionaries in Egypt also gave a voice to heritage efforts before the scale of the geographic reach widens or advocates and archaeologists across the country as they increases in volume. The post-Arab Spring archaeologists of scrambled to confirm the status of heritage sites and artifacts the twenty-first century must be investigators of the present across the country. as well as the past by navigating technology, politics, security, Illicit antiquities trafficking—or cultural racketeering—is like and economy in order to protect heritage. a virus. It infects a particular population and as news circulate Introduction of the riches available in archaeological finds, the virus Threats to cultural heritage are common the world over. spreads. As opportunistic looting began developing across They do not only affect nations in crisis, developed and the MENA region following the 2011 Arab Spring uprisings, undeveloped nations alike are afflicted with threats to both what began as a local gang trade in many regions gave way to modern and ancient history. Looting does not discriminate industrialized antiquities trafficking operations. among nation, ethnicity, religion, or politics. Indeed, heritage Understanding the problems of cultural racketeering and crimes are one of the largest areas of study to be undertaken cultural cleansing goes beyond the scope of archaeology with so little data to fall back on, and it will be years before alone. It is necessary to understand the characteristics of the we have a clear picture of the greater international issue. issue at hand within the greater environment—is it an issue A comprehensive understanding of heritage issues could of cultural racketeering, cultural cleansing, encroachment, or be more easily achieved through the use of an established something else altogether? framework or pattern to examine the data currently available to us. As the archaeological world seemed to be paralyzed During periods of conflict and crisis, heritage cannot afford by the Arab Spring turmoil, Emma Cunliffe of Durham to wait. By examining information that comes out of events HERITAGE, CONSERVATION & ARCHAEOLOGY 22 KATIE A. PAUL in real time—heritage experts may be able to work with measureable pattern of illicit heritage crimes to be examined. governments to explore potential patterns in looting activity. This study attempts to gain some measurements from the Challenges of Information Reporting and Analysis in a Global heritage incidents in an effort to identify the primary sources Recession and process of looting progression in Egypt. In addition, an Since the outbreak of the global recession, the academic examination of potential patterns in looting progression using community—and in particular social sciences and a combination of the Egypt-focused news and social media humanities—have seen a massive cut in funding on the federal reports alongside archival media research will explore the level. Congressional cuts, along with the across-the-board possibilities of a framework through which to examine other reductions known as sequestration, from 2010 to 2013 resulted crisis-driven heritage crimes around the world. in the largest overall decrease in a three-year period since the The incorporation of social media as a tool for data collection end of the space race (Jhanke, 2015). In fact, during the Arab had a two-fold purpose. First, it allowed for nearly instant Spring and post-Arab Spring years, which have been some updates from some of the world’s foremost Egyptologists of the most crucial years for needed social sciences research, on the status of sites and museums as chaos was unfolding federal funding in these areas was at one of its lowest points. during the revolution. Second, the examination of social media Working and researching in an area that is already underfunded allowed for a first time look at the counter-culture evolving to creates new obstacles in the examination of the post-Arab combat the heritage threats in Egypt that have sharply risen in Spring world. The rapidly shifting socio-political dynamics of the post-revolution years. the Middle East and North African regions in the months and The timing of this massive spread of counter-culture efforts years following January of 2011 required immediate tracking would appear to be a byproduct of the Arab Spring alone, and response to gain an understanding of the ground situation but in fact it results from a combination of the following: the at any given time. Thus, the typical process of seeking out and increased technological development and access per capita applying for a grant in order to conduct vital research leaves that has resulted from globalization; the greater infiltration crucial time gaps during period of conflict and turmoil when of a new generation of technology into the academic sphere information collection and analysis is needed on a nearly daily both within Egypt and abroad; and perhaps most importantly, basis. an international perspective that has shifted toward a greater To seek out vital information during periods of rapidly moving concern for heritage as a result of decades of lessons learned crises we turn to the Arab Spring uprisings. The same force from both our world’s distant and not so distant wars; and of driving the organized protests during the revolutions of the course the Arab Spring. For example, a Pew study released in MENA region also proved to be a vital source of information in February 2014 showed that among Internet users in developing tracking and understanding the Arab Spring on a daily basis: and emerging economies, Egypt has the highest percentage social media. The Arab Spring protestors benefited from the of Internet and smartphone users on social media. Of those free nature of social media, and even when the government Egyptians connected online, 88% of them use social media and banned Internet access, social media organizations such as 82% of users are online daily (Pew Research Center, 2014). Twitter made information sharing and reporting available The archaeological community’s international mobilization by creating a voice-to-tweet feature in order to bypass the via social media created a constant stream of communication Internet blackout (Arthur, 2011). across time zones. Whereas during previous wars (such as Iraq Aside from its obvious values in terms of globalization and or Afghanistan) it would take days or months to understand connectivity, social media also provides information that is the extent of the museum damage based on publically available for free—all that is needed is an internet connection.