Interdependency and Commitment Escalation As Mechanisms of Illicit Network Failure

Total Page:16

File Type:pdf, Size:1020Kb

Interdependency and Commitment Escalation As Mechanisms of Illicit Network Failure Global Crime ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/fglc20 Cumulative disruptions: interdependency and commitment escalation as mechanisms of illicit network failure Michelle D. Fabiani & Brandon Behlendorf To cite this article: Michelle D. Fabiani & Brandon Behlendorf (2020): Cumulative disruptions: interdependency and commitment escalation as mechanisms of illicit network failure, Global Crime, DOI: 10.1080/17440572.2020.1806825 To link to this article: https://doi.org/10.1080/17440572.2020.1806825 View supplementary material Published online: 01 Sep 2020. Submit your article to this journal View related articles View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=fglc20 GLOBAL CRIME https://doi.org/10.1080/17440572.2020.1806825 ARTICLE Cumulative disruptions: interdependency and commitment escalation as mechanisms of illicit network failure Michelle D. Fabiani a and Brandon Behlendorfb aDepartment of Social Sciences, Homeland Security Program,DeSales University, Center Valley, PA, USA; bCollege of Emergency Preparedness, Homeland Security, and Cybersecurity, University at Albany (State University of New York), Albany, USA ABSTRACT ARTICLE HISTORY Disruptions can take many forms resulting from both internal and Received Rxx xxxx xxxx external tensions. How illicit networks fail to adapt to a wide range Accepted Axx xxxx xxxx of disruptions is an important but understudied area of network KEYWORDS analysis. Moreover, disruptions can be cumulative, constraining the Criminal networks; network possible set of subsequent adaptations for a network given pre­ failure; escalation of vious investments. Drawing from a multi-national/multi-year inves­ commitment; tigation of a prominent Chinese human smuggling network interdependency; human operated by Cheng Chui Ping (‘Sister Ping’), we find that the net­ smuggling; cumulative work’s failure was a product of two interrelated factors. First, efforts disruption to scale the network to meet increased demand made the network more interdependent, adding new members and increasing vulner­ abilities to internal disruptions. Second, internal and external dis­ ruptions during a shipment cumulatively constrained the network’s ability to adapt, forcing the network to escalate their commitment rather than abandon the transit. The results suggest network dis­ ruptions should be examined holistically to improve our under­ standing of network failure. Introduction Network disruption is a central problem in the study of smuggling and trafficking net­ works. The removal of key nodes and subsequent network adaptation form the primary disruptive interaction between the state and illicit actors1. When pressure is applied, the removal of these nodes can substantially alter the organisation’s capabilities, depending on how the network adapts. For many, the fluid nature of the network itself (i.e. the ability to incorporate new actors into the network) allows them to rapidly adjust and continue operations2. In focusing on adaptation, however, illicit network resilience tends to be over­ emphasised, producing paradoxical conclusions. Adaptation in an illicit network is explained as both a response to successful interdictions (e.g. forcing new pathways, nodes, modes of transportation, etc.) and as a reason behind the interdiction’s failure3. For example, Bright & Delaney conclude that a network’s resilience resulted CONTACT Michelle D. Fabiani [email protected] Brisson Hall 209, 2755 Station Ave, DeSales University, Center Valley, PA 18034 Supplemental data for this article can be accessed here. © 2020 Informa UK Limited, trading as Taylor & Francis Group 2 M. FABIANI AND B. BEHLENDORF from their adaptation to what would otherwise be termed ‘successful’ law enforce­ ment interdictions (i.e. arrest, prosecution, and sentencing of a central node).4 Thus, successful interdictions can produce successful adaptations, casting the network as resilient and flexible. In contrast, little is known about how illicit networks fail to successfully adapt, whether to external disruptions from law enforcement or internal interpersonal dynamics5. Qualitative approaches to criminal organisations, including Chinese humans smuggling groups6, focus on dynamics of illicit organisations (e.g. classifying types of groups based on their activities, goals, etc.), how different social-behavioural characteristics influence the organisation’s success (e.g. social embeddedness, trust, etc.). Quantitative approaches evaluate key structural changes, such as network fragmentation and resilience7. Yet, leaders overreach, distributors act irrationally, and transporters fail to fix broken taillights. Characteristics such as flexibility, resilience, and adaptability could be strengths or weak­ nesses, depending on the potential vulnerabilities introduced8. Examining network failure requires looking at both structural adaptations to disruption and the dynamic responses that led to those adaptations. The emphasis on understanding structural changes in the illicit network literature provides a complement to the focus on behavioural decision- making that dominates the qualitative literature. Moreover, most analyses (qualitative or network-based) ignore the potentially cumula­ tive aspect of disruptions. Studies on adaptation regularly rely on single points in time9, while ethnographic approaches address emergent behaviours across time. Yet, interven­ tions by law enforcement could lead to structural changes in the network that create opportunities for future interdictions. Leadership changes in response to interdiction can generate internal conflict, leading to operational errors that make the network more visible and vulnerable to law enforcement intervention. Thus, what is missing is an examination of suboptimal adaptations from both a historical and structural perspective. Including the potential for suboptimal adaptations allows for a more complete examination a network’s evolution in response to multiple interdictions and external disruptions, which may or may not become more resilient10. Similarly, combining historical and network approaches offers an opportunity to examine the process of network failure in more detail. To expand our understanding of how illicit networks11 can fail to adapt, we focus on a single case study of a Chinese human smuggling network operated by Cheng Chui Ping (‘Sister Ping’). We trace how the cumulative responses to internal and external disruptions not only increased the network’s vulnerability to interdiction, but ultimately led to its failure. We present one possible path to network failure, demonstrated via our mixed- method case study combining social network and historical analyses. Below is a brief review of the literature on network failure and criminal organisational decision-making, followed by overviews of the proposed path to network failure and the Sister Ping network. Data and methods are discussed in the next section followed by a detailed presentation of the findings. Lastly, we consider the implications and limitations of the results with respect to network failure. Network failure and organisational decision-making Although fluid in nature, illicit network structures are shaped by both internal and external forces12. Covert networks need to balance security from law enforcement and GLOBAL CRIME 3 external disruptions with efficiency of internal operations. This requires a structure that is easily concealable, allows for rapid diffusion of information, and is robust to disrup­ tion. For example, Xu and Chen found that many covert or illicit networks exhibit structures with small-world properties, where members (‘nodes’) are highly clustered and connected to all others through a short average number of connections (‘edges’ – typically less than six)13. Clusters ease rapid information diffusion, making the network more difficult to disrupt as a single person removed from the cluster can be easily replaced14. Decision-making also plays an important role in the success of an illicit organisation. Though it is not possible to observe these processes directly, scholars have used both empirical and qualitative approaches to examine the inner workings of these groups. The illicit network literature has identified several characteristics of successful networks that work to their advantage in decision-making, including flexibility or fluidity adaptability and resiliency15. Flexibility refers to the ease with which membership, structure, and operations can change within a network. Relatedly, adaptability can be described as the ability for a network to change in response to pressure16. Resilience refers to ‘the ability of market participants to preserve the existing levels of exchanges between buyers and sellers despite external pressure aimed at disrupting the trade.’17 These concepts are interconnected – for a network to be adaptable, it must be flexible and networks that are resilient are often also adaptable and flexible18. Of these, flexibility – or the ease with which membership, structure, and operations can change within a network – is the most commonly discussed in the literature and often facilitates other characteristics19. For example, Williams identified that individuals will move in and out of an illicit network as they see fit, depending on the opportunities and needs for their services20. When new skills are required, networks can expand quickly and at
Recommended publications
  • Submitted for the Phd Degree at the School of Oriental and African Studies, University of London
    THE CHINESE SHORT STORY IN 1979: AN INTERPRETATION BASED ON OFFICIAL AND NONOFFICIAL LITERARY JOURNALS DESMOND A. SKEEL Submitted for the PhD degree at the School of Oriental and African Studies, University of London 1995 ProQuest Number: 10731694 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10731694 Published by ProQuest LLC(2017). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 A b s t ra c t The short story has been an important genre in 20th century Chinese literature. By its very nature the short story affords the writer the opportunity to introduce swiftly any developments in ideology, theme or style. Scholars have interpreted Chinese fiction published during 1979 as indicative of a "change" in the development of 20th century Chinese literature. This study examines a number of short stories from 1979 in order to determine the extent of that "change". The first two chapters concern the establishment of a representative database and the adoption of viable methods of interpretation. An important, although much neglected, phenomenon in the make-up of 1979 literature are the works which appeared in so-called "nonofficial" journals.
    [Show full text]
  • China Assessment October 2001
    CHINA COUNTRY ASSESSMENT October 2001 Country Information and Policy Unit CONTENTS 1. SCOPE OF DOCUMENT 1.1 - 1.5 2. GEOGRAPHY 2.1 - 2.26 Geographical area 2.1 - Jiangxi province 2.2 - 2.16 Population 2.17 Names / Surnames / clan names 2.18 - 2.20 Language 2.21 - 2.26 3. HISTORY 3.1 –3.54 pre-1993: 3.1 - 3.2 1966-76 Cultural Revolution 3.3 - 3.5 1978-89 and economic reform 3.6 - 3.9 1989 Tiananmen Square 3.10 - 3.12 Post-Tiananmen 3.13 -3.14 1993-present: 3.15 - 3.33 Crime and corruption 3.15 - 3.24 Criminal activity 3.25 - 3.28 Government leadership 3.29 Economic reform 3.30 - 3.34 Currency 3.35 1999: Anniversaries 3.36 - 3.37 International relations 3.38 - 3.39 "One country, two systems" issues 3.40 - 3.54 Relations with Taiwan 3.40 - 3.43 Hong Kong: 3.44 - 3.46 Elections 3.47 Dissidence 3.48 -3.50 Mainland born children 3.51 Vietnamese boat people 3.52 Macao 3.53 - 3.54 IV: INSTRUMENTS OF THE STATE 4.1 - 4.49 Government and the Constitution 4.1 - 4.20 Political structure 4.4 General overview 4.6 - 4.10 Village committees 4.11 - 4.19 Neighbourhood committees 4.20 Legal framework 4.21 Criminal Law 4.23 Criminal Procedure Law 4.25 State Compensation Law 4.25 Regulation changes 4.28 Appeals 4.29 Land law 4.34 Security situation 4.37 - 4.33 Shelter and investigation 4.38 Re-education through labour 4.39 Police 4.40 - 4.46 Armed Forces, Military conscription and desertion 4.47 - 4.49 5.
    [Show full text]
  • The Model Minority Myth and Unauthorized Asian Immigrants
    An Invisibility Cloak: The Model Minority Myth and Unauthorized Asian Immigrants Denny Chan* Introduction ................................................................................................................... 1281 I. The Case for Unauthorized Immigration as a Latino Issue ............................... 1282 A. Evidence from the World Wide Web ..................................................... 1283 B. Legislative Evidence ................................................................................... 1283 C. Public Commentary .................................................................................... 1287 II. Reasons Why Latinos and the Unauthorized Are Conflated ........................... 1288 A. Powerful Numbers and Rapid Growth ................................................... 1288 B. Geographic Proximity ................................................................................ 1290 C. Economic Factors ....................................................................................... 1290 D. Classism and Colorism .............................................................................. 1291 III. Asian Americans and Unauthorized Immigration ............................................ 1293 A. Discrimination Against Asian Americans and Asian Immigrants ...... 1293 B. Asian Immigrants with Unauthorized Status ......................................... 1295 C. The Model Minority Myth at Work ......................................................... 1298 Conclusion: Thoughts on Interracial
    [Show full text]
  • Characteristics of Chinese Human Smugglers: a Cross-National Study, Final Report
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Characteristics of Chinese Human Smugglers: A Cross-National Study, Final Report Author(s): Sheldon Zhang ; Ko-lin Chin Document No.: 200607 Date Received: 06/24/2003 Award Number: 99-IJ-CX-0028 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. THE CHARACTERISTICS OF CHINESE HUMAN SMUGGLERS ---A CROSS-NATIONAL STUDY to the United States Department of Justice Office of Justice Programs National Institute of Justice Grant # 1999-IJ-CX-0028 Principal Investigator: Dr. Sheldon Zhang San Diego State University Department of Sociology 5500 Campanile Drive San Diego, CA 92 182-4423 Tel: (619) 594-5449; Fax: (619) 594-1325 Email: [email protected] Co-Principal Investigator: Dr. Ko-lin Chin School of Criminal Justice Rutgers University Newark, NJ 07650 Tel: (973) 353-1488 (Office) FAX: (973) 353-5896 (Fa) Email: kochinfGl,andronieda.rutgers.edu- This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • Insight TF Nstlr
    November 2005 ■ No. 7 SUMMARY Beginning with immigration inspectors who patrolled on horseback, border US Border Enforcement: enforcement traditionally has focused on the Southwest border. The issue From Horseback grew in prominence during the 1970s following the implementation of per- to High-Tech country limits on legal immigration and the earlier termination of the US- Deborah Waller Meyers Mexican Bracero program. Border Patrol funding has grown more than I. Introduction 500 percent over the last two decades, as legislative and policy Borders are a concrete representation of a nation’s statehood, changes (including 1986 immigration as each state seeks to control entries into its sovereign terri- reform and a new 1994 border tory. Indeed, the ultimate responsibility of a government is to control strategy of “prevention safeguard the security and well-being of its citizens. In the through deterrence”) specified minds of the American public, the term “border enforce- concentrated and enhanced personnel ment” conjures images of Border Patrol agents in green uni- and technological resources. During forms, trying to prevent the entry of drugs, thugs, and illegal this time, immigration control and immigrants along a relatively uncontrolled, and at times drug enforcement efforts at the chaotic, US-Mexico border. And for most of the 20th century, border became intertwined, and that was an accurate characterization, as enforcement military tactics and equipment were resources were allocated in that manner. adapted for both efforts. Genuine border enforcement, however, consists of integrating The scope of border enforcement the work, resource allocation, and information capacity of all efforts widened approaching the ports of entry—including northern and southern land bor- millennium to include the northern ders, airports, and seaports—as well as the territory between border, airports, and seaports.
    [Show full text]
  • Good Things Come to Those Who Wait? Reconsidering Indeterminate and Indefinite Detention As Tools in U.S
    GOOD THINGS COME TO THOSE WHO WAIT? RECONSIDERING INDETERMINATE AND INDEFINITE DETENTION AS TOOLS IN U.S. IMMIGRATION POLICY MICHAEL S. VASTINE* Introduction Detention of deportable immigrants is a major component of the United States' immigration enforcement policy. Our cultural consciousness is rife with examples of detention practice throughout our history and detention is a part of our immigrant tradition. European immigrants passed through Ellis Island quickly unless a reason, usually health-based, was presented to justify detention. This is so pervasive in our national mythology that even the fictional Vito Corleone of The Godfather movies was quarantined at Ellis Island for three months for smallpox infection. As a parallel model, in the early twentieth century the majority of Asian immigrants were processed and potentially detained at Angel Island in San Francisco Bay.1 In the early 1990s, political instability in Haiti led to a mass exodus of refugees who eventually were housed on the U.S. naval * Michael S. Vastine is Assistant Professor and Director of the Immigration Clinic at St. Thomas University School of Law. 1 See generally Angel Island, State Park, San Francisco, www.angelisland.com/immigration-station/index.php. Angel Island is now a California State Park. The website stated: In 1905, construction of the [Angel Island] U.S. Immigration Station began. It became a detention facility, where Asian (primarily Chinese) immigrants were detained until they could prove they were joining relatives already in the country. The average detention lasted two to three weeks, but many lasted several months. Some people were forced to stay for nearly two years.
    [Show full text]
  • China, Country Information
    China, Country Information CHINA COUNTRY ASSESSMENT April 2003 Country Information and Policy Unit I SCOPE OF DOCUMENT II GEOGRAPHY III ECONOMY IV HISTORY V STATE STRUCTURES VIA HUMAN RIGHTS ISSUES VIB HUMAN RIGHTS: SPECIFIC GROUPS VIC HUMAN RIGHTS: OTHER ISSUES ANNEX A: CHRONOLOGY OF EVENTS ANNEX B: POLITICAL ORGANISATIONS ANNEX C: PROMINENT PEOPLE ANNEX D: GLOSSARIES ANNEX E: CHECKLIST OF CHINA INFORMATION PRODUCED BY CIPU ANNEX F: REFERENCES TO SOURCE MATERIAL 1. SCOPE OF DOCUMENT 1.1 This assessment has been produced by the Country Information and Policy Unit, Immigration and Nationality Directorate, Home Office, from information obtained from a wide variety of recognised sources. The document does not contain any Home Office opinion or policy. 1.2 The assessment has been prepared for background purposes for those involved in the asylum / human rights determination process. The information it contains is not exhaustive. It concentrates on the issues most commonly raised in asylum / human rights claims made in the United Kingdom. 1.3 The assessment is sourced throughout. It is intended to be used by caseworkers as a signpost to the source material, which has been made available to them. The vast majority of the source material is readily available in the public domain. 1.4 It is intended to revise the assessment on a six-monthly basis while the country remains within the top 35 asylum-seeker producing countries in the United Kingdom. 2. GEOGRAPHY file:///V|/vll/country/uk_cntry_assess/apr2003/0403_China.htm[10/21/2014 9:56:46 AM] China, Country Information Geographical Area 2.1. The People's Republic of China (PRC) covers 9,571,300 sq km of eastern Asia, with Mongolia and Russia to the north; Tajikistan, Kyrgyzstan and Kazakstan to the north-west; Afghanistan and Pakistan to the west; India, Nepal, Bhutan, Myanmar, Laos and Vietnam to the south; and Korea in the north-east.
    [Show full text]
  • The Rise and Fall of Chinatown in Contemporary America Golden
    Recent Arrivals from the Middle Kingdom: The Rise and Fall of Chinatown in Contemporary America Russell Duncan, University of Copenhagen Lecture description. The people of Chinese America are a part of the greater diaspora of bodies involved in a many-centuries-long migration from China to everywhere. In this sense, globalization with its border crossings, communications systems and transportation conveyances is nothing new. And yet, in the 21st Century, the migratory volume of Chinese students, ”parachute kids,” transnational business people, brides and husbands, adopted children, and undocumented workers is unprecedented. In 2012, the United States ranks fourth in the world in the total number of citizens with Chinese ancestry living inside its borders. This lecture focuses on the current contours of the newest “first generation” of American-born Chinese (ABCs) and Chinese-born Americans (CBAs). The old inner-city Chinatowns full of bachelor populations are being replaced by the growing ethnoburbs of family life and political power of “model minority” citizens, and others not so well praised. Seminar focus questions: 1. How do family members and stories shape the identity and destiny of the migrant after his arrival to a new country? 2. Yiyun Li says, “But the story I am telling you, it is not over yet.” What do stories tell us about the right time and factors necessary for narration? 3. In what ways does Zhao’s essay confront both the “perpetual foreigner” and the “model minority” sobriquets that are often used to describe Chinese Americans? Essential reading: Ha Jin, “The Bane of the Internet,” A Good Fall (NY: Pantheon, 2009).
    [Show full text]
  • Why Immigrants Benefit the United States Economy and the Legal and Tax Issues Chinese, Filipinos and Vietnamese Face When Immigrating to the U.S
    Golden Gate University School of Law GGU Law Digital Commons Theses and Dissertations Student Scholarship 4-14-2016 Why Immigrants Benefit the nitU ed States Economy and the Legal and Tax Issues Chinese, Filipinos and Vietnamese Face When Immigrating to the U.S. Marc Santamaria Golden Gate University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.ggu.edu/theses Part of the Comparative and Foreign Law Commons, and the Immigration Law Commons Recommended Citation Santamaria, Marc, "Why Immigrants Benefit the nitU ed States Economy and the Legal and Tax Issues Chinese, Filipinos and Vietnamese Face When Immigrating to the U.S." (2016). Theses and Dissertations. Paper 67. This Dissertation is brought to you for free and open access by the Student Scholarship at GGU Law Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of GGU Law Digital Commons. For more information, please contact [email protected]. GOLDEN GATE UNIVERSITY SCHOOL OF LAW ÈÈÈÈÈ Why Immigrants Benefit the United States Economy and the Legal and Tax Issues Chinese, Filipinos and Vietnamese Face When Immigrating to the U.S. Attorney Marc Santamaria, J.D., LL.M. S.J.D. Candidate ÈÈÈÈÈ SUBMITTED TO THE GOLDEN GATE UNIVERSITY SCHOOL OF LAW, DEPARTMENT OF INTERNATIONAL LEGAL STUDIES, IN FULFILLMENT OF THE REQUIREMENT FOR THE CONFERMENT OF THE DEGREE OF SCIENTIAE JURIDICAE DOCTOR (SJD). Professor Dr. Christian Nwachukwu Okeke Professor Dr. Remigius Chibueze Professor Dr. Gustave Lele SAN FRANCISCO, CALIFORNIA April 14, 2016 Acknowledgments To our God and Father be glory for ever and ever.
    [Show full text]
  • Gender and Organized Crime
    UNIVERSITY MODULE SERIES MODULE 15 GENDER AND ORGANIZED CRIME UNITED NATIONS OFFICE ON DRUGS AND CRIME EDUCATION FOR JUSTICE UNIVERSITY MODULE SERIES Organized Crime Module 15 GENDER AND ORGANIZED CRIME UNITED NATIONS Vienna, 2019 This Module is a resource for lecturers. Developed under the Education for Justice (E4J) initiative of the United Nations Office on Drugs and Crime (UNODC), a component of the Global Programme for the Implementation of the Doha Declaration, this Module forms part of the E4J University Module Series on Organized Crime and is accompanied by a Teaching Guide. The full range of E4J materials includes university modules on integrity and ethics, crime prevention and criminal justice, anti-corruption, trafficking in persons / smuggling of migrants, firearms, cybercrime, wildlife, forest and fisheries crime, counter-terrorism as well as organized crime. All the modules in the E4J University Module Series provide suggestions for in-class exercises, student assessments, slides and other teaching tools that lecturers can adapt to their contexts, and integrate into existing university courses and programmes. The Module provides an outline for a three-hour class, but can be used for shorter or longer sessions. All E4J university modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Terms and conditions of use of the Module can be found on the E4J website. © United Nations, April 2019. All rights reserved, worldwide. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries.
    [Show full text]
  • Yang V. Maugans: Just When You Thought It Was Safe to Get in the Water
    NORTH CAROLINA JOURNAL OF INTERNATIONAL LAW Volume 21 Number 3 Article 6 Summer 1996 Yang v. Maugans: Just When You Thought It Was Safe to Get in the Water David Teeples Follow this and additional works at: https://scholarship.law.unc.edu/ncilj Recommended Citation David Teeples, Yang v. Maugans: Just When You Thought It Was Safe to Get in the Water, 21 N.C. J. INT'L L. 667 (1995). Available at: https://scholarship.law.unc.edu/ncilj/vol21/iss3/6 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of International Law by an authorized editor of Carolina Law Scholarship Repository. For more information, please contact [email protected]. Yang v. Maugans: Just When You Thought It Was Safe to Get in the Water Cover Page Footnote International Law; Commercial Law; Law This article is available in North Carolina Journal of International Law: https://scholarship.law.unc.edu/ncilj/vol21/ iss3/6 Yang v. Maugans: Just When You Thought It Was Safe to Get in the Water I. Introduction America has long been the mecca of hope and freedom to which millions of immigrants and refugees have traveled, both legally and illegally. Paradoxically, this nation of immigrants has often been reluctant to open its doors and welcome new generations of immi- grants. Perhaps not surprisingly, recent federal court decisions have just made it more difficult for refugees to enter the United States and enjoy the freedom that we too often take for granted.1 The decisions involved the Golden Venture smuggling ship which grounded off the coast of New York resulting in hundreds of illegal Chinese aliens jumping overboard and trying to swim ashore.' In general terms, the appellate court rulings reflect America's ambivalence and antagonism toward those who try to smuggle their way into the United States.
    [Show full text]
  • Sister Ping Sentenced to 35 Years in Prison for Alien Smuggling, Hostage Taking, Money Laundering and Ransom Proceeds Conspiracy
    United States Attorney Southern District of New York FOR IMMEDIATE RELEASE CONTACT: U.S. ATTORNEY'S OFFICE March 16, 2006 HERBERT HADAD, MEGAN GAFFNEY HEATHER TASKER, BRIDGET KELLY PUBLIC INFORMATION OFFICE (212) 637-2600 SISTER PING SENTENCED TO 35 YEARS IN PRISON FOR ALIEN SMUGGLING, HOSTAGE TAKING, MONEY LAUNDERING AND RANSOM PROCEEDS CONSPIRACY MICHAEL J. GARCIA, United States Attorney for the Southern District of New York, announced today that CHENG CHUI PING, a/k/a “Sister Ping,” was sentenced today to 35 years in prison for her role in leading an international alien smuggling ring. Sister Ping is one of the first, and ultimately most successful, alien smugglers of all time. CHENG was convicted in June 2005 after trial before United States Chief District Judge MICHAEL B. MUKASEY and a jury, of three separate counts, including one count of conspiring to commit alien smuggling, hostage taking, money laundering and trafficking in ransom proceeds, one count of money laundering and one count of trafficking in ransom proceeds. (A count-by-count breakdown of the sentences imposed is attached.) The evidence at trial demonstrated that Sister Ping ascended from running a one-woman smuggling shop to become the leader of a multi-national smuggling empire. Sister Ping began her career in the early 1980's, smuggling handfuls of fellow villagers from China into the United States by airplane with fake identification documents. By the time of her April 2000 arrest, Sister Ping had reached the pinnacle of her criminal trade and had smuggled more than one thousand aliens into the United States, sometimes hundreds at a time.
    [Show full text]