The Open Access Publisher and Free Library
08-Global crime.jpg

GLOBAL CRIME

GLOBAL CRIME-ORGANIZED CRIME-ILLICIT TRADE-DRUGS

Channeling Contraband: How States Shape International Smuggling Routes

By Max Gallien and Florian Weigand

Although  smuggling is  commonly  assumed to happen  in remote and difficult-to-access borderlands, in reality, smuggling is most prevalent in areas that states tightly control, including formal border crossings. To understand this puzzle, this article explores the relationship between states and smugglers at international borders. Based on extensive empirical research in various borderlands in North Africa and Southeast Asia, it argues that different kinds of smugglers prefer different types of relationships with the state. The article outlines six ideal types of such relationships. It contends that these types of relationships are the dominant factor in how different smuggling networks choose routes along a border. The findings have implications for our understanding of smuggling and policies that aim at addressing smuggling, especially regarding the effects of border fortifications and corruption prevention. bordFor over 400 kilometers, the border between Tunisia and Libya stretches across deserts, lakes, and mountains. The border provides a source of income for one of the largest smuggling economies in North Africa, with trading in everything from gasoline, fabrics, and electronics to cigarettes and narcotics. Its length and terrain make the border difficult to control for both Tunisian and Libyan security forces, and offer plenty of opportunities for the thousands of smugglers who cross the border everyday to stay undetected or leverage their superior knowledge of the terrain in high-speed car chases with soldiers and customs officers. And yet, most of these smugglers have chosen two particular points in the border to conduct their business: the formal border crossings as Ras Jedir and Dhiba. In fact, differ-ent smuggling networks prefer different routes: while those trading in mobile phones, bananas, or alcohol have typically preferred to play cat and Mouse.

SECURITY STUDIES, 2021, VOL. 30, NO. 1, 79–106