Advertisement

Making Sense of Innovation in the War on Drugs

  • Javier Guerrero C.
Chapter

Abstract

Several disciplines have produced an impressive body of literature on organised crime and drug trafficking, especially the economic aspect of drug trafficking. The chapter introduces de multiples pieces of literature dealing with organised crime phenomena and highlights the lack of interest concerning the vehicles in which drugs are transported and the process of innovation triggered by the interplay between drug smugglers and law enforcement agencies. To fully capture such dynamics, it is necessary to understand the importance of outlaw users in the production of both mundane and complex artefacts and the co-evolutionary nature of the innovation process in the War on Drugs (WoD).

Keywords

Organised crime Outlaw innovation Criminal networks Co-evolution 

References

  1. Andriani, P. (2003). Evolutionary Dynamics of Industrial Clusters. In E. Mitleton-Kelly (Ed.), Complex Systems and Evolutionary Perspectives on Organisations: The Application of Complexity Theory to Organisations (Vol. 2003, pp. 127–145). Oxford, UK: Pergamon Amsterdam.Google Scholar
  2. Bagley, B. (2011). Carteles de la droga: de Medellín a Sinaloa. Criterios, Cuadernos de Ciencias Juricias y Politica Internacional, 11(4), 233–247.Google Scholar
  3. Bagley, B. (2012). Drug Trafficking and Organised Crime in the Americas: Major Trends in the Twenty-First Century. Washington, DC: Woodrow Wilson International Center for Scholars.Google Scholar
  4. Bagley, B. (2013). The Evolution of Drug Trafficking and Organised Crime in Latin America. Sociologia, Problemas e Práticas, 71, 99–123.Google Scholar
  5. Barnett, W. P. (2008). The Red Queen Among Organizations: How Competitiveness Evolves. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
  6. Barnett, W. P., & Hansen, M. T. (1996). The Red Queen in Organizational Evolution. Strategic Management Journal, 17, 139–157.CrossRefGoogle Scholar
  7. Barnett, W. P., & Sorenson, O. (2002). The Red Queen in Organizational Creation and Development. Industrial and Corporate Change, 11(2), 289–325.CrossRefGoogle Scholar
  8. Baumol, W. J. (2004). Red-Queen Games: Arms Races, Rule of Law and Market Economies. Journal of Evolutionary Economics, 14(2), 237–247.CrossRefGoogle Scholar
  9. Beittel, J. (2012). Mexico’s Drug Trafficking Organizations. Trends in Organised Crime 15(1), 64–74.Google Scholar
  10. Benson, J. S., & Decker, S. H. (2010). The Organizational Structure of International Drug Smuggling. Journal of Criminal Justice, 38(2), 130–138.CrossRefGoogle Scholar
  11. Bibes, P. (2001). Transnational Organised Crime and Terrorism Colombia, a Case Study. Journal of Contemporary Criminal Justice, 17(3), 243–258.CrossRefGoogle Scholar
  12. Bogers, M., Afuah, A., & Bastian, B. (2010). Users as Innovators: A Review, Critique, and Future Research Directions. Journal of Management, 36(4), 857–875.CrossRefGoogle Scholar
  13. Bright, D., Koskinen, J., & Malm, A. (2018). Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network. Journal of Quantitative Criminology, 35(2), 237–258.Google Scholar
  14. Büscher, M., Gill, S., Mogensen, P., & Shapiro, D. (2001). Landscapes of Practice: Bricolage as a Method for Situated Design. Computer Supported Cooperative Work (CSCW), 10(1), 1–28.CrossRefGoogle Scholar
  15. Bushway, S., & Reuter, P. (2008). Economists’ Contribution to the Study of Crime and the Criminal Justice System. Crime and Justice, 37(1), 389–451.CrossRefGoogle Scholar
  16. Camacho Guizado, A., & López Restrepo, A. (2000). Perspectives on narcotics trafficking in Colombia. International Journal of Politics, Culture & Society, 14(1), 151–182.CrossRefGoogle Scholar
  17. Carroll, L. (1872). Through the Looking-Glass and What Alice Found There. Oxford, UK: Oxford University Press.Google Scholar
  18. Caulkins, J. P., Burnett, H., & Leslie, E. (2009). How Illegal Drugs Enter an Island Country: Insights from Interviews with Incarcerated Smugglers. Global Crime, 10(1–2), 66–93.CrossRefGoogle Scholar
  19. Choi, D. Y., & Perez, A. (2007). Online Piracy, Innovation, and Legitimate Business Models. Technovation, 27(4), 168–178.CrossRefGoogle Scholar
  20. Constant, E. (2000). The Evolution of War and Technology. In J. Ziman (Ed.), Technological Innovation as an Evolutionary Process (pp. 281–298). Cambridge, UK: Cambridge University Press.Google Scholar
  21. Coopersmith, J. (1998). Pornography, Technology, and Progress. ICON, 4, 94–125.Google Scholar
  22. Coopersmith, J. (2006). Does Your Mother Know What You Really Do? The Changing Nature and Image of Computer-Based Pornography. History and Technology, 22(1), 1–25.CrossRefGoogle Scholar
  23. Czarniawska, B. (2004). Structural Analyses. In Narratives in Social Science Research (pp. 76–87). London/Thousand Oaks, CA/New Delhi, India: Sage Publications.CrossRefGoogle Scholar
  24. Decker, S. H., & Townsend Chapman, M. (2008). Drug Smugglers on Drug Smuggling Lessons from the Inside. Philadelphia: Temple University Press.Google Scholar
  25. Desouza, K. C., Koh, W. T. H., & Ouksel, A. M. (2007). Information Technology, Innovation and the War on Terrorism. Technological Forecasting & Social Change, 74(2), 125–128.CrossRefGoogle Scholar
  26. Desouza, K. C., & Wang, T.-Y. (2007). Impeding Insurgent Attacks: The Information Management Agenda. Technological Forecasting and Social Change, 74(2), 211–229.CrossRefGoogle Scholar
  27. Fairtlough, G. (2000). The Organization of Innovative Enterprises. In J. Ziman (Ed.), Technological Innovation as an Evolutionary Process (pp. 267–277). Cambridge, UK: Cambridge University Press.Google Scholar
  28. Fleck, J. (1988). The Development of Information Integration: Beyond CIM? Edinburgh, UK: University of Edinburgh.Google Scholar
  29. Fleck, J. (1994). Learning by Trying: The Implementation of Configurational Technology. Research Policy, 23(6), 637–652.CrossRefGoogle Scholar
  30. Fleck, J. (1997). Contingent Knowledge and Technology Development. Technology Analysis & Strategic Management, 9(4), 383–398.CrossRefGoogle Scholar
  31. Flowers, S. (2008). Harnessing the Hackers: The Emergence and Exploitation of Outlaw Innovation. Research Policy, 37(2), 177–193.CrossRefGoogle Scholar
  32. Flowers, S. (2011). User Innovation: Theory, Practice, and Policy. In J. R. Fairweather (Ed.), International Conference on Invention, Innovation and Commercialisation with Special Emphasis on Technology Users Innovation (TUI) (pp. 5–12). Christchurch, New Zealand: Agribusiness and Economics Research Unit Lincoln University.Google Scholar
  33. Flowers, S., & Hendwood, F. (2010). Introduction: Perspectives on User Innovation. In S. Flowers & F. Hendwood (Eds.), Perspectives on User Innovation (pp. 1–8). London: Imperial College Press.CrossRefGoogle Scholar
  34. Franck, R. E., & Pierce, T. C. (2006). Disruptive Military Innovation and the War on Terror: Some Thoughts for Perfect Opponents. Defense & Security Analysis, 22(2), 123–140.CrossRefGoogle Scholar
  35. Galeotti, M. (2004). Introduction: Global Crime Today. Global Crime, 6(1), 1–7.CrossRefGoogle Scholar
  36. Garzón, J. C. (2008). Mafia & Co. The Criminal Networks in Mexico, Brazil, and Colombia. Washington, DC: Woodrow Wilson Center Press.Google Scholar
  37. Geels, F. W. (2005b). Technological Transitions and System Innovations. Cheltenham, UK/Northampton, MA: Edward Elgar Publishing.CrossRefGoogle Scholar
  38. Gottschalk, P. (2010). Entrepreneurship in Organised Crime. International Journal of Entrepreneurship and Small Business, 9(3), 295–307.CrossRefGoogle Scholar
  39. Greenwood, T. (1990). Why Military Technology Is Difficult to Restrain. Science, Technology & Human Values, 15(4), 412–429.CrossRefGoogle Scholar
  40. Heine, J., & Thakur, R. (Eds.). (2011). The Dark Side of Globalization. Tokyo/New York/Paris: United Nations University Press.Google Scholar
  41. Hobbs, D., & Antonopoulos, G. A. (2014). How to Research Organised Crime. In L. Paoli (Ed.), The Oxford Handbook of Organised Crime (pp. 96–117). New York: Oxford University Press.Google Scholar
  42. Hyysalo, S. (2009). User Innovation and Everyday Practices: Micro-Innovation in Sports Industry Development. R&D Management, 39(3), 247–258.CrossRefGoogle Scholar
  43. Hyysalo, S., Pollock, N., & Williams, R. (2018). Method Matters in the Social Study of Technology. Science & Technology Studies. https://www.research.ed.ac.uk/portal/en/publications/method-matters-in-the-social-study-of-technology(2708d7cc-63dd-46f4-acf2-6e23c795f596)/export.html
  44. Hyysalo, S., & Usenyuk, S. (2015). The User Dominated Technology Era: Dynamics of Dispersed Peer-Innovation. Research Policy, 44(3), 560–576.CrossRefGoogle Scholar
  45. Jablonka, E., & Ziman, J. (2000). Biological Evolution: Process and Phenomena. In J. Ziman (Ed.), Technological Innovation as an Evolutionary Process (pp. 13–26). Cambridge, UK: Cambridge University Press.Google Scholar
  46. Jesperson, S. (2018). Responding to Drug Trafficking: A Question of Motives. In T. Reitano, S. Jesperson, & L. Bird Ruiz-Benitez de Lugo (Eds.), Militarised Responses to Transnational Organised Crime: The War on Crime (pp. 323–337). Cham, Switzerland: Springer International Publishing.CrossRefGoogle Scholar
  47. Jordan, T., & Taylor, P. (1998). A Sociology of Hackers. The Sociological Review, 46(4), 757–780.CrossRefGoogle Scholar
  48. Kauffman, S., & Macready, W. (1995). Technological Evolution and Adaptive Organizations: Ideas from Biology May Find Applications in Economics. Complexity, 1(2), 26–43.CrossRefGoogle Scholar
  49. Kauffman, S. A. (1995). Technology and Evolution: Escaping the Red Queen Effect. McKinsey Quarterly, 1, 118–129.Google Scholar
  50. Kenney, M. (2003). Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises. International Journal of Intelligence and CounterIntelligence, 16(2), 212–243.CrossRefGoogle Scholar
  51. Kenney, M. (2007a). From Pablo to Osama Trafficking and Terrorist Networks, Government Bureaucracies, and Competitive Adaptation. University Park, PA: The Pennsylvania State University Press.Google Scholar
  52. Kenney, M. (2007b). The Architecture of Drug Trafficking: Network Forms of Organisation in the Colombian Cocaine Trade. Global Crime, 8(3), 233–259.CrossRefGoogle Scholar
  53. Kenney, M. (2007c). The Rules of Drug Trafficking: Decision Making in Colombian Narcotics Enterprises. In G. Morcöl (Ed.), Handbook of Decision Making (pp. 361–371). Boca Ratón, FL/London/New York: Taylor & Francis.Google Scholar
  54. Kenney, M. (2010). “Dumb” Yet Deadly: Local Knowledge and Poor Tradecraft Among Islamist Militants in Britain and Spain. Studies in Conflict & Terrorism, 33(10), 911–932.CrossRefGoogle Scholar
  55. Kline, R., & Pinch, T. (1996). Users as Agents of Technological Change: The Social Construction of the Automobile in the Rural United States. Technology and Culture, 37(4), 763–795.CrossRefGoogle Scholar
  56. Krebs, C. P., Costelloe, M., & Jenks, D. (2003). Drug Control Policy and Smuggling Innovation: A Game-Theoretic Analysis. Journal of Drug Issues, 33(1), 133–160.CrossRefGoogle Scholar
  57. Latour, B. (1992). Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts. In W. E. Bijker & J. Law (Eds.), Shaping Technology/Building Society: Studies in Sociotechnical Change (pp. 225–258). Cambridge, MA/London: The MIT Press.Google Scholar
  58. Lüthje, C. (2004). Characteristics of Innovating Users in a Consumer Goods Field: An Empirical Study of Sport-Related Product Consumers. Technovation, 24(9), 683–695.CrossRefGoogle Scholar
  59. Lüthje, C., Herstatt, C., & von Hippel, E. (2005). User-Innovators and “Local” Information: The Case of Mountain Biking. Research Policy, 34(6), 951–965.CrossRefGoogle Scholar
  60. MacKenzie, D., & Spinardi, G. (1995). Tacit Knowledge, Weapons Design, and the Uninvention of Nuclear Weapons. American Journal of Sociology, 101(1), 44.CrossRefGoogle Scholar
  61. Maxigas. (2017). Hackers Against Technology: Critique and Recuperation in Technological Cycles. Social Studies of Science, 47(6), 841–860.CrossRefGoogle Scholar
  62. McIntosh, C. N., & Lawrence, A. (2011). Spatial Mobility and Organised Crime. Global Crime, 12(3), 161–164.CrossRefGoogle Scholar
  63. McLoughlin, I., & Harris, M. (1997). Introduction: Understanding Innovation, Organisational Change and Technology. In I. McLoughlin & M. Harris (Eds.), Innovation, Organizational Change and Technology (pp. 1–26). London/Boston: International Thomson Business Press.Google Scholar
  64. Mejía, D., & Posada, C. E. (2008). Cocaine Production and Trafficking: What Do We Know? Washington, DC: The World Bank, Development Research Group, Macroeconomics and Growth Team.CrossRefGoogle Scholar
  65. Mitleton-Kelly, E., & Davy, L. K. (2013). The Concept of ‘Co-evolution’ and Its Application in the Social Sciences: A Review of the Literature. In E. Mitleton-Kelly (Ed.), Co-evolution of Intelligent Socio-Technical Systems Modelling and Applications in Large Scale Emergency and Transport Domains (pp. 43–57). Berlin/Heidelberg, Germany: Springer Berlin Heidelberg.CrossRefGoogle Scholar
  66. Morselli, C. (2010). Assessing Vulnerable and Strategic Positions in a Criminal Network. Journal of Contemporary Criminal Justice, 26(4), 382–392.CrossRefGoogle Scholar
  67. Morselli, C., Giguère, C., & Petit, K. (2007). The Efficiency/Security Trade-off in Criminal Networks. Social Networks, 29(1), 143–153.CrossRefGoogle Scholar
  68. Oudshoorn, N., & Pinch, T. (2003). Introduction How Users and Non-users Matter. In N. Oudshoorn & T. Pinch (Eds.), How Users Matter the Co-construction of Users and Technologies (pp. 1–25). Cambridge, MA/London: The MIT Press.CrossRefGoogle Scholar
  69. Oudshoorn, N., & Pinch, T. (2008). User-Technology Relationships: Some Recent Developments. In E. J. Hacket, O. Amsterdamska, M. Lynch, & J. Wajman (Eds.), The Handbook of Science and Technology Studies (3rd ed., pp. 541–566). Cambridge, MA/London: The MIT Press.Google Scholar
  70. Paoli, L. (2008). Organised Crime: New Label, New Phenomenon or Policy Expedient? International Annals of Criminology, 46(1–2), 37–60.Google Scholar
  71. Pinch, T. J., & Bijker, W. E. (1987). The Social Construction of Facts and Artifacts. In W. E. Bijker, T. P. Hughs, & T. Pinch (Eds.), The Social Construction of Technological Systems (pp. 17–50). Cambridge, MA: MIT Press.Google Scholar
  72. Pollock, N., & Williams, R. (2008). Software and Organisations: The Biography of the Enterprise-Wide System or How SAP Conquered the World. London/New York: Routledge.CrossRefGoogle Scholar
  73. Rappert, B., Balmer, B., & Stone, J. (2008). Science, Technology, and the Military: Priorities, Preoccupations, and Possibilities. In E. J. Hacket, O. Amsterdamska, M. Lynch, & J. Wajcman (Eds.), The Handbook of Science and Technology Studies (3rd ed., pp. 719–740). Cambridge, MA/London: The MIT Press.Google Scholar
  74. Rappert, B., & Croft, S. (2007). Introduction. In B. Rappert (Ed.), Technology and Security Governing Threats in the New Millennium (pp. 1–24). Houndmills, Basingstoke, Hampshire, UK/New York: Palgrave Macmillan.Google Scholar
  75. Reitano, T., De Lugo, L. B. R.-B., & Jesperson, S. (2018). Militarised Responses to Transnational Organised Crime: The War on Crime. Cham, Switzerland: Palgrave Macmillan.CrossRefGoogle Scholar
  76. Report of the High-Level Panel on Threats Challenges and Change. (2004). A More Secure World: Our Shared Responsibility. https://www.un.org/ruleoflaw/blog/document/the-secretary-generals-high-level-panel-report-on-threats-challenges-and-change-a-more-secure-world-our-sharedresponsibility/
  77. Reuter, P. (2004). The Political Economy of Drug Smuggling. In M. Vellinga (Ed.), The Political Economy of the Drug Industry, Latin America and the International System (pp. 127–147). Gainesville, FL: University Press of Florida.Google Scholar
  78. Rip, A. (2002). Co-evolution of Science, Technology and Society. Expert Review for the Bundesministerium Bildung und Forschung’s Förderinitiatieve, Politik, Wissenschaft und Gesellschaft, as Managed by the Berlin-Brandenburgische Akademie der Wissenschaften, Twente University, Enschede, Enschede, Netherlands.Google Scholar
  79. Rip, A., & Kemp, R. (1998). Technological Change. In S. Rayner & E. L. Malone (Eds.), Human Choice and Climate Change (Vol. II, pp. 327–399). Columbus, Ohio: Battelle Press.Google Scholar
  80. Russell, S., & Williams, R. (2002a). Concepts, Spaces and Tools for Action? Exploring the Policy Potential of the Social Shaping Perspective. In K. H. Sørensen & R. Williams (Eds.), Shaping Technology, Guiding Policy Concepts, Spaces and Tools (pp. 133–154). Cheltenham, UK/Northampton, MA: Edward Elgar.Google Scholar
  81. Russell, S., & Williams, R. (2002b). Social Shaping of Technology: Frameworks, Findings and Implications for Policy with Glossary of Social Shaping Concepts. In K. H. Sørensen & R. Williams (Eds.), Shaping Technology, Guiding Policy Concepts, Spaces and Tools (pp. 37–132). Cheltenham, UK/Northampton, MA: Edward Elgar.Google Scholar
  82. Schulz, C., & Wagner, S. (2008). Outlaw Community Innovations. International Journal of Innovation Management, 12(3), 399–418.CrossRefGoogle Scholar
  83. Shah, S. K. (2006). From Innovation to Firm Formation: Contributions by Sports Enthusiasts to the Windsurfing, Snowboarding & Skateboarding Industries. In E. F. Moritz & S. Haake (Eds.), The Engineering of Sport 6 (pp. 29–34). New York: Springer.  https://doi.org/10.1007/978-0-387-45951-6_6CrossRefGoogle Scholar
  84. Söderberg, J. (2010). Misuser Inventions and the Invention of the Misuser: Hackers, Crackers and Filesharers. Science as Culture, 19(2), 151–179.CrossRefGoogle Scholar
  85. Söderberg, J. (2017). Comparing Two Cases of Outlaw Innovation: File Sharing and Legal Highs. In B. Godin & D. Vinck (Eds.), Critical Studies of Innovation (pp. 115–136). Cheltenham, UK: Edward Elgar Publishing.CrossRefGoogle Scholar
  86. Sørensen, K. H. (2002). Social Shaping on the Move? On the Policy Relevance of the Social Shaping of Technology Perspective. In K. H. Sørensen & R. Williams (Eds.), Shaping Technology, Guiding Policy: Concepts, Spaces and Tools (pp. 19–36). Cheltenham, UK/North Hampton, MA: Edward Elgar.Google Scholar
  87. Stewart, J., & Williams, R. (2005). The Wrong Trousers? Beyond the Design Fallacy: Social Learning and the User. In D. Howcroft & E. M. Trauth (Eds.), Handbook of Critical Information Systems Research: Theory and Application (pp. 195–221). Cheltenham, UK/Northampton, MA: Edward Elgar.Google Scholar
  88. Taylor, P. A. (1999). Hackers: Crime in the Digital Sublime. London/New York: Routledge.CrossRefGoogle Scholar
  89. Thoumi, F. E. (1997). Drogas ilicitas en Colombia: su impacto economico, Politico, y Social. Bogotá, D C: PNUD, Ministerio de Justicia y del Derecho, Direccion Nacional de Estupefacientes, Planeta Colombiana Editorial, S.A., Colombia.Google Scholar
  90. Thoumi, F. E. (2004). Illegal Drugs in Colombia, from Illegal Economic Boom to Social Crisis. In M. Vellinga (Ed.), The Political Economy of the Drug Industry, Latin America and the International System (pp. 70–84). Gainesville, FL: University Press of Florida.Google Scholar
  91. UNODC. (2010). The Globalization of Crime. A Transnational Organised Crime Threat Assessment. Vienna: United Nations Office on Drugs and Crime.Google Scholar
  92. Vellinga, M. (2004). The Political Economy of the Drug Industry, Latin America and the International System. Gainesville, FL: University Press of Florida.Google Scholar
  93. Voss, G. (2007). The Dynamics of Technological Change in a Socially Stigmatised Sector. In DRUID-DIME Academy Winter 2007 PhD Conference on Geography, Innovation and Industrial Dynamics, Aalborg, Denmark.Google Scholar
  94. Voss, G. (2010). The Historical Construction of User Innovation. In S. Flowers & F. Henwood (Eds.), Perspectives on User Innovation (pp. 11–34). London: Imperial College Press.CrossRefGoogle Scholar
  95. Williams, P. (2001). Transnational Criminal Networks. In J. Arquilla & D. Ronfeldt (Eds.), Networks and Netwars: The Future of Terror, Crime, and Militancy (pp. 61–96). Santa Monica, CA: RAND Corporation.Google Scholar
  96. Williams, R., Stewart, J., & Slack, R. (2005). What Do We Mean by Social Learning? In R. Williams, J. Stewart, & R. Slack (Eds.), Social Learning in Technological Innovation, Experimenting with Information and Communication Technologies (pp. 47–64). Cheltenham, UK/Northampton, MA: Edward Elgar.Google Scholar
  97. Zaitch, D. (2002). Trafficking Cocaine: Colombian Drug Entrepreneurs in the Netherlands. The Hague, Netherlands: Kluwer Academic Publishers.Google Scholar
  98. Zaitch, D. (2004). Post-Fordist Cocaine, Labor and Business Relations Among Colombian Dealers. In M. Vellinga (Ed.), The Political Economy of the Drug Industry, Latin America and the International System (pp. 148–174). Gainesville, FL: University Press of Florida.Google Scholar
  99. Ziman, J. (2000). Evolutionary Models for Technological Change. In J. Ziman (Ed.), Technological Innovation as an Evolutionary Process (pp. 3–12). Cambridge, UK: Cambridge University Press.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  • Javier Guerrero C.
    • 1
  1. 1.School of Arts and HumanitiesInstituto Tecnológico MetropolitanoMedellínColombia

Personalised recommendations