Browsing by Subject "Smuggling"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Covert commerce : a social history of contraband trade in Venezuela, 1701-1789(2012-05) Cromwell, Jesse Levis; Twinam, Ann, 1946-; Canizares-Esguerra, Jorge; Deans-Smith, Susan; Olwell, Robert; Rahn Phillips, CarlaThis project explores how conditions of material scarcity and the potential for profit thrust both foreign and Spanish coastal inhabitants into vast networks of illegal, yet essential, commerce. Based on extensive archival investigations in Venezuela and Spain as well as shorter research trips to archives in England, Colombia, and the United States, I probe the specific dynamics of the largest portion of eighteenth-century Atlantic trade, illicit commerce, as a series of practices imbued with moral economy concerns, political meanings, and legal consequences. The first half of my manuscript uses a prosopographical, collective biography approach to profile the largely unexplored actors in the Spanish Empire’s underground economy off the Venezuelan coast: non-Spanish contrabandists, Spanish American merchants, and corrupt Spanish officials. These ordinary folk participated in quotidian transnational trade in basic goods that violated mercantile Spanish law. The second half examines the social impact that smuggling wrought on Venezuela. I focus specifically on the illicit slave trade and Afro-Caribbean contrabandists, the material culture of smuggled goods in Venezuelan daily life, and violent colonial opposition to anti-contraband strictures through several mid-eighteenth century trade uprisings. Smugglers’ shadowy existence between empires revises our understanding of interimperial contact, local identity formation, commercial autonomy, and popular protest in the early modern world. In its complicated and criminal nature, covert commerce also connects large structural shifts in the burgeoning eighteenth-century global economy to local petty traders.Item From vaqueros to mafiosos : a community history of drug trafficking in rural South Texas(2011-05) Guerra, Santiago Ivan, 1982-; Menchaca, Martha; Hartigan, John; Limon, Jose E.; Foley, Doug; Martinez, AnneMy dissertation, From Vaqueros to Mafiosos: A Community History of Drug Trafficking in Rural South Texas is an ethnographic study of the impact of the drug trade in South Texas, with a specific focus on Starr County. This dissertation examines drug trafficking along the U.S-Mexico Border at two levels of analysis. First, through historical ethnography, I provide a cultural history of South Texas, as well as a specific history of drug trafficking in Starr County. In doing so, I highlight the different trafficking practices that emerge throughout South Texas’ history, and I document the social changes that develop in Starr County as a result of these illicit practices. The second half of my dissertation, however, is devoted to a contemporary analysis of the impact of the drug trade on the border region by analyzing important social practices in Starr County relating to drug abuse, policing and the criminal justice system, youth socialization and family life. Through ethnography I present the devastating effects of the drug trade and border policing on this Mexican American border community in rural South Texas.Item A general nuclear smuggling threat scenario analysis platform(2011-08) Thoreson, Gregory George, 1985-; Schneider, Erich A.; Biegalski, Steven R.; Klein, Dale E.; Morton, David P.; Waters, Laurie S.A hypothetical smuggling of material suitable for a nuclear weapon is known as a threat scenario. There is a considerable effort by the U.S. government to reduce this threat by placing radiation detectors at key interdiction points around the world. These detectors provide deterrence and defense against smuggling attempts by scanning vehicles, ships, and pedestrians for threat objects. Formulating deployment strategies for these detectors within the global transportation network requires an understanding of the complex interactions between the attributes of a smuggler and the detection systems. These strategies are rooted in the continued development of novel detection systems and alarm algorithms. Radiation transport simulation provides a means for characterizing detection system response to threat scenarios. However, this task is computationally expensive with existing radiation transport codes. Furthermore, the degrees of freedom in smuggler and threat scenario attributes create a large, constantly evolving problem space. Previous research has demonstrated that decomposing the scenario into independently simulated components using Green's functions can simulate photon detector signals with coarse energy resolution. This dissertation presents a general form of this approach, applicable to a wide range of threat scenarios through physics enhancements and numerical treatments for high energy resolution photon transport, neutron transport, and time dependent transport. While each Green's function implicitly captures the full transport phase-space within each component, these new methods ensure that this information is preserved between components. As a result, detector signals produced from full forward transport simulations can be replicated within 20% while requiring multiple orders of magnitude less computation time. This capability is presented as a general threat scenario simulation platform which can efficiently model a large problem space while preserving the full radiation transport phase-space.Item Two-person games for stochastic network interdiction : models, methods, and complexities(2009-12) Nehme, Michael Victor; Morton, David P.We describe a stochastic network interdiction problem in which an interdictor, subject to limited resources, installs radiation detectors at border checkpoints in a transportation network in order to minimize the probability that a smuggler of nuclear material can traverse the residual network undetected. The problems are stochastic because the smuggler's origin-destination pair, the mass and type of material being smuggled, and the level of shielding are known only through a probability distribution when the detectors are installed. We consider three variants of the problem. The first is a Stackelberg game which assumes that the smuggler chooses a maximum-reliability path through the network with full knowledge of detector locations. The second is a Cournot game in which the interdictor and the smuggler act simultaneously. The third is a "hybrid" game in which only a subset of detector locations is revealed to the smuggler. In the Stackelberg setting, the problem is NP-complete even if the interdictor can only install detectors at border checkpoints of a single country. However, we can compute wait-and-see bounds in polynomial time if the interdictor can only install detectors at border checkpoints of the origin and destination countries. We describe mixed-integer programming formulations and customized branch-and-bound algorithms which exploit this fact, and provide computational results which show that these specialized approaches are substantially faster than more straightforward integer-programming implementations. We also present some special properties of the single-country case and a complexity landscape for this family of problems. The Cournot variant of the problem is potentially challenging as the interdictor must place a probability distribution over an exponentially-sized set of feasible detector deployments. We use the equivalence of optimization and separation to show that the problem is polynomially solvable in the single-country case if the detectors have unit installation costs. We present a row-generation algorithm and a version of the weighted majority algorithm to solve such instances. We use an exact-penalty result to formulate a model in which some detectors are visible to the smuggler and others are not. This may be appropriate to model "decoy" detectors and detector upgrades.Item Un-deterring fences, why is Gaza still attacking?!(2011-08) El Nakhala, Doaa' Hamdi; Pedahzur, Ami; Gavrilis, GeorgeMany contemporary states and historic political entities walled their borders stressing the idea that these barriers would protect their homelands from external threats and thus, achieve security. Although this security argument has prevailed, the political science literature fails to offer a systematic empirical examination of the relationship between barriers and cross-border threats. This research attempts to bridge this gap by answering the question: What are the actual security outcomes of physical barriers on borders? And thus, under what conditions do barriers succeed/fail to achieve security? This paper posits that, in some cases, building barriers on borders to stop non-state actors’ attacks escalate conflict. It demonstrates that when militants have supply institutions, they will manage to increase their attacks and shift to new tactics despite the barrier. It also studies the Israeli Gaza Strip Fence and offers an analysis based on patterns of the relationships between features of the barrier and the Gaza attacks. these patterns are derived from a quantitative dataset built by the researcher and are also supplemented by qualitative data about the case.