Hostname: page-component-745bb68f8f-kw2vx Total loading time: 0 Render date: 2025-02-05T04:59:54.393Z Has data issue: false hasContentIssue false

Harnessing Third Parties for Transnational Environmental Crime Prevention

Published online by Cambridge University Press:  10 September 2013

Julie Ayling*
Affiliation:
Regulatory Institutions Network (RegNet), Australian National University, Canberra (Australia). Email: julie.ayling@anu.edu.au.
Rights & Permissions [Opens in a new window]

Abstract

Because transnational environmental crime (TEC) can result in the demise of an environmental resource or irreversible damage to the environment and has implications for national and global security, its prevention is a critical issue. Deterrence through law enforcement can go only a limited distance towards preventing TEC. However, there is a huge potential for third parties to be active participants, alongside governmental authorities, in crafting and implementing strategies for TEC prevention. This article explores the ways in which states can catalyze third parties – non-state, non-offending actors – to contribute their own capacities towards the pursuit of preventive outcomes. It draws together concepts and theories from policing studies, criminology and regulatory studies to highlight changing relationships between the state and non-state actors with respect to crime control, and applies them to TEC. Examples and illustrations used in the article relate mainly to efforts to combat the illegal wildlife trade. The article concludes that a more systematic approach to TEC prevention involving third parties is needed, and that this requires dedicated strategic analysis and planning on the part of states, working individually and together.

Type
Articles
Copyright
Copyright © Cambridge University Press 2013 

1. introduction

The potential for transnational environmental crime (TEC) to result in the demise of an environmental resource or irreversible damage to the local and/or global environment makes prevention of this exploitation of the world’s finite natural assets a critical issue. The importance of TEC prevention intensifies when the implications of TEC for national and global security are taken into account.Footnote 1 However, law enforcement, by investigating crimes and arresting and prosecuting offenders, can only go so far in terms of TEC prevention. The rewards of the crime are in many cases so great, and the execution of the crime so uncomplicated,Footnote 2 that prospective offenders are not easily deterred, even if the penalties are severe. Moreover, the deterrence doctrine holds that the efficacy of law enforcement as a deterrent is largely dependent on the potential offender’s perception of punishment for the crime as certain, rather than the severity of the punishment.Footnote 3 This is because ‘enhancing the severity of punishment will have little impact on people who do not believe they will be apprehended for their actions’.Footnote 4 But punishment for environmental crime is anything but certain. One common criticism relating to the treatment of TEC is that it has been ‘woefully neglected’ by states,Footnote 5 with penalties set at far too low a level and enforcement against offenders often lax.Footnote 6

Furthermore, law enforcement is an expensive business. Even where good laws have been enacted to deal effectively with offenders, the difficulty of obtaining funding for salaries, training, equipment and deployment of law enforcement officers, not to speak of the associated infrastructure, can be a huge impediment to implementing those laws, particularly in developing countries.Footnote 7 Other impediments to effective law enforcement include cultural settings in which corruption is rife, institutions of criminal justice that do not regard TEC as a serious issue, poor cooperation among enforcement agencies, and practical problems such as the need to patrol vast areas.

If law enforcement alone is unable to deliver on TEC control, what else can be done?

There is a huge potential for third parties to be active participants, in parallel with governmental authorities, in crafting and implementing strategies to prevent TEC. The idea that whole-of-society responses are essential in this area is increasingly prevalent. In 2012, the United Nations Office on Drugs and Crime (UNODC) launched a new campaign, entitled ‘Transnational Organized Crime: Let’s Put Them Out of Business’, which specifically includes TEC.Footnote 8 UNODC points out that ‘[c]ombating a global phenomenon such as transnational organized crime requires partnerships at all levels. Governments, businesses, civil society, international organizations and people in all corners of the world have a part to play’.Footnote 9

This article explores the ways in which the capacities of third parties – non-state, non-offending actors – are now, and could be, harnessed by states for the prevention of TEC. Of course, it is not unusual for scholars to point out the need for environmental regulation that utilizes the capacities of both states and non-state actors.Footnote 10 However, this article’s contribution lies in drawing together concepts and theories from policing studies, criminology and regulatory studies in order to highlight the changing relationships between the state and non-state actors in relation to crime control, and applying them specifically to TEC. Moreover, it focuses on the role of the state as coordinator of public and private capabilities for achieving TEC prevention goals. The article builds on and goes further than some of the recent scholarship on TEC that has focused on the usefulness of a situational crime prevention approach as an alternative to traditional law enforcement methodologies. Situational crime prevention concentrates on the crime event rather than the offender, exploring how the situation or environment surrounding that event can be manipulated to close down opportunities for offenders as the crime progresses.Footnote 11 Studies of specific illegal markets in environmental commodities have described the essential steps in their trade and applied situational crime prevention techniques: for example, a study of the illicit trade in timber by Graycar and Felson,Footnote 12 and Wellsmith’s analysis relating to the illicit trade in wildlife.Footnote 13 Jacqueline Schneider’s recent book proposes a market reduction approach to the trade in endangered species, building on the foundation of situational crime prevention.Footnote 14 She details different crime scripts for various species (mammals, marine, plants and avian) and suggests various applications of situational techniques, including ways of increasing the effort and risks involved in engaging in these crimes. In this context, third parties are regarded primarily as useful sources of information that would enable law enforcement agencies or task forces to properly frame and understand the TEC problems they face and so to better target their responses. Others have explored a more proactive role for the local population in preserving natural assets such as wildlife.Footnote 15 However, ways in which governments could systematically catalyze the broad potential for third parties to contribute their own capacities in the pursuit of preventive outcomes have not been the focus of academic literature relating to TEC.Footnote 16

This article consists of a further five parts. The first (Section 2) addresses the changing role of the state and non-state actors in crime control over the last few decades. Governing ‘at a distance’ has led to a new emphasis on sharing responsibility for security. The article argues that, in order to get the best out of this sharing, coordination is needed, and that national governments are in the best position to undertake this role. Section 3 considers the identity and roles of third parties who can and do play a part in the prevention of TEC. Their possible roles, drawing on routine activities theory, could be as ‘handlers’ of potential offenders, ‘guardians’ of likely victims and ‘place managers’ or supervisors of crime settings. Going beyond the crime itself, third parties could also have roles that influence the social contexts or remote causes of crime: an example is given of the third parties that could have an impact on the illicit wildlife trade. Section 4 draws on regulatory theory to explore mechanisms that might be used to ensure that the positions, expertise and skills of third parties are employed for the purpose of prevention: examples are drawn from various areas of TEC, again with a particular focus on wildlife trafficking. In Section 5 some of the risks and difficulties associated with enlisting third parties as crime control partners and facilitating their crime control ventures are discussed. The article concludes in Section 6 with some thoughts about future directions for state action.

2. plural policing, third parties and the need for coordination

One significant feature of the ‘new regulatory state’ that has developed over the last few decades as neoliberalism has taken hold is an emphasis on ‘decentred, at-a-distance forms of state regulation’.Footnote 17 The implication for law enforcement is that police no longer have, nor do they claim, a monopoly on policing.Footnote 18 Policing has become multilateralized or pluralized.Footnote 19 This means that there is now an array of policing providers encompassing all sectors of society. The function of policing may be delivered not only by institutions of government, but also through government by private providers, above government by transnational policing providers, beyond government by commercial markets and below government by citizens themselves.Footnote 20 This burgeoning of policing providers has occurred hand-in-hand with the ‘responsibilization’ of non-state actors for their own security.Footnote 21

The state does not necessarily have a hand in the provision of these policing services, even as a patron. The numbers and the breadth of business of private security companies, for example, have grown enormously over the last few decades. In Western countries paid security providers easily outnumber the public police.Footnote 22 Often the first officer one sees upon entering a police force headquarters is a private security guard.Footnote 23 Other private entities – businesses, community groups and individual citizens – also contribute to law enforcement and the maintenance of public order both in partnership with the police and independently.Footnote 24

The potential for non-state actors, at whatever distance they reside from the state’s centre, to have a role in TEC prevention is therefore broad indeed. The advantages of using third parties for TEC control are beginning to be recognized. In recent widely reported remarks, the former United States (US) Secretary of State, Hillary Clinton, drawing attention to the rise in trafficking in endangered animal species, called for global partnerships ‘as robust and far-reaching as the criminal networks we seek to dismantle’.Footnote 25 She explained these partnerships in the following words:

Therefore, we need governments, civil society, businesses, scientists, and activists to come together to educate people about the harms of wildlife trafficking. We need law enforcement personnel to prevent poachers from preying on wildlife. We need trade experts to track the movement of goods and help enforce existing trade laws. We need finance experts to study and help undermine the black markets that deal in wildlife. And most importantly, perhaps, we need to reach individuals, to convince them to make the right choices about the goods they purchase.

The important message here is that the state cannot effectively act alone. The statement could also be taken to suggest, through reiteration of the words ‘we need’, that the state is in a central and crucial position in relation to these other actors. This view has merit. TEC prevention will have a better chance of ensuring that participants’ contributions are actively constructive towards the desired goal of prevention if there is some coordination of activities to that end, rather than just a bunch of random strategies employed by whoever has an idea (good or otherwise). National governments, acting alone and together, are a logical place for any coordinating function to be situated. Indeed, the call for a networked response to networked threatsFootnote 26 is already being taken seriously in relation to TEC. Networks of law enforcement agencies, both within states and between states, are becoming more common.Footnote 27 In fact, interagency approaches are fast becoming a regular feature of the broader response to transnational organized crime.Footnote 28 However, these networked responses are generally based on enforcement through top-down initiatives rather than prevention that makes use of the capacities of the myriad of social actors.

Of course, states may not always be willing or capable of coordinating crime prevention activities – indeed, weak or failing states may not be capable of tackling crime problems at all – in which case civil society and transnational institutions often do step into the breach and compensate for the state’s inadequacy in innovative ways.Footnote 29 For example, activist groups often partner with each other and with international organizations to collaborate on responses to TEC without any involvement by states. However, where governments do have the requisite willingness and capacity, their participation in a coordination role is likely to promote greater and more sustained national environmental and economic health. It is to this situation that this article is addressed.

3. the identity and roles of third parties

To harness the potential of third parties in relation to TEC prevention it is important to understand the essential steps – or crime scripts Footnote 30 – that comprise the commission of the various crimes that constitute TEC. Crime scripts vary from crime to crime and commodity to commodity. Understanding how a particular crime progresses ‘can help reveal those points where measures might plausibly be applied to optimize the preventive pay-off’.Footnote 31 It is at these ‘pinch-points for intervention’Footnote 32 that opportunities to disrupt or derail the crime will present themselves – a situational approach because it concentrates on manipulation of the crime event and not on the offenders. Generally situational crime prevention emphasizes what traditional law enforcement agencies can do to manage the situation by increasing the efforts and risks involved in the crime and reducing the rewards associated with it. But often it is third parties, not police or other law enforcement agencies, who will be on hand at these pinch-points to influence the course of the crime.

In the case of organized crime in the illegal wildlife trade, for example, a generalized five-step script has been identified from (1) poacher through (2) local courier, (3) national facilitator, (4) national exporter, to (5) receiver in the consumer country.Footnote 33 Of course, this script will vary depending on the product involved and the state of the market. A step may be missing or may merge with another. The advent of internet technology could be having the effect of ‘cutting out the middle man’ in illicit transnational transactions relating to wildlife. In the next section I identify possible third parties who could intervene at points along this generalized crime script, but first we need to consider what kind of roles such third parties could play.

The theory of situational crime prevention rests on opportunity theories: specifically rational choice theory, routine activity theory and crime pattern theory.Footnote 34 Routine activity theoryFootnote 35 is particularly useful for our purposes here because it reveals how third parties could play a role in crime prevention. The theory posits that ‘a crime is likely when an offender and a target come together at the same place, at the same time, and there is no one nearby to control the offender, protect the target, or regulate conduct at that place’.Footnote 36 With respect to particular transnational environmental crimes, third parties clearly have enormous potential to be controllers of crime – ‘handlers’ (supervisors or other influences over potential offenders), ‘guardians’ (protectors of victims) and ‘place managers’ (regulators of settings where TEC is committed). Their intervention at the pinch-points within crime scripts to prevent crimes and protect victims (who in the case of TEC are not necessarily human) may be proactive but may often be passive. Capable guardianship, for instance, might require nothing more than simply being there.

Table 1 below lists potential third parties in relation to the illicit trade in wildlife. No doubt this list is not comprehensive and more parties could be added. A similar list could be created for any form of TEC, and overlaps would be observable. For instance, transport, warehousing and financial parties are likely to crop up in the lists of third party actors for any TEC. In this table, third parties have been divided into ‘guardians’, ‘handlers’ and ‘managers’, although some third parties appear in more than one category. For example, private game reserve owners and managers are wildlife ‘guardians’ – many organize patrols to protect the animals on their reserves, and some have taken measures to make their animals less valuable to poachers by, for example, dehorning rhinoceros or injecting their horns with an indelible dye. But reserve managers are also ‘place managers’ in that they can act to reduce the opportunities for poaching, for example, by fencing their properties. Logging and mining companies may be ‘handlers’ in situations where their employees are tempted to engage in poaching (for sustenance, perhaps) by providing the workers with regular supplies of protein or the salary to purchase this themselves.Footnote 37 These extractive industries may also be ‘place managers’, for instance, by ensuring that the access roads they build are not accessible to, and are not used by, poachers.Footnote 38

Table 1 Third parties in relation to the illicit wildlife trade

A situational crime prevention approach, however, has limits. Scholars have pointed out that the situational crime prevention framework has little to say about the root causes of crime, such as economic deprivation or social disengagement, or about long-term motivations, such as tradition or culture. Von Lampe notes that before the situational approach can be useful in responding to organized crime, it needs to shift its focus from volume crime and crime settings to incorporate societal contexts, such as the availability of resources to offenders and the transparency of state institutions.Footnote 39

This does not mean, however, that third parties have no role in relation to issues such as these that are more remote from the crime event. For example, educating consumers of wildlife and wildlife products about the impact of consumption on the animals and what it means for the future of the species and for biodiversity generally is an important demand-reduction (and thus preventative) intervention against the illicit wildlife trade. Non-state actors are often better equipped and more eager to deliver educational programmes than are states, and often have more legitimacy with their target audiences. This legitimacy may allow non-state actors to help communities to devise measures to deal with some of the underlying reasons for environmental crime, such as the prevalence of human–wildlife conflict that often sparks retaliatory or preventative poaching.Footnote 40 Similarly, poverty reduction may be achieved by the state through welfare payments, but it may equally be addressed by businesses through the provision of employment. By employing locals on a decent wage, for instance, private wildlife reserves and logging companies could reduce the economic incentives for them to engage in poaching or logging and, in some cases, give them a stake in the preservation of the surrounding natural resources. Non-state actors could also play a role in catalyzing the state to put in place anti-corruption measures, including monitoring and auditing institutions and reporting and transparency requirements, that indirectly would have an impact on the successful control of TEC.

4. mechanisms for harnessing third parties

How then could the state effectively harness the capacities of non-state actors to prevent crime? The coordinating role that the state can play in relation to third parties is not limited to regulation as traditionally understood, that is, rule-making or lawmaking. Regulation is a much broader concept, encompassing any purposeful intervention – be it legal, political, economic, social or psychological – to influence the flow of events.Footnote 41 The application of the criminal justice system is only one of many examples of regulation in this broader sense of the term. Ayres and Braithwaite propose that the way in which regulation occurs should be responsive to the particular situation of non-compliance and adaptable to any changes in that situation.Footnote 42 In other words, the degree of coerciveness applied by a regulator should depend on the extent of the regulatee’s compliance. Thus, responsive regulation is constituted by a repertoire of strategies applied in a way that is context-sensitive.Footnote 43

Grabosky and his colleaguesFootnote 44 have analyzed the mechanisms that states use to facilitate the coproduction of security generally. This is represented succinctly in diagrammatic form by BrewerFootnote 45 – see Figure 1 below. These mechanisms range along a continuum of coerciveness. In other words, they cover the gamut of responsive regulation, so that a mechanism can be chosen according not only to the particular situation but also to the degree of third party willingness to be involved in crime prevention.

Figure 1 Mechanisms used to facilitate community coproduction (after Brewer 2012, at p. 54).

By invoking such mechanisms, the state can ‘responsibilize’ third parties and encourage or command them to be vigilant in their roles as guardians, handlers and/or place managers. The following paragraphs explore these mechanisms further as they apply to TEC, with a particular focus on the illegal wildlife trade.

4.1. Conscription

States could conscript third parties to carry out certain actions or to obtain and report certain information. Obligations are generally imposed by legislation or other forms of rule-making, with penalties for non-compliance. The mandatory reporting of child abuse by doctors and teachers, the requirement that airlines check the validity of travellers’ documentation before they are allowed to board, and obligations on proprietors of licensed premises not to serve inebriated customers are all examples of conscription in the cause of preventing crime.

What kinds of action by third parties could the state mandate in the interests of preventing TEC? Mandatory reporting of suspicious patterns of transactions, targeted at companies that deal legally in wildlife or other environmental products and services, might be one effective third party conscription mechanism. Had banks been required to report suspicious patterns of financial transactions rather than just individual above-threshold transactions, the long-term trading relationship between a Laos-based company (Xaysavang Export-Import Company) and a South African company (Steyl Game CC) that became apparent during last year’s Chumlong Lemtongthai case in South Africa, may well have been exposed.Footnote 46 Lemtongthai was recently sentenced to 40 years’ imprisonment for a range of offences relating to the smuggling of rhinoceros horn from South Africa committed over a number of years.Footnote 47 Investigations into the trading relationship between these companies could have led to earlier revelations of illegality, with the result that fewer animals might have been unlawfully poached and traded.

In relation to rhinoceros and elephants, another possible conscriptive measure would be for governments to require privately held stockpiles of rhinoceros horn and ivory to be surrendered to central government, either for destruction or for registration and secure keeping.Footnote 48 Although this would be most unwelcome for private stockpile owners, it would make it more difficult to divert horn and ivory into the illegal market through theft and corruption.

4.2. Required Private Interface

This mechanism involves imposing obligations on the targets of regulation (potential offenders) to ‘use the machinery of private institutions’.Footnote 49 In this way third parties become ‘gatekeepers’, facilitating compliance by the targets with regulatory obligations. So, for instance, governments could require private businesses to be audited by, or take out insurance with, formally accredited professionals (the third parties in this case).

Requirements for rhinoceros horn taken in legal hunts to be treated by taxidermists before export (bringing into play the reporting obligations on taxidermists referred to in the next section), or for hunters to engage commercial shipping agents and/or customs brokers in the export of any trophies, would result in these professionals necessarily being engaged in processes that may allow them access to information indicating the misuse of legal hunting avenues for illicit purposes, and would be likely to have a deterrent effect on potential wrongdoers.

4.3. Required Record-Keeping and Disclosure

Cherney and his colleagues note that ‘record-keeping and disclosure have an important regulatory function by subjecting records to possible public scrutiny and enhancing vigilance on the part of third parties’.Footnote 50 Record-keeping is a common state strategy to ensure that it has access to information; it also means that third parties who maintain those records may be able more effectively to spot patterns that indicate that there is something suspicious going on and either report this to the authorities or intervene themselves to close down criminal opportunities. This may be the case particularly where those records relate to transactions or processes that might be used by organized criminals attempting to launder money or other items through legal channels.

The law relating to taxidermists in South Africa provides an example. Taxidermists are required to report to provincial conservation authorities when they receive a rhinoceros horn (for instance, to be made into a trophy). They are also required to keep a register of details such as date of receipt of the horns, their weight and micro-chip numbers, and the numbers of the hunting permit, transport permit and professional hunting register related to those horns. If requested, they must make this register available for inspection by the relevant authority.

Making internet service providers and online auction houses (such as eBay) responsible for keeping records that detail attempts to trade rhinoceros horn and other endangered species products through their sites would similarly impose a surveillance role on these non-state actors, which could help to close down a trafficking opportunity for criminal actors.

4.4. Cooptation of External Interests

Partnerships between authorities and private interests are common in many areas of crime prevention. Take, for example, the area of juvenile delinquency, where police often work with private organizations (church groups, community groups, welfare bodies, and the like) to divert young people away from a life of crime and give them alternatives for entertainment and gainful employment.

One example of the coopting of organized interests is the system of conservancies, which are found in many African countries. Conservancies are grassroots organizations, dedicated to protecting and preserving the environment of a designated area. In South Africa each conservancy must be registered with the provincial government agency responsible for maintaining wildlife conservation areas and biodiversity. There are hundreds of conservancies across South Africa. Conservancy members play an active role in making inventories of fauna and flora in the conservancy area and taking action to protect them, for example, by intervening in planning processes to provide objective information about the distribution and quantities of various species, thus ensuring that developments do not destroy important habitats. Conservancies often receive funding for specific projects (such as the removal of invasive species) from both public and private sources. Authorities also provide advice to conservancies on best environmental practices.

Conferring public recognition on the community’s ‘voice’ and publicly assisting in the conservancies’ good works could have a significant impact upon the degree to which communities ascribe value to the biodiversity of their area; this is particularly so where the community itself can make money from that biodiversity, such as through tourism activities. This gives the community a stake in the preservation of wildlife and flora and a reason to take action that can deter or disrupt their criminal exploitation, such as through poaching. Even a relatively passive role, such as monitoring and reporting on the area’s natural endowments, could have an impact on the extent of criminal activities that take place with respect to an area’s biodiversity.

Governments also leverage the capacities of third parties to realize outcomes they might not be able to achieve alone. For example:

  • Project Scale, a recently launched initiative of INTERPOL to fight illegal fishing,Footnote 51 is partly funded by the Pew Charitable Trusts, an independent non-profit organization that was established by the family of the founder of the Sun Oil company, which has a broad research and public policy agenda that includes many environmental initiatives.Footnote 52

  • In May 2013, a Memorandum of Understanding was signed by INTERPOL and the International Fund for Animal Welfare (IFAW) to formalize their ten-year relationship which has involved cooperation on anti-ivory poaching and trafficking initiatives such as Operation Worthy and Project Web. Among other things, IFAW supports INTERPOL in conducting training in operational matters and investigative techniques relating to wildlife crime for law enforcement and customs officers at East African hub airports.Footnote 53

  • The efforts of non-governmental organizations (NGOs) have also been essential to the success of Operation Charm, a blitz on the sale of endangered species items in London led by the United Kingdom (UK) Metropolitan Police Wildlife Crime Unit (WCU). In 2006, the WCU took on partners for the operation – the David Shepherd Wildlife Foundation, WildAid, IFAW, WWF-UK and the World Society for the Protection of Animals. Those organizations raise public awareness and encourage the reporting of offending.Footnote 54

  • The secretariats for the Convention on Biological Diversity (CBD)Footnote 55 and the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES)Footnote 56 work closely with the wildlife trade monitoring network TRAFFIC,Footnote 57 which assists in their decision-making processes by providing expert analysis and advice. TRAFFIC is governed by a committee of members of its partner organizations, the WWF and the International Union for the Conservation of Nature (IUCN), the latter itself a network comprising more than 1,200 government and non-government organizations.Footnote 58

4.5. Conferring Entitlements

Governments can create rights and confer them upon third parties, along with the right to enforce them. Grabosky cites patent and trade mark laws as examples.Footnote 59 Governments can also encourage third parties to enforce entitlements they already hold. Cherney and his colleagues describe how police in the US encourage housing associations and residents to use civil laws such as municipal regulations and health and safety codes against property owners who allow, or at least fail to prevent, the production of methamphetamines on their properties.Footnote 60 Mazerolle and Ransley cite many similar instances of what they call ‘third party policing’.Footnote 61

Exploring the granting of entitlements in the field of TEC could be worthwhile. For example, loosening litigation standing requirements for class actions may be one measure that governments could take. Perhaps communities or individuals could be given rights to hold accountable, for a failure to meet a duty of care or specified standards, those in whose hands directly lie the guardianship of TEC victims or the management of potential crime settings (that is, other third parties). Many environmental statutes in the US already allow for private enforcement of their provisions. Citizen suits are allowed, for example, against violators of the Endangered Species Act,Footnote 62 including against the government if it fails to fulfil its non-discretionary statutory duties to list species as endangered or threatened.Footnote 63 Similarly, in Australia, section 475 of the Environment Protection and Biodiversity Conservation Act 1999 (Cth) grants standing to ‘interested persons’ to apply for injunctions to prevent contraventions of the Act. An interested person may be an individual (Australian citizen or ordinarily resident in Australia) or an incorporated organization whose interests are affected by the offending conduct or who has displayed a recent interest (within the two preceding years) in the environment through protection, conservation or research activities.Footnote 64

According to Burbank, Farhang and Kritzer,Footnote 65 private enforcement regimes have the following advantages. They can:

  • multiply the resources devoted to prosecuting enforcement actions;

  • shift the costs of regulation from the government to the private sector;

  • take advantage of private information to detect violations;

  • encourage legal and policy innovation;

  • emit a clear and consistent signal that violations will be prosecuted;

  • limit the need for direct intervention by the state in the economy and society; and

  • facilitate participatory and democratic governance.

On the other hand, the authors note, private enforcement regimes also have several potential problems. These include:

  • empowering non-expert judges to make policy;

  • producing inconsistent and contradictory doctrine from courts;

  • weakening the state’s capacity to articulate a coherent regulatory scheme;

  • usurping governmental prosecutorial discretion;

  • discouraging voluntary compliance;

  • weakening oversight of policy implementation by the legislative and executive branches; and

  • reducing democratic legitimacy and accountability.

Clearly any scheme for private enforcement of laws relating to the obligations of third parties to take measures to thwart TEC would need to be well designed and take potential risks into account.

4.6. Incentives

The use of incentives is potentially a more potent tool than any of the above for inducing efforts towards crime prevention. Grabosky suggests that one reason is that they may be perceived as more legitimate than coercive measures.Footnote 66 Incentives may be direct, such as the use of rewards for the provision of information to authorities and for the private capture of poachers. Alternatively, incentives may be indirect, in the form of, for example, tax deductions, administrative privileges and prizes.

Pires and Moreto describe a programme in Mongolia designed to incentivize local communities to protect the snow leopard. In return for training and equipment provided by authorities to local communities to help them increase their income through the production of hand-made woollen goods, the community agreed to adhere to rules of conduct regarding the protection of snow leopards and their prey. Profits from selling the goods produced were returned to the community with an additional 10% going into a conservation fund.Footnote 67

4.7. Education and Capacity-Building/Facilitation

Third parties will not always have the wherewithal to pursue or promote crime prevention aims and strategies. The final category in Figure 1 above concerns education and capacity-building for third parties to enable them to use their capacities more effectively in the furtherance of crime prevention. Perhaps ‘facilitation’ might be a better label for this type of intervention as, quite apart from formal training and capacity-building programmes provided by the state for non-state actors, there are a number of non-formal means by which the state can enhance and enable the actions of third parties who are inclined to contribute to crime prevention.

Some examples from the wildlife field of possible facilitation by the state include:

  • facilitating informing (‘snitching’ or ‘dobbing’) by providing, or giving support to, a dedicated wildlife ‘hotline’ for anonymous reporting of criminal or suspicious behaviour;Footnote 68

  • providing civil air space for drones owned or operated by private interests to patrol poaching hotspots (including national parks);Footnote 69

  • providing media time and/or funding for NGO education campaigns relating to biodiversity conservation and wildlife crime;

  • providing infrastructure and funding for conservancies and other similar community initiatives;

  • ensuring, through tax policy, the financial viability of NGOs and community groups seeking to protect wildlife;

  • providing such groups with relevant information, just as the South African Department of Environmental Affairs now does in relation to rhinoceros poaching and arrest statistics;

  • training NGOs and community groups that wish to assist in law enforcement activities in environmental law, investigatory skills, criminal justice processes and rules of evidence;Footnote 70

  • providing tools and training to enable third parties who operate record-keeping and registration systems to check the authenticity of documentation submitted to them;

  • facilitating constructive engagement between private and public actors who can help each other to further crime prevention goals (by, for example, introducing third parties to one another, and providing virtual and physical forums in which they can meet and negotiate);

  • more controversially, creating a regulated market space in which businesses can trade: for example, a market could be created in horn culled from living rhinoceros or taken from private stockpiles, with the aim of reducing poaching and illegal trafficking by meeting demand and removing the incentives for consumers to buy on the black market.

A debate about the last-mentioned, contentious mode of facilitation is under way in South Africa. Current proposals are for a highly regulated market run by the state with product provided both by the state and private individuals.Footnote 71 Another scenario is for the state to leave the market to be run by the private sector, yet still shape the market through mechanisms such as price regulation, tariffs and taxation, labelling laws, corporate reporting obligations, audit requirements, certification schemes or other requirements.

There are many instances where third parties have sufficient competence to initiate crime prevention and conservation strategies, alone or in partnership with other third parties. For instance, the WWF’s Global Forest and Trade Network (GFTN) is working with a chemical trading company (PT Adimitra Lestari) which owns oil palm concessions in East Kalimantan (Indonesia), to implement a forest management strategy with the partial aim of preventing the annihilation of elephants, which make themselves unpopular by eating from the palm trees as a result of the disappearance of their usual food sources. Certification schemes such as the Forest Stewardship Council (FSC) programmeFootnote 72 are largely managed and enforced without any state involvement.Footnote 73 At the other end of the supply chain, many large retail companies use their considerable power as buyers to impose conditions on their suppliers relating to environmental protection (for instance, purchasing only products made with FSC or PEFCFootnote 74 certified timber, or coffee and chocolate from FairtradeFootnote 75 sources).Footnote 76 Such private contracting regimes are often preferable to the alternative of little or no environmental regulation.

This article should not be regarded as suggesting that such initiatives are unimportant or undesirable. Measures such as these generally can be very helpful in terms of crime prevention and conservation efforts. Grabosky notes that abdication is a legitimate and often used state strategy.Footnote 77 Where private companies are involved, however, some if not most of these initiatives are likely to be undertaken with commercial interests uppermost in mind. Involvement in a certification scheme, for example, is seen as a way to manage one’s business reputation, create a level playing-field and remain competitive.Footnote 78 Measures that have as their primary goal to present the company as a good corporate citizen or as ‘green-friendly’, or to promote internal efficiencies, may not always ‘hit the mark’ when it comes to TEC prevention. In such cases governments may need to find ways to facilitate or even tweak the strategies undertaken by private parties in order to ensure that they produce the desired outcomes for crime prevention.

5. risks and difficulties

In exploring the capacities of third parties for TEC prevention, one may ask the question: what level of government intervention is optimal? Generally it is true to say that the role of law enforcement and regulatory authorities is increasingly about being ‘unobtrusively influential from a position offstage’.Footnote 79 However, this does not mean that traditional law enforcement has no role. Indeed, in the TEC area, it remains at the centre of much of the action. What it does suggest, however, is that the state needs to be fully cognizant of its pervasive ability to regulate from the sidelines – or ‘steer’ rather than ‘row’, as Osborne and Gaebler put it in their well-known metaphorFootnote 80 – and to make use of this ability while it continues to enforce the law directly. Less intrusive regulation can be extremely powerful. Where it is likely not to be, the state still has the capacity to command third parties to engage in certain crime preventive activities.

However, not all possible third party mobilizations will necessarily be wholly constructive. For instance, one possible form of mobilization is for governments to grant property rights over a specific resource (timber or wildlife, for example) to private parties. As a crime prevention tool, this is a blunt instrument and would need to be honed by making the grant contingent on fulfilling particular conditions for crime prevention and resource protection. Otherwise, third party actions may exploit the particular resource in question, or at least do nothing to conserve it or prevent its exploitation by others. Potential third party mobilizations therefore need to be thoroughly assessed for their likelihood of furthering the aim of preventing the targeted TEC and for possible unintended undesirable consequences. Such assessments then need to be followed up with careful implementation, monitoring and published evaluations.

There are many other reasons why harnessing the capacities of third parties for TEC prevention will not always be plain sailing. Some of these are discussed in turn below.

5.1. Complexities

The existence of multiple jurisdictions with their own laws and policies means that organizing and coordinating crime prevention efforts can be difficult. Borders can constitute a significant obstacle to effective collaboration on crime control measures, while at the same time facilitating organized crime groups who are adept at taking advantage of legal weaknesses and corruptible governments. Moreover, the existence of legal markets (such as in timber and much of the world’s wildlife) simplifies the laundering of illegal products through legal channels and may complicate the job of targeting crime prevention efforts only at the illegal side of the trade.

It is clear, too, that while there are diverse and multiple non-state actors who have capacity in relation to TEC prevention, often they are not all of the same orientation. Diverse ideologies can lead to different agendas and different ideas about appropriate responses to environmental harms.Footnote 81 The controversies over the legalization of markets in rhinoceros horn and ivory are illustrative of how different stakeholders can hold clashing views about means while still sharing a desire for identical ends (the termination of the illegal trades and the conservation of rhinoceros and elephants).

5.2. Corruption

A further difficulty relating to harnessing third party capacities for TEC prevention is the endemic corruption in many jurisdictions where TEC originates. Indeed, it could be argued that corruption is a necessary element in the crime script of many transnational environmental crimes. As a result, actors who appear to be in an optimal position to exercise third party roles may instead be or become ‘first parties’, that is, offenders. In the case of the illegal rhinoceros horn trade, a number of identified offenders have been individuals whom one would initially have identified as third parties – for example, managers of game reserves, owners and employees of safari hunt companies, and rangers in national parks.Footnote 82 Imposing obligations on, or outsourcing crime prevention functions by entrusting funds or duties to, such actors will be counterproductive if they are themselves involved in criminal activities. As Felbab-Brown notes:

[l]ocal institutional and cultural contexts matter a great deal and can facilitate or render ineffective regulatory frameworks. The overall level of corruption and the quality of law enforcement and rule of law matter as much as the regulatory design itself’.Footnote 83

Methods of verifying the trustworthiness of third parties given responsibility for crime prevention activities and of holding them accountable for their actions are therefore necessary. These mechanisms need to be situated outside the particular jurisdiction in question, such as in existing or bespoke intergovernmental bodies or international organizations. States might agree to ensure that, where TEC prevention activities are undertaken under state auspices, they meet specified standards relating to the integrity of the participants and the processes for their selection, and to monitoring their activities on an ongoing basis. A form of peer review of state commitment to enforcing those standards could then be adopted, not unlike that which now occurs with respect to other international standards, such as the Financial Action Task Force Recommendations on money laundering.Footnote 84

5.3. Accountability Issues

The issue of accountability is particularly important. At what stage in the transfer of state responsibility to a private actor does accountability for the actions of the latter cease to lie with the government? Who takes responsibility, for example, if a private company or an NGO has been contracted to carry out a particular crime prevention programme and does it so badly that crime is not prevented and other parties (or the victims) suffer losses? This is a live issue in terms of everyday domestic policing,Footnote 85 and there is no reason to believe it is any less significant in the context of transnational policing efforts or in the arena of TEC. Furthermore, ‘extensive reliance on non-governmental actors renders the task of monitoring and oversight more difficult’.Footnote 86 Attributing blame for a regulatory shortfall may be harder where there is a lack of transparency around the actions of a third party. Accountability mechanisms will sometimes need to be accompanied by mechanisms for monitoring, or at least auditing, the actions of third parties, as discussed in the previous paragraph.

5.4. A Lack of Will and Social Capital

The mechanisms presented above are situated along a continuum of coerciveness for a reason. The willingness of third parties to engage in crime prevention will inevitably vary. The costs of conscription, for example, may be onerous and induce deliberate non-compliance. Furthermore, partnerships between civil society and the state are notoriously fraught with difficulty.Footnote 87 Working together does not equal collaboration – there is more to it than that.Footnote 88 Brewer has convincingly argued that the existence and depth of social capital – that is, networks of relationships and norms of trust and reciprocity – are key to whether collaborative crime control efforts will be effective.Footnote 89 Growing these networks and norms is no easy task, involving the generation of mutual respect, fairness of treatment, a willingness to share costs and burdens, shared aspirations and a degree of leadership.Footnote 90 But where these favourable relationships are lacking, an element of coerciveness may still enable effective use of third party capacities to further crime prevention goals. And, on a positive note, many non-state actors are highly motivated to prevent TEC, so agreeing on co-productive preventive strategies might in many cases prove to be relatively straightforward. High trust relationships should be easier to create and maintain for those seeking to protect our natural resources than for those disparate illegal groups working to exploit them. Suspicion and self-interest, rather than trust and altruism, are likely to characterize criminal relationships.Footnote 91

6. conclusion

The need for a networked response to the networked threat of TEC is clear, but that response needs to go beyond law enforcement. A long history of neglect of TEC by national jurisdictions means that punishment for most crimes is still far from certain. TEC prevention through deterrence alone is therefore unlikely to be sufficient to protect the world’s natural assets, particularly in cases where crises are brewing. Reducing the impact of TEC needs a whole-of-society approach. This would require the state to take on, as it has in other areas of regulation, a much greater steering role.

There are many instances of third party action in relation to all forms of TEC, both as individual initiatives and in partnership with or at the behest of governments. At present such strategies are undertaken in an ad hoc way. Furthermore, different non-state actors have different agendas and interests in the field. This article therefore makes a case for a more systematic approach to harnessing the multitudinous capacities of third parties to play a part in policing TEC, with national governments as coordinators. Third party capacities are evident in their roles as guardians of potential victims, handlers of potential offenders and managers of crime settings, and third parties could also be influential in relation to the broader social contexts from which TEC derives. The article considers mechanisms to harness those capacities and apply them to TEC; it also points to some of the difficulties of doing so and to the possibilities of counterproductive outcomes in certain circumstances.

A more systematic approach could best be implemented with some dedicated strategic analysis and planning on the part of states, working individually and together. By focusing on particular criminal activities in specific jurisdictions, maps could be created of existing relevant third parties and the strategies currently being used, and which could potentially be used, to harness their capacities. Creating such maps would then readily lead to the identification of as yet unrecognized third parties capable of influencing TEC and of the appropriate regulatory strategies to foster their participation in prevention activities. In the mapping of existing and potential third parties, it would be important to critically analyze their levels of resistance to involvement in intervention and why this resistance exists. It is vital that such maps also take account of the drivers of the particular crimes to which they relate, using tools like the analytic toolkit for wildlife and forest crime developed in 2012 by the International Consortium on Combating Wildlife Crime.Footnote 92 The formation of specialist units within relevant government agencies may be warranted.

Until now, this kind of applied strategic thinking has been confined largely to the task of enhancing law enforcement in relation to TEC. With little evidence that this is having much impact on TEC, now is the time for states to extend this regulatory reach by harnessing third party capacities. Then we might see the emergence of a response strong enough to halt the current expansion in both the volume and distribution of transnational environmental crimes that threatens national and global environmental security.

References

1 For a recent account of the security implications of the illegal wildlife trade, see Ratchford, M., Allgood, B. & Todd, P., Criminal Nature: The Global Security Implications of the Illegal Wildlife Trade (International Fund for Animal Welfare, 2013), available at: http://www.ifaw.org/sites/default/files/IFAW-Criminal-Nature-global-security-illegal-wildlife-trade.pdf.Google Scholar

2 Many environmental products are CRAVED – Concealable, Removable, Available, Valuable, Enjoyable and Disposable – making them an attractive prospect for criminals: Clarke, R.V., Hot Products: Understanding, Anticipating and Reducing Demand for Stolen Goods, Police Research Series Paper 112 (UK Home Office, 1999)Google Scholar, available at: http://tna.europarchive.org/20071206133532/homeoffice.gov.uk/rds/prgpdfs/fprs112.pdf. See also Pires, S.F. & Clarke, R.V., ‘Are Parrots CRAVED? An Analysis of Parrot Poaching in Mexico’ (2012) 49(1) Journal of Research in Crime and Delinquency, pp. 122–46Google Scholar, at 139, who suggest that in relation to some items (specifically in that case Mexican parrots) ‘available’ might be broken down into two measures, ‘abundant’ and ‘accessible’, making the mnemonic CRAAVED.

3 Beccaria, C., On Crimes and Punishments, and Other Writings, Bellamy, R. (ed), Davies, R. with Cox, V. & Bellamy, R. (tr) (Cambridge University Press, 1764/1995)Google Scholar; Williams, K. & Hawkins, R., ‘Perceptual Research on General Deterrence: A Critical Overview’ (1986) 20 Law and Society Review, pp. 545–72CrossRefGoogle Scholar; Nagin, D.S., ‘Criminal Deterrence Research at the Outset of the Twenty-First Century’, in Tonry, M. (ed), Crime and Justice: A Review of Research (University of Chicago Press, 1998)Google Scholar, pp. 1–42. For a nuanced examination of the relationship between deterrence, certainty of punishment and perceived seriousness of crimes, see Erickson, M.L., Gibbs, J.P. & Jensen, G.F., ‘The Deterrence Doctrine and the Perceived Certainty of Legal Punishments’ (1977) 42 American Sociological Review, pp. 305–17Google Scholar. For an analysis of the economic disincentives for the commission of particular environmental crimes and of the effectiveness of enforcement, see Akella, A.S. & Cannon, J.B., Strengthening the Weakest Links: Strategies for Improving the Enforcement of Environmental Laws Globally, Center for Conservation and Government Report (Conservation International, 2004)Google Scholar, available at: http://www.oecd.org/environment/outreach/33947741.pdf.

4 V. Wright, ‘Deterrence in Criminal Justice: Evaluating Certainty vs. Severity of Punishment’, The Sentencing Project, Nov. 2010, at p. 2, available at: http://www.sentencingproject.org/doc/Deterrence%20Briefing%20.pdf.

5 Wright, G., ‘Conceptualising and Combating Transnational Environmental Crime’ (2011) 14(4) Trends in Organized Crime, pp. 332–46Google Scholar, at 334; see also White, R., Transnational Environmental Crime: Toward an Eco-Global Criminology (Routledge, 2011)Google Scholar; White, R., ‘NGO Engagement in Environmental Law Enforcement: Critical Reflections’ (2012) 4(1) Australasian Policing: A Journal of Professional Practice and Research, pp. 711.Google Scholar

6 Wellsmith has argued that punishment is in any event ineffective as a deterrent; in other words, even if punishment is certain and severe, it is unlikely to result in significant reductions in offending: see Wellsmith, M., ‘The Applicability of Crime Prevention to Problems of Environmental Harm: A Consideration of Illicit Trade in Endangered Species’, in White, R. (ed), Global Environmental Harm: Criminological Perspectives (Willan, 2010), pp. 132–49Google Scholar; Wellsmith, M., ‘Preventing Wildlife Crime’ (2012) 90(1) Criminal Justice Matters, pp. 18–9.CrossRefGoogle Scholar

7 Akella & Cannon, n. 3 above; White (2012), n. 5 above. This is a problem for criminal justice systems across the world. As Kleiman notes in the context of the United States (US), ‘[t]he resources of the current criminal justice system, matched against the volume of crime, simply do not allow it to punish, even modestly, all offenses or all offenders. Trying to control everything and everyone … leads to sporadic and delayed punishments as the system overloads’: M.A.R. Kleiman, When Brute Force Fails: How to Have Less Crime and Less Punishment (Princeton University Press, 2009), at p. 3.

8 Available at: http://www.unodc.org/toc.

9 ‘Transnational Organized Crime – The Globalized Illegal Economy: Facts’ , available at: http://www.unodc.org/documents/toc/factsheets/TOC12_fs_general_EN_HIRES.pdf.

10 See, e.g., Gunningham, N. & Grabosky, P., Smart Regulation: Designing Environmental Policy (Clarendon Press, 1998); White (2012), n. 5 above.Google Scholar

11 Clarke, R.V., ‘Situational Crime Prevention: Theory and Practice’ (1980) 20(2) British Journal of Criminology, pp. 136–47.CrossRefGoogle Scholar

12 Graycar, A. & Felson, M., ‘Situational Prevention of Organised Timber Theft and Related Corruption’, in Bullock, K., Clarke, R.V. & Tilley, N. (eds), Situational Prevention of Organised Crimes (Willan, 2010), pp. 8192.Google Scholar

13 M. Wellsmith (2010), n. 6 above.

14 Schneider, J., Sold into Extinction: The Global Trade in Endangered Species (Praeger, 2012).CrossRefGoogle Scholar

15 For an example, see Pires, S.F. & Moreto, W.D., ‘Preventing Wildlife Crime: Solutions that Can Overcome the “Tragedy of the Commons”’ (2011) 17(2) European Journal on Criminal Policy and Research, pp. 101–23.Google Scholar

16 The role of third parties and how they can be harnessed by the state for crime control has been considered in relation to other areas of illegal activity, such as the trafficking of illicit synthetic drugs. See, e.g., Cherney, A., O’Reilly, J. & Grabosky, P., ‘Networks and Meta-Regulation: Strategies Aimed at Governing Illicit Synthetic Drugs’ (2006) 16(4) Policing and Society, pp. 370–85.Google Scholar

17 Braithwaite, J., ‘The New Regulatory State and the Transformation of Criminology’ (2000) 40(2) British Journal of Criminology, pp. 222–38, at 222.Google Scholar

18 It has been noted by various authors that the public police never had a complete monopoly on policing: see, e.g., Zedner, L., ‘Policing Before and After the Police: The Historical Antecedents of Contemporary Crime Control’ (2006) 46(1) British Journal of Criminology, pp. 7896CrossRefGoogle Scholar; Ayling, J., Grabosky, P. & Shearing, C., Lengthening the Arm of the Law: Enhancing Police Resources in the 21st Century (Cambridge University Press, 2009)Google Scholar. Be that as it may, there is a considerable body of literature that traces the burgeoning of policing providers over the last two decades, beginning with the seminal work of Bayley, D.H. & Shearing, C., ‘The Future of Policing’ (1996) 30(3) Law and Society Review, pp. 585606.Google Scholar

19 D.H. Bayley & C. Shearing, The New Structure of Policing: Description, Conceptualization, and Research Agenda (National Institute of Justice, 2001).

20 Loader, I., ‘Plural Policing and Democratic Governance’ (2000) 9(3) Social and Legal Studies, pp. 323–45.Google Scholar

21 Garland, D., ‘The Limits of the Sovereign State: Strategies of Crime Control in Contemporary Society’ (1996) 36(4) British Journal of Criminology, pp. 445–71Google Scholar; O’Malley, P. & Palmer, D., ‘Post-Keynesian Policing’ (1996) 25(2) Economy and Society, pp. 137–55.Google Scholar

22 Sarre, R. & Prenzler, T., The Law of Private Security in Australia (Thomson Reuters, 2nd edn, 2009).Google Scholar

23 Ayling, Grabosky & Shearing, n. 18 above, at p. 5.

24 Ayling, J., ‘Force Multiplier: People as a Policing Resource’ (2007) 31(1) International Journal of Comparative and Applied Criminal Justice, pp. 73100.Google Scholar

25 H.R. Clinton, ‘Remarks at the Partnership Meeting on Wildlife Trafficking’, US Dept. of State, 8 Nov. 2012, available at: http://www.state.gov/secretary/rm/2012/11/200294.htm.

26 Arquilla, J. & Ronfeldt, D., Networks and Netwars: The Future of Terror, Crime, and Militancy (RAND, 2001)Google Scholar; Slaughter, A.-M., ‘Disaggregated Sovereignty: Towards the Public Accountability of Global Government Networks’ (2004) 39(2) Government and Opposition, pp. 159–90.Google Scholar

27 At the national and regional levels, the Australasian Environmental Law Enforcement and Regulators neTwork (AELERT) provides a good example. Internationally, INTERPOL’s National Environmental Security Task Force (NEST) initiative has recently been launched. Such task forces bring together police, customs, environmental agencies, other specialized agencies, prosecutors, non-governmental organizations and intergovernmental agencies into national multi-agency cooperatives to control TEC.

28 See, e.g., ASEAN Chiefs of Police Conference (ASEANAPOL) and its partnership with INTERPOL, available at: http://www.interpol.int/News-and-media/News-media-releases/2011/PR047.

29 Dupont, B., Grabosky, P. & Shearing, C., ‘The Governance of Security in Weak and Failing States’ (2003) 3(4) Criminal Justice, pp. 331–49.Google Scholar

30 Cornish, D.B., ‘The Procedural Analysis of Offending and its Relevance to Situational Prevention’, in Clarke, R.V. (ed), Crime Prevention Studies, Vol. 3 (Criminal Justice Press, 1994), pp. 151–96.Google Scholar

31 Bullock, K., Clarke, R.V. & Tilley, N., ‘Introduction’, in Bullock, K., Clarke, R.V. & Tilley, N. (eds), Situational Prevention of Organised Crime (Willan, 2010), pp. 116, at 2.Google Scholar

32 Ibid.

33 Milliken, T. & Shaw, J., The South Africa-Viet Nam Rhino Horn Trade Nexus: A Deadly Combination of Institutional Lapses, Corrupt Wildlife Industry Professionals and Asian Crime Syndicates (TRAFFIC, 2012), available at: http://www.traffic.org/speciesreports/traffic_species_mammals66.pdf.Google Scholar

34 Wellsmith provides a detailed explanation of each of these theories, so I will not do so here: see Wellsmith (2010), n. 6 above.

35 Cohen, L. & Felson, M., ‘Social Change and Crime Rate Trends: A Routine Activity Approach’ (1979) 44(4) American Sociological Review, pp. 588608.Google Scholar

36 Eck, J., ‘Police Problems: The Complexity of Problem Theory, Research and Evaluation’ (2003) 15 Crime Prevention Studies, pp. 79113 (emphasis added).Google Scholar

37 Warchol, G. & Johnson, B., ‘Wildlife Crime in the Game Reserves of South Africa: A Research Note’, (2009) 33(1) International Journal of Comparative and Applied Criminal Justice, pp. 143–54.CrossRefGoogle Scholar

38 World Wildlife Fund (WWF), Fighting Illicit Wildlife Trafficking: A Consultation with Governments, (WWF/Dalberg, 2012), available at: http://www.dalberg.com/documents/WWF_Wildlife_Trafficking.pdf.Google Scholar

39 von Lampe, K., ‘The Application of the Framework of Situational Crime Prevention to “Organized Crime”’ (2011) 11(2) Criminology and Criminal Justice, pp. 145–63.Google Scholar

40 Kahler and Gore note that there are several possible motivations for wildlife crime and, in their empirical study of poaching in the Caprivi region of north-east Namibia, they identify nine motivational categories that include but go beyond ‘cooking pot and pocket book’ explanations. They note that diverse motivations should elicit different approaches to reducing poaching: Kahler, J.S. & Gore, M.L., ‘Beyond the Cooking Pot and Pocket Book: Factors Influencing Noncompliance with Wildlife Poaching Rules’ (2012) 36(2) International Journal of Comparative and Applied Criminal Justice, pp. 103–20Google Scholar. See also Nurse, A., Animal Harm: Perspectives on Why People Harm and Kill Animals (Ashgate, 2013)Google Scholar, highlighting the need to take account of motives in crafting regulatory responses to animal cruelty.

41 Parker, C. & Braithwaite, J., ‘Regulation’, in Cane, P. & Tushnet, M. (eds), The Oxford Handbook of Legal Studies (Oxford University Press, 2003), pp. 119–45.Google Scholar

42 Ayres, I. & Braithwaite, J., Responsive Regulation: Transcending the Deregulation Debate (Oxford University Press, 1992).Google Scholar

43 There is no need to go further in this article into the complexities of responsive regulation and the concomitant well-known enforcement pyramid.

44 Grabosky, P., ‘Using Non-Governmental Resources to Foster Regulatory Compliance’ (1995) 8(4) Governance: An International Journal of Policy and Administration, pp. 527–50Google Scholar; Cherney, O’Reilly & Grabosky, n. 16 above.

45 R. Brewer, ‘Policing the Waterfront: The Social Structure of Collaborative Crime Control’ (PhD thesis, Australian National University, Jan. 2012), at p. 54.

46 Rademeyer, J., Killing for Profit: Exposing the Illegal Rhino Horn Trade (Zebra Press, 2012), pp. 168–93.Google Scholar

47 Smillie, S., ‘Joy as Rhino Smuggler Gets 40 Years’, IOL News, 10 Nov. 2012, available at: http://www.iol.co.za/news/crime-courts/joy-as-rhino-smuggler-gets-40-years-1.1420788.Google Scholar

48 Humane Society International, ‘Rhinoceros Horn Stockpiles: A Serious Threat to Rhinos’, 2011, available at: http://www.hsi.org/assets/pdfs/rhino_horn_stockpiles_report.pdf.

49 Grabosky, n. 44 above, at p. 530.

50 Cherney, O’Reilly & Grabosky, n. 16 above, at p. 376.

55 Rio de Janeiro (Brazil), 5 June 1992, in force 29 Dec. 1993, available at: http://www.cbd.int/convention/text.

56 Washington, DC (US), 3 Mar. 1973, in force 1 July 1975, available at: http//:www.cites.org.

59 Grabosky, n. 44 above, at p. 534.

60 Cherney, O’Reilly & Grabosky, n. 16 above, at p. 376.

61 Mazerolle, L. & Ransley, J., Third Party Policing (Cambridge University Press, 2005).Google Scholar

62 16 U.S.C. §1531 et seq., 1973.

63 16 U.S.C. §1540 (g). Relevant non-discretionary government duties are provided for in 16 U.S.C. §1533.

64 An often cited application of this provision is the Flying Fox case, Booth v. Bosworth [2001] FCA 1453. The applicant for the injunction in question was employed by the Worldwide Fund for Nature (Australia), and also did voluntary work for the North Queensland Conservation Council and the Magnetic Island Nature Care Association. She had also cared for orphaned flying foxes. Her standing was accepted by the court with little debate.

65 S. Burbank, S. Farhang & H.M. Kritzer, ‘Private Enforcement of Statutory and Administrative Law in the United States (and Other Common Law Countries)’, Public Law and Legal Theory Research Paper Series, Research Paper No. 11-08, 16 Nov. 2011, University of Pennsylvania Law School, available at: http://ssrn.com/abstract=1781047.

66 Grabosky, P., ‘Regulation by Reward: On the Use of Incentives as Regulatory Instruments’ (1995) 17(3) Law and Policy, pp. 257–82, at 262.Google Scholar

67 Pires & Moreto, n. 15 above, at p. 112.

68 In South Africa, poaching activities can be reported through the general Crimestop number provided by the government. Third parties often provide hotlines too. For example, Ezemvelo KZN Wildlife (a statutory entity which reports to the relevant minister through its board) provides several contact numbers for the reporting of different kinds of poaching. Similarly, the Kenya Wildlife Conservation Forum (KWCF), part of the NGO, East African Wild Life Society (EAWLS), has recently established a hotline for reporting wildlife crimes in response to the upsurge in elephant and rhinoceros poaching: see http://www.eawildlife.org/the-news/eawlsnews/184-wildlife-crime-hotline-goes-live.

69 Since Dec. 2012, Kruger National Park in South Africa has been using a Seeker II unmanned aerial vehicle, or drone, loaned to the SANParks by its South African manufacturer, to patrol for poachers, particularly of rhinoceros. The Ol Pejeta Conservancy in Kenya used an internet campaign to raise money for its own drone and currently has the parts on order: see Kariuki, J., ‘Ol Pejeta Deploys Drone against Rhino Poachers’, Business Daily, 23 Jan. 2013, available at: http://www.businessdailyafrica.com.Google Scholar

70 Investigation of TEC by NGOs has often been helpful for the police in bringing prosecutions: see White (2011), n. 5 above.

71 Carnie, T., ‘Plan to Sell Rhino Horns to China’, IOL News, 13 July 2012, available at: http://www.iol.co.za/news/politics/plan-to-sell-rhino-horns-to-china-1.1340599.Google Scholar

73 However, states often provide support for private initiatives such as certification schemes. For instance, Austria provided funding that was key to laying the foundations for the FSC: Bartley, T., ‘Institutional Emergence in an Era of Globalization: The Rise of Transnational Private Regulation of Labor and Environmental Conditions’ (2007) 113(2) American Journal of Sociology, pp. 297351Google Scholar. States may also facilitate discussion about environmental standards, provide auditing mechanisms or incorporate certification requirements into their own regulatory schemes: Meidinger, E.E., ‘Forest Certification as Environmental Law Making by Global Civil Society’, in Meidinger, E.E., Elliott, C. & Oesten, G. (eds), Social and Political Dimensions of Forest Certification (Remangen Oberwinter, 2003), pp. 293329Google Scholar; Vogel, D., ‘The Private Regulation of Global Corporate Conduct: Achievements and Limitations’ (2010) 49(1) Business & Society, pp. 6887Google Scholar. Relationships between private environmental initiatives and government regulation are complex and raise interesting issues about complementarity and conflict that need further research: Bartley, T., ‘Certification as a Mode of Social Regulation’, in Levi-Faur, D. (ed), Handbook on the Politics of Regulation (Edward Elgar, 2011), pp. 441–52.Google Scholar

74 Programme for the Endorsement of Forest Certification: see http://www.pefc.org.

76 Vandenburgh dubs this type of private regulation through contract ‘the new Wal-Mart effect’: Vandenburgh, M.P., ‘The New Wal-Mart Effect’ (2007) 54(4) UCLA Law Review, pp. 913–70Google Scholar. IKEA, for example, imposes minimum standards on its wood product suppliers and regularly audits them with the aim of ensuring that those products come from sustainably managed forests. Non-compliant suppliers are required to immediately implement corrective action. IKEA and the WWF also work together on projects to increase the availability of FSC certified wood and reduce illegal logging in countries such as Russia, Cambodia and Romania: see http://www.ikea.com/ms/img/newsroom/wlw/FACTSforestryFINAL20jan.pdf. This show of environmental concern on the part of large purchasers originated as a defensive response to targeted activist campaigns designed to embarrass and shame them and their suppliers. However, the acceptance of responsibility for the environmental practices of suppliers has now become a business norm: Vogel, n. 73 above, at p. 79.

77 Grabosky, n. 44 above, at pp. 536–7.

78 Vogel, n. 73 above, at pp. 76–8.

79 Grabosky, P., ‘On the Interface of Criminal Justice and Regulation’, in Quirk, H., Seddon, T. & Smith, G. (eds), Regulation and Criminal Justice: Innovations in Policy and Research (Cambridge University Press, 2010), pp. 72100, at 96.Google Scholar

80 Osborne, D. & Gaebler, T., Reinventing Government: How the Entrepreneurial Spirit is Transforming the Public Sector (Addison-Wesley, 1992), pp. 25–48.Google Scholar

81 Sometimes these ideas relate to the acceptability of breaking laws and causing collateral harm in pursuit of crime prevention and law enforcement objectives: see White (2012), n. 5 above.

82 Ayling, J., ‘What Sustains Wildlife Crime? Rhino Horn Trading and the Resilience of Criminal Networks’ (2013) 16(1) Journal of International Wildlife Law and Policy, pp. 5780.Google Scholar

83 V. Felbab-Brown, Indonesia Field Report III – The Orangutan’s Road: Illegal Logging and Mining in Indonesia, Foreign Policy Trip Reports No. 37, Brookings Institute, 7 Feb. 2013, at p. 7, available at: http://www.brookings.edu/research/reports/2013/02/07-indonesia-illegal-logging-mining-felbabbrown.

85 Ayling, Grabosky & Shearing, n. 18 above.

86 Grabosky, n. 44 above, at p. 538.

87 Crawford, A., The Local Governance of Crime: Appeals to Community and Partnerships (Clarendon Press, 1997).Google Scholar

88 O’Flynn suggests that, in fact, few state/non-state working relationships can be described as truly collaborative. She cites the typology of Himmelmann, for whom collaboration is at the apex of four strategies of working together, the others (in order of degrees of linkage) being networking, coordination and cooperation: O’Flynn, J., ‘Elusive Appeal or Aspirational Ideal? The Rhetoric and Reality of the “Collaborative Turn” in Public Policy’, in O’Flynn, J. & Wanna, J. (eds), Collaborative Governance: A New Era of Public Policy in Australia? (The Australian National University (ANU) E Press, 2008), pp. 181–95, at 185–6.Google Scholar

89 Brewer, n. 45 above, at pp. 6, 229 (for example). Brewer is concerned with crime on the waterfront and the relations that exist between the various actors that have an input into the operations of ports, but his conclusions about social capital are relevant to any context where the state attempts to harness the capacities of non-state actors for crime control.

90 Ibid., pp. 228–54.

91 Trust is not essential for criminal cooperation, which can occur in the absence of initial trust or in the presence of outright mistrust: von Lampe, K. & Johansen, P.O., ‘Organized Crime and Trust: On the Conceptualization and Empirical Relevance of Trust in the Context of Criminal Networks’ (2003) 6(2) Global Crime, pp. 159–84, at 177–80.Google Scholar

Figure 0

Table 1 Third parties in relation to the illicit wildlife trade

Figure 1

Figure 1 Mechanisms used to facilitate community coproduction (after Brewer 2012, at p. 54).