The Illegal Traffic of Firearms on the US-Mexico Border

Total Page:16

File Type:pdf, Size:1020Kb

The Illegal Traffic of Firearms on the US-Mexico Border The Illegal Traffic of Firearms on the U.S.-Mexico Border: A Problem of Governance? Jose L. García Aguilar Professor of International Studies Division of Social Sciences Universidad de Monterrey Overview To say that the United States and Mexico have a very complex relationship is to state the obvious. Indeed, our integration is deepening and covers not only trade aspects, but also environmental issues, energy, labor mobility and of course security among others. The latter is perhaps the most pressing challenge that both nations have to confront. For example, at the press conference that took place after the meeting of the three leaders of North America in Guadalajara, México, last August 10th, Felipe Calderon from Mexico said to the press that: “The struggles we have led in Mexico for the rule of law and the security of our Mexican people forces us to stop the traffic of weapons and of money that go from north to south that strengthen and nourish organized crime gangs”1 Meanwhile, President Barack Obama recognized the United States’ responsibility in this matter: “We will work to make sure Mexico has the support it needs to dismantle and defeat the cartels, and the United States will also meet its responsibilities by continuing our efforts to reduce the demand for drugs and continuing to strengthen the security of our shared border, not only to protect the American people, but to stem the illegal southbound blow of American guns and cash that helps fuel this extraordinary violence”2 The illegal traffic of arms in the border between Mexico and the United States has reached levels not seen before. In a testimony before the Subcommittee on the Western 1 “President Obama Holds a News Conference with Mexican President Felipe Calderon and Canadian Prime Minister Stephen Harper.” The Washington Post, available at http://www.washingtonpost.com/wp- dyn/content/article/2009/08/10/AR2009081001627_pf.html 2 Ibid Hemisphere, Committee of Foreign Affairs of the United States House of Representatives, Jess T. Ford, Director of International Affairs and Trade of the General Accounting Office, said: “Available evidence indicates a large proportion of the firearms fueling Mexican drug violence originated in the United States, including a growing number of increasingly lethal weapons. While it is impossible to know how many firearms are illegally trafficked into Mexico in a given year, over 20, 000 or around 87%, of firearms seized by Mexican authorities and traced over the past 5years originated in the United States, according to data from ATF. Over 90% of the firearms seized in Mexico and traced over the last 3 years, have come from the United States3 These figures only show the regional dimension (the U.S.-Mexico border) of a serious problem of global scale. This paper explores the trends of the illicit trade of firearms in the border between Mexico and the U.S. as a part of a global crime threat, but mostly it will concentrate in the governance side, in other words in those legal and political areas of which the criminals take advantage to continue with their illegal activities. Although cooperation between both countries has increased in particular since the beginning of the Obama administration which has recognized theta the United States has to more in order to curb the demand of drugs and to have a better control of guns,4 sometimes we see the lack of cooperation between the two countries to curb the problem. This uncooperative situation is the result of current laws, sometimes the result of corruption, but in any case, the problem reaches levels that constitute a real threat to the security to the countries in both sides of the border. 3 “Fireams Trafficking. U.S. Efforts to Combat Arms Trafficking to Mexico Face Planning and Coordination Challenges”, GAO, June 19, 2009, available at: http://www.gao.gov/new.items/d09781t.pdf 4 “Clinton Says U.S. Feeds Mexico Drug Trade” The York Times, March 26, 2009 This problem it also is a reflex no only of a bigger pattern (the global illicit trade of weapons) but also it responds to a very specific dynamics of the two countries; their laws, their enforcement institutions and the way in way both countries deal with guns, legal or illegal, in the context of a deep interdependence and an increasingly adverse situation of the threat posed by criminal organizations interested in this kind of activity. Transnational Crime As Global Security Threat Crime and criminal networks have been in the states’ agenda for a long time. The links between illicit activities and certain policy objectives are well known. The mujahideen in Afghanistan were allowed to continue the trade of opiates in order to maintain their fight against the Soviets. The FARC in Colombia developed ties with narco traffickers and there are indicators that the Basque separatist movement in Spain known as ETA has ties with Spanish criminal groups.5 As in any business, the criminals tend to obtain gains from the markets, in this case, global markets of illicit goods. The world has become a truly global market for any kind of illegal trade: drugs, human beings, endangered species, diamonds, firearms, among others. To deal with this phenomenon it is required to have a comprehensive approach in order to cover all the aspects of this complex international security issue. After the Cold War, different approaches to define security began to emerge. The global confrontation between the major super powers was the defining element concerning international security. From a scenario of war inter-states, now the new situation started to unveil the struggles intra-states. Among these conflicts we can mention ethnic rivalries, sometimes with catastrophic results such as the Rwanda case, 5 “Saviano dice que ETA es ‘paramafiosa y trafica con cocaína.” El País.com, available from http://www.elpais.com/articulo/cultura/Saviano/dice/ETA/paramafiosa/trafica/cocaina/elpepucul/2009083 1elpepucul_5/Tes the revival of nationalism (as in the former Yugoslavia) and radical religious groups. This does not mean that the aforementioned problems did not exist, but the Cold War somewhat covered them. In the context of an increasingly rapid globalization, with the advent of a global scale trade and technology, other threats began to surface too. Clearly, crime was one of them along with the environmental degradation and social conditions such as poverty. The nature of these threats is that they are not state-centered, in spite of the fact that some of them are originated within some states. Their true nature is that they are transnational, eroding the traditional concept of state sovereignty. Globalization has created the conditions of a network society. People just get in touch with other with similar interest in order to attain certain goals. The networks can have legitimate social or political objectives such as some NGO’s like Human Rights Watch, Greenpeace, Amnesty International or the World Wildlife Fund among others. With the internet technology, these networks also can organize global protest against, ironically, globalization itself, like the protests against the World Trade Organization in Seattle, WA in 1999. Some authors say that these networks are the expression of a truly global society.6 But not all of these transnational networks are necessarily benign. Some of them like terrorist groups or crime organizations are taking advantage of the situation constituting real threats to international security. This situation became clearer after the attacks to the World Trade Center in New York and Washington, D.C. in September 11th, 2001. Al Qaeda is a very complex network of loyalties to a borderless web of Muslim extremist that the same are in Afghanistan, Pakistan, Yemen or London and whose more visual member is Osama Ben Laden. 6 See for example, Ronnie Lipschutz, “Reconstructing World Politics: the Emergence of Global Civil Society” in Millenium: Journal of International Studies. Vol. 21, No. 3, 1992, pp. 389-420. Transnational crime organizations act alike. The national identification of these groups in well known in the literature: Italian mafia, Chinese mafia, Russian mafia, Japanese yakuza, Mexican and Colombian drug cartels, Somali pirates, just to mention some of them. Ironically, these organizations are not “nationals” in the sense that they only operate in their own national territories. They have networks around the world, they create strategic alliances with other criminal organizations in order to get new markets or to fight against other organizations for turf control, they develop new distribution routes, they establish economies of scale and diversify their “portfolios” of activities.7 Although some of them specialize in certain activity such as drugs, they also tend to cooperate with some other criminal networks in order to be more efficient. Thus, some bands specialize in stealing of cars to commit other crimes such as kidnapping. Some make alliances to sell drugs and human beings usually for prostitution. Others transport and sell weapons to those who are involved in wars against other criminal groups or against the forces of public order. Those activities can not achieve without taking advantage of law loopholes and help from corrupt local and national authorities. Indeed, corruption is endemic in some countries that host these organizations. The lack of a truly rule of law, fragile governance and permissive institutions, and a weak social capital that promotes the creation of wealth as quickly as possible, tend to create the conditions of widespread corruption practices. 7 See, for example, Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Danger of Illicit Networks” in International Security, Vol. 33, No. 2, Fall 2008, pp. 7-44. There is a plenty of good literature on illicit markets and transnational crime, see, for example, Moisés Naím. Illicit. How Smugglers, Traffickers and Copycats are Hijacking the World Economy.
Recommended publications
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Cyber Influence Operations: an Overview and Comparative Analysis
    CSS CYBER DEFENSE Cyber Influence Operations: An Overview and Comparative Analysis Zurich, October 2019 Cyber Defense Project (CDP) Center for Security Studies (CSS), ETH Zürich Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, Sean. (2019). Cyber Influence Operations: An Overview and Comparative Analysis, Cyberdefense Trend Analysis, Center for Security Studies (CSS), ETH Zürich. Table of Contents Executive Summary 4 1 Introduction 5 2 Summary of the Debate Around Influence Activities 6 2.1 Influence and Some Historical Examples 6 2.2 The Definition Conundrum of Influence Activities and Techniques 7 3 Cyber & Influence Operations 11 3.1 Definition and Scope of Cyber Influence Operations 11 3.2 Influence Operations and Cyber Influence Operations: Similarities and Differences 11 3.3 Potential & Strategic Implications 19 4 Comparative analysis: American and Russian Cyber Influence Operations 21 4.1 Methodology 21 4.2 Presentation of Results and Discussion 21 4.3 Additional Remarks 26 5 Conclusion 28 6 Glossary 30 7 List of Abbreviations 31 8 Bibliography 32 Cyber Influence Operations: An Overview and Comparative Analysis Executive Summary conflict, CIOs are increasingly also used in times of peace or in the context of mere rivalry.
    [Show full text]
  • Crossing the Rubicon 2.Pdf
    PART IV EMPIRE AND DECLINE chapter26 THE RECORD little guy like me should never have had to write this book. A By the time the Kean Commission’s final report was released, a crucial prin- ciple of democratic government called “separation of powers” had quietly vanished. Nobody within the government seemed willing or able to defy the exec- utive’s mythical narrative of 9/11, even while the executive used the implications of that Big Lie to justify its every move. Massive war appropriations, the Patriot Acts, intelligence “reform,” Camp X-Ray at Guantanamo Bay, prison torture abroad, domestic roundups and detentions of Arabs and South Asians, and a hun- dred tangentially related usurpations of the powers Constitutionally reserved for the legislature and the judiciary — all were driven through by appeals to the offi- cial story of 9/11. It seems there are no independent voices of authority remaining outside the Empire’s control to challenge, temper or place limits on Imperial crimes and ambitions. There is only yet another Patrician seeking to replace Caesar on the throne and wear the Imperial purple. The Kean commission’s mandate The Kean Commission’s mandate was laid out in Public Law 107-306, signed by President Bush on November 27, 2002. SEC. 602. PURPOSES. The purposes of the Commission are to — (1) examine and report upon the facts and causes relating to the terrorist attacks of September 11, 2001, occurring at the World Trade Center in New York, New York, in Somerset County, Pennsylvania, and at the Pentagon in Virginia; (2) ascertain,
    [Show full text]
  • Could Turkey Be a Dominant Regional Power?: the Rise of Turkey As a Country of Middle-East and Europe
    Could Turkey Be a Dominant Regional Power?: The Rise of Turkey as a Country of Middle-East and Europe %OHQG $\GÕQ E rtekin* Abstract $FFRUGLQJWRWKHFRPPRQLGHD³WKHHFRQRPLFSRZHUdetermines the political power." By this general principle, when we look at the powerful states, we see that these states (countries) have, at the same time, the powerful political effect on the other actors. In this paper, some trade and economic data of Turkey are shown in order to localize its place in the World rankings. By this purpose, this paper argues the fact that Turkey which, being one of the countries belonging G-20, has tried since 1991 to play a big role in its bilateral relations in Caucasia, Central Asia and Middle East (CCAME). However, when the data of international business of Turkey and those of each one of the countries of Central Asia treated in the contents of research are studied, it is seen very clearly that the influence of Turkey in Central Asia is not very dominant or does not create a dominating effect over the economic plan in spite of the existence of the diplomatic effects, visa facilities and the visits based upon the cultural level and mutu- ally testified. Without any doubt, although nobody can deny the existence and the probability RI WKH JUDGXDO JURZWK RI 7XUNH\¶V UHODWLRQV LQ&&$0(¶V FRXQWULHV 7XUNH\ ZKRVH IDFH LV turned mainly towards the occident and the large majority of trade made within the European countries,tries to be an influential actor in the determined areas. Naturally, in spite of the cel- ebration of Nawruz with the Turkic World,acting as a Muslim country in Middle East, and ac- cepting the norms of European Union as a European democratic and laicized country in Eu- rope, Turkey presents several identities and makes it a multi-colored actor who can be used in IDYRURI7XUNH\¶VLQWHUHVWV K ey words: Balance of power, Central Asia, Middle East, Caucasia, Turkey, foreign policy, globalization, power * Assistant Professor, Anadolu University, Turkey.
    [Show full text]
  • 2015 North American Think Tank Summit Report: Think Tanks and the Transformation of Africa: the First African Continental Think Tank Summit
    University of Pennsylvania ScholarlyCommons TTCSP Global and Regional Think Tank Summit Reports TTCSP Global and Regional Think Tank Summit 2015 2015 North American Think Tank Summit Report: Think Tanks and the Transformation of Africa: The First African Continental Think Tank Summit James G. McGann University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ttcsp_summitreports Part of the African Studies Commons, and the Other International and Area Studies Commons McGann, James G., "2015 North American Think Tank Summit Report: Think Tanks and the Transformation of Africa: The First African Continental Think Tank Summit" (2015). TTCSP Global and Regional Think Tank Summit Reports. 17. https://repository.upenn.edu/ttcsp_summitreports/17 All requests, questions, and comments should be directed to: James G. McGann, Ph.D. Senior Lecturer, International Studies Director Think Tanks and Civil Societies Program The Lauder Institute University of Pennsylvania Telephone: (215) 746-2928 Email: [email protected] 2014 Copyright: All rights reserved. No part of this report may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by information storage or retrieval system, without written permission from the University of Pennsylvania, Think Tanks and Civil Societies Program. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ttcsp_summitreports/17 For more information, please contact [email protected]. 2015 North American Think Tank Summit Report: Think Tanks and the Transformation of Africa: The First African Continental Think Tank Summit Abstract The 2nd Annual North American Think Tank summit brought together over forty-five think tanks from the United States of America, Canada, and Mexico to discuss how to best navigate an evolving environment that is information rich and resource scarce.
    [Show full text]
  • The Balance of Power of Turkey in Central Asia
    Could Turkey Be a Dominant Regional Power?: The Rise of Turkey as a Country of Middle-East and Europe Bülend Aydın Ertekin* Abstract According to the common idea, “the economic power determines the political power." By this general principle, when we look at the powerful states, we see that these states (countries) have, at the same time, the powerful political effect on the other actors. In this paper, some trade and economic data of Turkey are shown in order to localize its place in the World rankings. By this purpose, this paper argues the fact that Turkey which, being one of the countries belonging G-20, has tried since 1991 to play a big role in its bilateral relations in Caucasia, Central Asia and Middle East (CCAME). However, when the data of international business of Turkey and those of each one of the countries of Central Asia treated in the contents of research are studied, it is seen very clearly that the influence of Turkey in Central Asia is not very dominant or does not create a dominating effect over the economic plan in spite of the existence of the diplomatic effects, visa facilities and the visits based upon the cultural level and mutu- ally testified. Without any doubt, although nobody can deny the existence and the probability of the gradual growth of Turkey’s relations in CCAME’s countries, Turkey, whose face is turned mainly towards the occident and the large majority of trade made within the European countries, tries to be an influential actor in the determined areas.
    [Show full text]