Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Working Manuscript
August 2011
Nazli Avdan
nazli.avdan@univ.ox.ac.uk
1
Trafficking, Organized Crime, and Border Control: Vicious or Virtuous Cycle?
Introduction
The last decade has given rise to a burgeoning literature addressing the changing
contours of the security landscape in world politics (2004, 464; Buzan et al. 1998; Salehyan
2006). From one perspective, the changing security environment is attributed to the rise of
non-state actors (Kaldor 1999). As wielders of “informal violence”, non-state actors challenge
which rest on a strict spatial demarcation of the state system (Agnew 1994). The ascendancy
in importance of non-state threats entails that the state’s borders---the “hard shell” of the
perimeter but instead serve as a conduit for flows of information, goods, capital, and
individuals.
From another vantage point, however, the redefinition of the security context states
find themselves in is intimately tied to globalization (Keohane 2002). On the one hand, the
communication avenues and transport technologies that facilitate cross-border social and
economic exchange between states are exploitable by non-state actors. On the other hand, the
transformations in developing countries, growing disparity in wealth form the foundation for
1Although Herz (1968) introduced the term of hard borders, as Agnew notes, the territorial bias defined the thinking
of a broader range of classical realists and moreover, was foundational for neorealism’s strict separation of domestic
and international spheres, as encapsulated by Waltz’s (1979) ordering principle.
2
informal spread of violence. In sum, globalization provides the opportunity and willingness
for non-state actors to threaten state security in ways uniquely different from military threats
offer insights into how the security paradigm in international relations is reshaped and how
states’ security interests are, in turn redefined. This expansive debate notwithstanding, much
less attention has been paid to the interrelationship between states’ policy responses to the
changing international environment and new security challenges. Exploring the (reciprocal)
ties between policy and context is integral to assessing the effectiveness of policy-making
essence providing a “golden straitjacket”—whereby states’ policy decisions are affected by the
decisions of other states and in turn have repercussions for other states in the system
(Friedman 1999; Held 1999). Building on social complexity theory, I apply this insight to the
security sphere of policy-making and argue that states’ policy responses and the security
threats they encounter are characterized by a symbiotic relationship. My theory posits that
states respond rationally to dilemmas of globalization but these responses in turn alter the
border control policies to combat and mitigate an egregious and widespread form of crime:
human trafficking.
3
Why focus on human trafficking? First, human trafficking underscores the
transnational nature of security threats from non-state actors. In the last few decades
trafficking has become a global phenomenon that traverses interstate borders and recruits
perpetrators internationally and constitutes a multimillion dollar business. Although the exact
magnitude of the problem is hard to specify, the U.S. Department of State estimates that there
are more than 12 million victims of human trafficking globally. Second, traffickers threaten
states’ security interests on several levels. On one level, trafficking poses a problem for local
governance and human security. On another level, crime may be destabilizing at the global
level by leading to a corruption of civil society (Shelley 1999). Perhaps on a deeper level,
transnational trafficking imperils state sovereignty: precisely because trafficking networks can
operate in a surreptitious manner and gain covert access to states’ territories, they undermine
states’ control over borders and territory, a fundamental pillar of state sovereignty. 2
Furthermore, as Salehyan (2006) notes, while states enjoy a monopoly of force domestically,
criminal networks in circumventing state authority. Last but not least, human trafficking is
unique among types of organized crime in imposing a normative burden on states to engage
The decision to concentrate on states’ border and migration control policies to model
the interrelationship between transborder crime and states’ policy responses is guided by
several motivations. First, borders delineate the reach of state authority and mark the extent
2 In terms of Krasner’s (1999) dimensions of state sovereignty, loss of control over borders entails weakening of
interdependence sovereignty.
4
of territory over which states enjoy monopoly over coercive force (Salehyan 2006). Effective
monitoring of borders is essential to countering non-state actors: migration and border control
policies serve to deter and screen out clandestine undesirables (Andreas 2000, 2000). Second,
states’ border and migration policies capture states’ efforts to counter threats that might
This paper makes several theoretical and empirical contributions to the literature.
First, by focusing on border control policies, I address a current debate in the transnational
crime literature, encapsulated by two competing propositions (Salt 2000). On the one hand,
trafficking is posited to have thrived as a result of lax controls at borders. On the other hand,
however, more stringent controls are held to give rise to a demand for traffickers, as
prospective migrants are forced to use illegal channels. Whereas both propositions make
intuitive sense and are grounded in empirical observations by policy analysts, there is a dearth
of studies that systematically examine these propositions. I seek to address this shortcoming
explicitly model the relationship between states’ border control policies and the prevalence of
human trafficking in origin countries. Second, this paper makes a broader theoretical
contribution to recent security studies. By unpacking the relationship between states’ policies
and the security context, I show how states’ decisions are structured by new security threats,
and how the threats evolve in response to changes in states’ policies. By doing so, I address an
eroding in the face of non-traditional security threats? Finally, from a policy perspective,
5
whether the feedback mechanism between policy and context can be characterized as a
virtuous or vicious cycle has implications for the effectiveness of states’ polices to countering
The rest of the paper proceeds as follows. The first section provides a survey of the
literature on transnational organized crime, while emphasizing the consequences for state
security in the context of globalization. The next section offers an overview of scholarship on
human trafficking. The third section draws on feedback mechanisms in international relations
to tease out the causal linkages between states’ border policies and human trafficking threats.
The empirical section utilizes ordinal measures for trafficking threats in countries of origin
and transit, collected from United Nations Office on Drugs and Crime (UNODC) Global
Patterns, an annual survey of human trafficking, and data on states’ visa policies to test the
hypotheses derived from the theoretical framework. The final section concludes with a
exert a positive and integrative effect on world politics, criminal organizations represent a
more malevolent kind of transnational actor (Adamson 2006; Williams 2001). Driving home
the seriousness of the security threat posed by trafficking and referring to the problem as the
“the New Evil Empire”, a 1994 report by the Center for Strategic and International Studies
speculated that organized crime was the greatest threat to democracies since the fall of
6
communism (Raine and Cilluffo 1994). As developments in technology and communications
enhance the interconnectedness of countries, illicit flows of individuals have assumed a global
character. The decrease in transaction costs has enabled illicit traders to operate much more
easily across interstate boundaries (Shelley 1999). Referring to human trafficking as a form of
modern-day slavery, Bales stresses that processes of globalization and crime have become
intertwined: “slavery has become ensnared in the process of globalization, being driven
deeper into the illicit economy. In sum, the transformation of slavery is an example of the
globalization process, taking place in the shadows, and is little observed and less understood”
Moreover, beyond the fact that international migration and expanding transnational
crime are spurred by economic globalization, the very process of globalization has accentuated
the linkages between the two phenomena (Koslowski 2001). The increase in migration and the
formation of migrant networks has created new opportunity structures for transnational
crime. 3 Consistent with this theme, the social and economic transformations produced by
life; the demands of rapid development coupled with an explosion in population widened the
opportunities for organized crime (Berdal and Serrano 2002). As a second example, rising
unemployment and economic inequality following the fall of communism and the consequent
dismantlement of welfare safety nets provided the push factor for an outflow of economic
3Recruitment based on ethnic loyalties is an example. Marginalization of migrants in Europe might propel poor
migrants to participate in crime in exchange for material compensation. See Bovenkerk 1993, cited in Williams 2001.
7
migrants from Eastern Europe. The services of traffickers and smugglers became attractive for
prospective migrants lacking the economic means to gain legal access to developed countries.
At the same time, globalization creates a demand for cheap illicit labor in destination countries
(Clark 2003). As such, the demand for cheap or free labor is consonant with other labor trends
that make use of short-term foreign labor; these trends in turn are an outgrowth of economic
have also given rise to instability, which in turn breeds corruption of governmental officials
and institutions, empowering organized crime (Bales 2000). At the same time, globalization
bolsters the perception of relative deprivation as it expands the worldview of the vulnerable
and lures them to seek better prospects in economically developed countries (Feingold 2005).
corruption renders possible the illicit use of violence, making for a breeding ground for
organized crime. Far from being an outcome of economic globalism, transnational crime is
embedded in and exploits the technologies and processes of globalization and is intimately
advantage of trans-border forms of structuring and production, illicit networks make use of
The parallels between legitimate global corporations and organized crime have led
8
an intermediary system facilitating illicit human mobility from origin through transit to
destination countries. The role that intermediaries play is made possible by the
commodification of migration (Salt 2000; Salt and Stein 1997). The reconceptualization of
smuggling and trafficking of humans as a business moves away from the traditional
individual on the one hand, and on the other, the policies of destination governments. The
“business” of trafficking involves high turnover as globalization feeds supply in origin states
crime entails minimized risk and increases profitability as networks exploit differences in
regulatory mechanisms and penal codes across countries, recruit internationally, and seek
organized crime endangers domestic stability by breeding corruption and usurping legitimate
channels of economic exchange. The same civil society networks that make up the
international public sphere become conduits for transnationally organized illicit activities
(Mittleman and Johnston 2000). Crime may inculcate dependence at the local level on illicit
4 Williams notes that the advantages of networks are manifold and are not exclusive to criminal organizations. The
capacity of networks to coexist within and outside of larger organizations, their ability to facilitate transfer of
information and commodities lends them an elusive quality. The network model renders organizations hard to
identify and detect by law enforcement. Not only are such organizations clandestine but they also lack a center or
focus of gravity insofar as they are dispersed in their operations. Transnational criminal networks are further poised
to exploit differences in national regulations and legislation, making them harder to track down and prosecute.
Additionally the ability to cross borders entails that such organizations choose countries for operations to minimize
risk and maximize profit margins. Flexibility and informal organization also shields such organizations from
dismantlement and grants them a considerable degree of resilience; even if parts of the organization are destroyed,
other cells can take on their functions.
9
revenue and undermine legitimate economic transactions, drive away business, and hamper
cross-border trade (Apap et al. 2002). The existence of drug cartels in Mexico for example pose
a risk for foreign direct investment insofar as potential violence perpetrated by organized
crime networks figures into the cost-benefit calculation of investors (Archibold 2011). Second,
transnational crime spawns domestic instability and has deleterious effects for the stability of
societies it penetrates (Kara 2009). For weak or failing states, such instability may prove fatal
as influxes of resources that sustain local crime networks may undermine states’ abilities to
maintain authority over certain areas and engender dependence on crime in local economies
(Adamson 2006). Third, organized crime may feed off of domestic conflict and exacerbate
violence. Sudan is a case in point: human trafficking networks exploited the breakdown of
order during Sudan’s civil war with the result that enslavement of civilians for forced labor or
sexual exploitation by militias—some of which were tied to the government-- became rampant
(Bales 2000). Fourth, organized crime corrodes the rule of law in societies it permeates and
(Jonnson 2009).
parallel to other types of “clandestine transnational actors”, organized criminals can initiate
and sustain operations outside of the bounds of state authority (Andreas 2001). Finally, policy
analysts and academic pundits have elaborated on the linkages between organized crime and
other types of non-state actors that threaten state security. The same networks often branch
out to various types of illicit activity: smuggling of contraband, nuclear weapons, drugs, and
10
humans (Salt 2000). Moreover, recent work has emphasized the close ties between terrorist
organizations and criminal networks; terrorist and criminal organizations not only share
organizational and operational characteristics and exploit the technologies of globalization but
also become entrenched in domestic environments with high levels of corruption and weak
state capacity (Sanderson 2004). 5 Especially with the decline in state sponsorship in the post-
Cold War era, terrorist organizations have resorted to organized crime to finance their
operations. Examples abound: from PKK in Turkey, FARC and Shining Path in Colombia to
ETA in Spain; in short, the lines between terrorist activity and trans-border crime are often
arguably raises several issues from the perspective of human rights and women’s rights. 6 It is
worthwhile to briefly review the literature from human rights and gender perspectives
because we would expect normative and ideational concerns raised by human trafficking to
condition states’ responses concomitantly with the security externalities trafficking generates.
In fact, the organized crime “frame” through which states react to trafficking is relatively new
(Simmons and Lloyd 2010). Debates on the issue of trafficking on the international arena have
evolved through stages whereby the emphasis has shifted from public order and virtue at the
5 As Sanderson notes, even terrorist organizations that do benefit from state sponsorship, such as Hezbollah,
complement their revenues by engaging in trans-border crime.
6 In using the term organized crime I acknowledge that not all forms of human trafficking are perpetrated by
organized networks. As Feingold (2004) notes, human trafficking networks—such as the ones in Southeast Asia—are
sometimes disorganized and depend on a small group of individuals with loose ties. However, for the purposes of
this paper, the key ingredient is that these networks operate across borders, rely on secrecy, may traverse interstate
borders surreptitiously, and engage in illicit trafficking of humans.
11
turn of the century to human rights and human security in the early 1990s and more recently
to transnational crime.
the populace—women and children—and referred to the problem as the “white slave trade”, a
proxy term for prostitution. The earlier feminist perspectives on the issue surfaced in
response to the notion that the white slave trade presented a peril for the virtue of women and
a threat to public morality (Lobasz 2009). Concerns over societal virtue culminated in initial
attempts at international cooperation to thwart trafficking: 1921 and 1933 League of Nations
Conventions on the Traffic in Women and Children followed by the 1949 UN Convention for
the Suppression of the Traffic in Persons and the Exploitation of the Prostitution of Others.
This body of scholarship also formed the precursor to contemporary feminist debates on
human trafficking, structured around the criminalization of prostitution, the rights of the
trafficked, and the definition of exploitation. 7 The policy-minded strain of the literature is
interested in expanding the definition of exploitation to include sexual as well as other types
The human rights body of scholarship shares with feminist approaches to trafficking
the emphasis on human rather than state security (Gallagher 2009). Rather than strictly
focusing on the victimization of the exploitable, however, the human rights prism draws
7 The feminist literature on the topic is far too complex and broad to permit a full exploration in this paper.
12
attention to a number of human rights violations involved in trafficking: violation of the
freedom of movement, the right to dignity, freedom from inhumane treatment, and in extreme
cases, the right to life (Gallagher 2009; Hathaway 2009). The human rights perspective
emphasizes the coercive aspect of trafficking and sets it apart from other forms of irregular
Migration (IOM), it places states under a moral obligation to honor their human rights
commitments (Gallagher 2001; Hathaway 2009). From a policy vantage point, scholars of
human rights exhort governments to undertake measures to protect the rights of the trafficked
and stop treating them as illegal migrants (Clark 2003; Hathaway 2009).
Although the human rights discussion drew international attention to the issue of
trafficking and propelled efforts at cooperation to combat traffickers, it was the linkage to
transborder organized crime that ultimately brought the issue into the global limelight
(Gallagher 2009). The specter of trafficking as crime that covertly crosses borders situated the
issue squarely in scholarly debates on loss of control over territory and consequent attenuation
Department of State estimated that there are over 12 million victims of trafficking (State 2010).
Furthermore, like other forms of organized crime, trafficking is a lucrative business, ranking
third in revenue generated after trafficking in drugs and arms (Interpol 2011). Representing
trafficking threatens states’ security interests in ways parallel to other forms of organized
13
crime. Thus, trafficking threatens the state’s management of flows across borders, leads to loss
of governmental authority, and undermines public order and rule of law. It is a danger to the
state’s territorial sovereignty because on the one hand, traffickers may cross borders in a
surreptitious manner. On the other hand, trafficking leads to corruption of border and
immigration officials, further weakening governmental control over borders (Kara 2009).
complements “more traditional criminal activities such as drug trafficking, vehicle theft, arms
trafficking, and money laundering” (Bales 2005, 135). Policy analysts concur and further note
that not only is trafficking intimately intertwined with other forms of crime, but is often times
hard to distinguish from illicit activities such as smuggling of migrants (Naim 2005).
Despite the commonalities it shares as a security threat with other forms of organized
crime, human trafficking embodies several additional costs. For one, trafficking has
the cases of Russia, Moldova, and Ukraine (Shelley 1999). For both destination and origin
states, trafficking entails a public health hazard, with the possibility of spreading
communicable diseases (Simmons and Lloyd 2010). From another vantage point, due to the
issues of human rights and gender it raises, trafficking in individuals imposes a moral cost for
both source and host countries. Destination states face a normative commitment to counter
human rights violations: as an ergo omnes norm, the eradication of slavery, as enforced by the
International Court of Justice places states under an obligation to the international community
as a whole (Hathaway 2009). On the flip side, transit and origin states that fail to develop and
14
institutionalize effective mechanisms for prosecuting traffickers, preventing trafficking, and/or
protecting victims encounter condemnation by the international community (Cho et al. 2011).
These states are subjected to “naming and shaming” through annual reports published by
destination states and international media and at the extreme, face sanctions for lack of
securitization of migration. Notwithstanding the fact that it does not constitute a traditional
military threat, human mobility threatens security on several fronts: as a challenge to internal
security (rule of law and public order), cultural security (identity and belonging), and the
welfare state (drain on economic resources) (Huysmans 2006). At the domestic level, beliefs
that trafficking jeopardize state security are fostered by public perception that similar to other
forms of clandestine migration, trafficking violates borders, threatens internal stability, and
exploits loopholes in border and migration control (Apap et al. 2002). On the global level,
trafficking is also connected to changes in the international context that have given rise to the
securitization of migration: the end of the Cold War, the dismantling of internal borders
within the European Union, and globalization (Adamson 2006; Faist 2005). As a matter of fact,
pressures European countries grappled with in the post-Cold War environment (Simmons and
8 I leave aside the question of effectiveness of sanctions against origin states. As Feingold notes, new sanctions are
likely to be applied against countries that already face sanctions such as North Korea and Burma. Moreover,
threatening sanctions against unresponsive states such as China or Saudi Arabia may backfire by squashing dialogue
and diplomacy.
15
international measures, led by European countries, to cope with trafficking. The culmination
of the process was the UN Convention against Transnational Organized Crime and its
Protocols and the creation of the Ad Hoc Committee on the Convention, operating under the
auspices of the UN Office of Drugs and Crime (UNODC). 9 In effect, linking the issue of
trafficking to security threats from migration instead of limiting the debate to one of human
rights and exploitation of women propelled international efforts to counter human trafficking
migration. Precisely because traffickers exploit the same supply of prospective migrants that
lack the legitimate means of access to states’ territories, trafficking and smuggling are closely
connected (Graycar 1999; Naim 2005). Above and beyond targeting similar populations, the
same networks may perform both trafficking and smuggling operations, use the same tactics
political domestic contexts, and employ similar strategies to obtain funding and recruits.
These similarities have compelled scholars and governments to view the two issues as two
ends of the same continuum, despite the call by human rights activists and agencies to stop
treating the trafficked as illegal migrants. Moreover, the distinction between other forms of
undocumented migration and trafficking is often hard to ascertain. 10 When the limited
9 The supplemental Protocols of the UN Convention are: Protocol to Prevent, Suppress and Punish Trafficking in
Persons, Especially Women and Children (the Trafficking Protocol) and the Protocol against the Smuggling of
Migrants by Land, Sea and Air. Adopted by the UN General Assembly in 2000, the Protocols are legally binding
instruments that oblige ratifying states to devise measures against transnational organized crime.
10 Lobasz points out that individuals who rely on traffickers may not necessarily be aware of the kind of work
involved or the conditions of debt bondage but are aware that it will be low-cost and uninsured.
16
information that prospective migrants is taken into account, it becomes clear that migrants
who seek the professional assistance of smugglers may fall prey to traffickers (Sharma 2005).
Even when individuals voluntarily seek traffickers to facilitate access to territories and are
aware that they face low-wage work as recompense for traffickers’ services, trafficking may
involve elements of smuggling. In the latter case, the trafficked intend to cross states’ borders
in a clandestine and unauthorized manner (Apap et al. 2002; Friebel and Guriev 2006; Lobasz
2009). 11
To recapitulate, given the normative and security costs of human trafficking, we would
expect states to design policies to counter trafficking. In other words, expectations of norm-
predicting states’ policy responses (Avdeyeva forthcoming; Goldstein and Keohane 1993).
Border and migration control policies are foremost in the arsenal of measures states may take
to cope with the problem of trafficking. Arguably, states may devise a variety of policies to
enforcement officials, legislation that penalizes traffickers and protects the rights of victims, or
participating in interstate forums, sharing of technical assistance and information with other
countries targeted by trafficking networks (Friebel and Guriev 2006). Among these, bolstering
border controls and tightening migration regimes constitute the first line of defense against
11While smuggling and trafficking conjure images of clandestine border-crossings, this is one of the many methods
smugglers and/or traffickers employ to access states’ territories. Thus, illegal migration may transpire not only when
borders are crossed surreptitiously but also when the identification and visa documents are forged or in the cases of a
legitimate visa, if the migrants overstay the terms of the visa permit.
17
clandestine transborder actors such as traffickers and smugglers (Neumayer 2006; Thielemann
2006). 12 This paper is concerned with this particular category of policies because more so than
domestic or international efforts against trafficking, border and migration control mechanisms
seek to mitigate the loss of territorial sovereignty arising from human trafficking.
threats, and deterring clandestine entry. When the deterrent and screening functions of
border policies are considered, a straightforward expectation would be that more discerning
and stringent controls work toward ameliorating the problem of human trafficking. However,
policy analysts suggest that this picture might be too simplistic. On the one hand, stronger
border and migration controls have gained appeal precisely because porous borders have
been posited as the culprit in breeding and emboldening trafficking and smuggling networks.
On the other hand, however, policies have had perverse consequences: instead of dampening
the prevalence of organized crime, tightening of borders has resulted in a greater reliance by
migrants on illicit networks (Apap et al. 2002; Feingold 2005). Feingold underscores the
possibility of a vicious cycle whereby stringent border controls and the global tightening of
asylum admissions only drive desperate individuals to recruit the help of smugglers and
traffickers. Yet, at the same time, trafficking provides the rationale for tighter controls; in
12In the migration literature policies may be categorized according to the location of control: thus, workplace
sanctions constitute downstream policies that seek to regulate irregular migration after individuals have crossed a
state’s borders. In contrast, visa and on-site border policies such as militarization and fencing of the border are
upstream in the sense that they seek to deter illegal migration.
18
essence, “the trafficking issue is often used—some would say hijacked—to support policies
In sum, states face a catch-22 situation: transnational organized crime may be rooted in
weak controls and lack of governance in border zones but at the same time, uncompromising
migration control policies create an atmosphere that is unwittingly conducive to the operation
of trafficking networks. Yet these propositions remain untested. I seek to redress this gap in
the literature by explicitly modeling the purported feedback loops. From a methodological
standpoint, insights from the existing policy literature point to possible endogeneity: states
devise policies to counteract security threats from human trafficking but these security threats
may not be treated as exogenous factors. Conceptually, this mechanism highlights potential
reciprocity between states’ border and migration control policies and the security context
associated with trafficking. With this in mind, I draw on feedback effects in world politics to
toward understanding states’ border and migration policy responses to human trafficking.
First and foremost, systems theory recognizes complexity in global politics by acknowledging
13It is worth mentioning that perverse or unexpected effects are not unique to border and migration control. As
Feingold point out, other legal efforts such as governmental sanctions may have perverse –unexpected consequences.
The case of Burma illustrates this point: the legal requirement that women be accompanied by male relatives when
visiting border areas has increased the cost of travel for women and rendered them dependent on facilitators for
international travel, thereby increasing their vulnerability vis-à-vis traffickers.
19
interconnections between actors in the system and reciprocity between actors and the
environment (Jervis 1997). Complexity entails that policies enacted at the current time period
might have lagged effects manifesting several time periods in the future and function through
ripple effects through which other actors in the arena are affected by a state’s policies. As a
impact of decisions and accounts for the possibility of unintended consequences. I propose
that a systems perspective is integral to theorizing about states’ responses to organized crime,
given that a fundamental (untested) proposition in the literature is that while states formulate
literature is that states’ policies modulate the security climate by influencing both the demand
for trafficking and smuggling operations and the supply of individuals seeking facilitators to
cross borders in a clandestine manner. These insights ultimately cast doubt on the
effectiveness of states’ policies in the face of organized crime. I argue that before the question
of policy effectiveness can be discussed, it is important to specify how states’ policies interact
Systems-theory allows non-linear relationships between cause and effect and is thus
conducive to modeling feedback loops such as the one proposed to characterize border
policies and organized crime. More specifically, we may conceive of three ways through
which such non-linearities may occur: Jervis labels these first, second, and third interactions
(Jervis 1997). With first interactions, the effect of variables depend on the levels of other
20
variables; we may think of these as classic interaction-effects frameworks where effects are
non-additive and conditional (Brambor 2006). Second interactions refer to cases in which
actors’ strategies are contingent on the strategies of others. This scenario has been addressed in
international relations (IR) literature for example by exploring policy contagion, learning and
emulation between states (Simmons and Elkins 2004) or by explicitly modeling how states
condition their behavior on the expected behavior of others (Signorino 1999). Applied to the
topic of human trafficking, we might imagine first-level interactions taking place if the impact
macroeconomic context or regime type. More recently, scholars working on trafficking have
types of counter-trafficking measures (Cho et al. 2011). It further stands to reason that second
type interactions apply to the topic at hand to the extent that states anticipate negative
externalities from other states’ policies (Simmons and Lloyd 2010). To illustrate, faulty
regulatory mechanisms in transit or origin countries may exacerbate the problem for
destination states; alternatively, other destination states’ stringent border policies might
Although these mechanisms are interesting in their own right and merit scholarly
attention, this paper deals exclusively with the third kind of interactive dynamic: the
interrelationship between states and the context that engenders organized crime. As Jervis
elucidates, in order to trace circular causal relationships, researchers need to identify the
starting point of the mechanism at hand (Jervis 1997, 79). At the outset, tighter policies of
21
control over borders might seem attractive to destination states for a number of reasons. First,
migration pressures generate fears over loss of territorial control; clandestine entry is
intrinsically antithetical to state sovereignty. Second and related, states are in a position of
networks can mobilize across borders, can evade detection, shift their loci of operandi, are
hard to detect and identify, and resilient in the face of efforts to dismantle them, border and
migration control assume increased importance (Keohane 2002; Williams 2001). Third, the
securitization of migration highlights the negative externalities from all types of flows of
individuals across borders; a laundry list of threats are posited to accrue from porous borders:
spread of militancy, disease, crime, transnational terrorism, illegal migration, and organized
Although scholars are careful to distinguish between legal and illegal flows, stricter
policies serve as an across the board mechanism to target all aspects of human mobility
detrimental to states’ interests. Fourth, while border control is not the only policy instrument
workplace sanctions and changes to the penal code might not be equally effective in
preventing illicit access to states’ territories (Thielemann 2006). In that sense, on-site border
deployment of policing forces, and deterrent policies such as stringent visa policies are better
measures that impose sanctions on origin and transit states and international cooperation
22
efforts to counter the problem at large might not be conducive to reducing directed threats
from origin states. Finally, border and migration policies also serve the purpose of
strengthening public perception of governmental efficacy and alleviating public fears over loss
destination states will impose tight border and migration policies against origin and transit states.
repercussions that affect the security context in non-trivial ways. I propose that the feedback
loop may follow two competing pathways. First, we might imagine a virtuous cycle scenario
in which border and migration control policies mitigate states’ asymmetric vulnerabilities vis-
à-vis non state actors. While states are limited in their capacity to track down and punish
traffickers, stringent policies raise the costs for trafficking networks to operate and undercut
the expected revenues from trafficking operations. This in turn might have a number of
destination countries (Cho et al. 2011). If a cascade-effect occurs whereby a sufficient number
of destination states tighten up their borders, organized crime networks may be compelled to
operations or the forging of documents, stricter on-site or deterrent policies are expected to
have a direct effect on this form of organized crime. Additionally, tight border and migration
control might serve as a signal for how seriously the destination state considers the issue; to
the extent that it is correlated with other measures against traffickers, it might deter organized
23
criminals from targeting that state. In other words, more stringent policies raise the expected
costs for human trafficking by increasing the cost of operations or the probability that
H2 (Trafficking: Virtuous Effect): Tighter border and migration policies will result in
Alternatively, tighter policies might have consequences contrary to what they intend to
achieve, creating a vicious instead of a virtuous cycle. Stricter border and migration control
may embolden organized crime networks by fostering the market for traffickers and
smugglers. At the same time that tight policies raise the costs for traffickers, they also make it
more costly for prospective migrants to obtain legal access to destination states. More
importantly, policies such as visa restrictions make international travel more difficult for
individuals lacking financial means and credentials to pass the requirements to obtain legal
permits for territorial access. Moreover, restrictions on human mobility reflect a tension in the
increasingly relaxed, labor remains subject to limitations (Freeman 1995; Hollifield 1992, 2000;
Rudolph 2006). In that respect, traffickers feed off this tension by facilitating labor mobility,
albeit through illegal channels (Apap et al. 2002). Tighter policies exacerbate this tension,
increasing demand for intermediaries to facilitate labor mobility. Finally, efforts to curb illegal
migration may render desperate individuals seeking to cross borders more dependent on
24
borders, smuggling and trafficking operations become more complex and specialized. To
recapitulate, tighter controls increase the demand for traffickers and at the same time, force
traffickers to innovate, both of which in turn amplify the predominance of human trafficking.
H3 (Trafficking: Vicious Effect): Tighter border and migration policies will result in
The unit of analysis for the model is the directed dyad; this allows for a differentiation
between origin and destination country when examining the relationship between border
policies and organized crime. The dataset is cross-sectional and employs data on border
policies, organized crime, and human trafficking for 207 X207 directed dyads and independent
territories. A single equation model would be inappropriate in testing the hypotheses laid out
in the previous section. I posit a reciprocal relationship between policy and crime, either in
the form of a beneficial feedback loop whereby stricter policies reduce human trafficking or in
the form of a vicious cycle through which stringent border controls exacerbate trafficking. A
single estimation framework to estimate the effect of crime on border policies or vice versa
would not only miss part of the story but also lead to simultaneity bias. In effect, the
theoretical argument calls for a simultaneous equations framework. Consequently, the model
Hypothesis 1 focuses on the impact of human trafficking in the origin state on the
border policy of the destination state vis-à-vis the citizens of the origin. The border policy
25
equation models policy as a function of human trafficking in the origin state and a number of
push and pull factors for migrant flows as well as dyadic traits expected to shape border
controls.
𝐵𝑜𝑟𝑑𝑒𝑟 𝑃𝑜𝑙𝑖𝑐𝑦 𝐴
enacted by the destination state against the nationals of the origin state. The degree of
documentation required at borders is a good indicator of how open or closed a state’s borders
are vis-à-vis the citizens of another country (Boehmer and Peña 2008). States utilize visa
restrictions to categorize individuals before they are granted access to territory: those who do
not need a visa are regarded as risk-free by default and those who need a visa are required to
undergo closer inspection at consulates or embassies before being granted permission of entry
(Neumayer 2006). Data for visa restrictions uses Neumayer’s (2006) measure, coded from the
2004 version of the International Aviation Association’s Travel Manual (IATA ) (IATA 2004).
Utilized by the majority of airlines and travel bureaus, this manual provides authoritative
information on controls in place. Bilateral visa restrictions encompass 189 member states of the
26
United Nations and 18 non-member political territories, totaling to 207 dyads, or 36,300
directed dyads.
Human Trafficking in Origin: Lack of reliable data has plagued researchers of organized
crime and human trafficking (Cho et al. 2011). Not only do countries differ immensely in their
data collection and reporting capabilities but the covert nature of trafficking makes it difficult
to rely on official state statistics. Furthermore, data is likely to be missing particularly in states
trafficking (Buscaglia and Dijk 2003). With that in mind, I opt for indices of human trafficking
or states. I employ three measures: two that measure how ubiquitous trafficking is as a
problem in origin states and third that captures states’ policy efforts to combat trafficking.
Global Patterns Citation Index: The main indicator I use comes from UNODC’s
“Trafficking in Persons: Global Patterns Report” and associated appendices. The Global
Patterns citation index uses an ordinal score ranging from 1 (very low) to 5 (very high)
representing how many times a state was cited as destination, transit, or source (origin)
country for human trafficking in international and domestic institutions and media. 14 Relying
on 113 different institutions, the database includes data for 161 countries; if a country was
cited at least once as destination, transit, or origin, it is covered in the database. In the main
aggregate analyses, I employ a composite score ranging from 0 (for countries that do not
14The range of numbers included in each citation category varies between destination, transit and origin countries.
The Global Patterns methodology employs a normal curve to determine the threshold for the ordinal scores 1 (very
low), 2 (low), 3 (medium), 4 (high), and 5 (very high).
27
appear in Global Patterns as origin or transit) to 10 to tap into the degree to which the state
figures in relevant sources as origin or transit country. The use of this composite score rests on
the notion that destination states’ border policies reflect concerns over whether the source
country of migration is either an origin or transit country for trafficking. 15 Utilizing the
Citation Index in the main analysis makes conceptual sense insofar as the number of citations
by independent institutions and media showcases how endemic the problem of human
Department of State Tier Score: As a secondary and complementary measure, I utilize the
U.S. Department of State’s Tier Scores for compliance with the TVPA, The Victims of Violence
and Trafficking Protection Act, adopted by the US in 2000. An oft-cited criticism of this
measure is that tier scores are biased to reflect the interests of the United States and serve as a
tool by the US to influence other states’ policies through “naming and shaming” (Simmons
and Lloyd 2010). Moreover, the scores lack transparency and it is unclear how the three
categories are determined. Although these criticisms put into question the reliability of the
scores as a measure of human trafficking in origin states, because my goal is not a cross-
country comparison of anti-trafficking efforts by origin states but rather the assessment of
policy responses by destination states, the tier rankings provide a viable alternative measure.
Cho, Dreher, and Neumayer Anti-Trafficking Policy Index: It is further plausible that
destination states take into account not only the threat of trafficking from transit and origin
countries but also the efforts these states make to ameliorate the problem. A recent working
15In other models I do not present, I employ a separate 0-5 score to just capture the status of the origin state as a
source of trafficking. The results obtained with this operationalization parallel those presented in the paper.
28
database of anti-trafficking measures by Cho et al. provides an improvement on the State tier
rankings by differentiating between three types of policy instruments states utilize to limit
et al. 2011). While the new index is an over-time measure, the version currently publicly
available is cross-sectional and reflects values for 2009. 16 The index encompasses 177 countries
and is a composite score for the three dimensions of policy, each of which takes on values 1-5,
where higher scores denote stronger efforts to counteract trafficking. A state that scores 15 on
the composite scale for example is making stellar efforts across all three dimensions. Although
the fact that the border policy measures are based on 2005 might be problematic, the Cho et al.
policy index serves as a third check of my hypotheses. We would expect border policies to be
more permissive toward origin states that have a better record of anti-trafficking policies
Destination Liberal Regime: Previous research has argued that political climates defined
by freedoms act as a pull factor for migrants in destination countries (Hollifield 1992).
Furthermore, liberal regimes tend to favor fewer restrictions on migration because open
borders are consonant with liberal norms and beliefs (Lahav 2004; Messina and Lahav 2006;
Neumayer 2006). The variable comes from the Freedom House index assigning an ordinal
score (2 to 14) according to experts’ judgments restrictions on political and social freedoms in
the destination country (House 2004). Alternate models employ a dummy indicator from the
same source for whether the destination state’s regime may be characterized as liberal.
16The index is available at http://www.human-trafficking-research.org/. The empirical range is from 2-15 because the
countries with worst rankings receive a score of 1 in at least two dimensions of policy.
29
Destination Tourism Revenues: Arguably, states that are major tourist destinations have
an incentive to shy away from visa restrictions; in these states, the domestic tourism industry
would be expected to lobby for fewer restrictions (Neumayer 2006). I control for this effect by
including a variable for the recipient’s international tourism receipts. This measure is
obtained from the World Bank and denotes expenditures by international inbound visitors as
Origin GDP per capita: GDP per capita is included to control for economic conditions in
the origin that push individuals toward migration. Additionally, Neumayer (2006) illustrates
restrictions on travel from the developed world. This variable is expressed in thousands of US
Dollars per capita (logged) in purchasing power parity (PPP); data for this measure is drawn
Origin Domestic Instability: Migration scholarship has established negative social and
political conditions in sending states such as domestic violence and regime instability as push
factors for outward flows of migrants (Neumayer 2005). In order to measure domestic
violence, I utilize an ordinal measure of origin’s civil strife and unrest derived from the
Origin Regime Type: On the one hand, autocratic regimes are more likely to restrict exit
of their own citizens (Caporaso 2000). On the other hand, however, autocratic regimes are
more likely to create the conditions –such as repression of social and political freedoms--that
prompt migration out of source countries. It is also plausible to suggest that democracies are
30
less wary of migration from their democratic counterparts. To control for these factors, I
included the revised polity score from the Polity IV project (Marshall and Jaggers 2000). This
score takes on values from -10 denoting complete autocracies to 10 for full democracies.
Terrorism in Origin: More recent literature has underscored the importance of border
controls not just as instruments to combat illegal migration but to maximize states’ security
vis-à-vis threats from transnational terrorism (Adamson and Grossman 2004; Koslowski 2005).
As such, countries whose citizens have been involved in past incidents of transnational
terrorism are more likely to face tighter controls. To account for this possibility, I include a
variable that counts the number of global attacks perpetrated by origin country citizens
globally in the last decade. The measure was created from the ITERATE database for incidents
Dyadic Trade: We might expect states’ border policies to embody concerns over the
deleterious effects of tight migration and border controls on economic flows (Neumayer 2006,
2009). To the extent that destination states anticipate that stringent policies would hamper
trade flows, they are likely to pursue more liberal policies vis-à-vis trade partners. To control
for this possibility, I include a measure for trade in the dyad. This variable measures the value
of bilateral trade –imports and exports-- for the recipient country, divided by the total trade
value of the recipient country; this measure might also be seen as tapping the salience of
dyadic trade for the recipient and comes from Rose’s measure of bilateral trade (Rose 2005).
The measure is averaged over the values from 1990 to 1996 to capture established trade ties in
the dyad.
31
Dyadic Proximity: Analogous to the role that distance plays as a facilitator or obstacle to
economic flows in the gravity model of trade, proximity between the origin and destination
state may influence migration flows (Leblang et al. 2009). With that in mind, alternate models
employ different indicators: the logged distance between capitals measure for the dyad, a
dummy for whether the origin and destination are in the same region, and a 5-point measure
of contiguity, denoting increasing distance, from the Direct Contiguity database. The
indicators for distance between capitals and the regional tie dummy come from Gledistsch’s
Armed Conflict Database and from the World Bank’s categories for regions, respectively
Dyadic Cultural Tie: Finally, it is plausible to suggest that states enact more permissive
border and migration control policies with respect to the nationals of countries with which
they enjoy cultural or historical ties (Neumayer 2006). To account for this possibility, I employ
two dichotomous variables: a dummy for the existence of past colonial ties in the dyad, and a
dummy for shared civilization. The dummy for colonial links is coded 1 if the countries in the
dyad were colonized by the same country in the past (Alesina and Dollar 2000; Neumayer
2006). The latter indicator uses Henderson and Tucker’s revised categories for Huntington’s
classification of civilizations and is coded 1 if the origin and destination state belong to the
The human trafficking equation models the prevalence of human trafficking in origin
as a function of the destination’s border policies against the origin’s citizens and a number of
32
origin country macroeconomic, social, and political characteristics as control variables. In the
equation below the subscripts A and B refer to destination (host) and origin (source) states
respectively.
ℎ𝑢𝑚𝑎𝑛 𝑡𝑟𝑎𝑓𝑓𝑖𝑐𝑘𝑖𝑛𝑔 𝐵
Gross National Income Per Capita (GNIpc): GNI per capita of the origin state is included
to account for economic contextual factors that influence the dominance of organized crime in
the origin. Scholars contend that economic poverty at the individual level might not only act
as a push factor for migration out of origin states but also drive the poor to rely on crime
networks (Buscaglia and Dijk 2003). Data for this measure is drawn from World Development
Indicators (WDI) of the World Bank and is expressed in thousands of dollars of purchasing
factor for out-migration as well as inducing demand for crime networks to gain access to the
economically developed world (Buscaglia and Dijk 2003; Friebel and Guriev 2006). Data for
this variable also comes from the WDI database and reflects total unemployment as
33
Gross Domestic Product (GDP) logged: Organized crime takes advantage of poor
inequality, creates and sustains a potential supply of illegal labor for criminal networks to take
advantage of (Bales 2005). To account for this effect, the logged GDP figures from the WDI
database are included; the mean for the last decade is employed.
GINI Coefficient for Origin: Plausibly, economic inequality is among the list of
organized crime networks (Buscaglia and Dijk 2003; Feingold 2005). To capture this effect,
models include the GINI coefficient for inequality, where 0 denotes full equality and 1 full
inequality. Data for this measure was obtained from the World Income Inequality Database
Regime Type for Origin: The Polity IV score is employed to account for the notion that
regime type might directly influence the predominance of human trafficking in origin
countries. The lack of direct representation in autocratic systems may foster corruption, which
in turn breeds criminal activity (Buscaglia and Dijk 2003). To the extent that organized crime
impinges on nepotism and patronage, it should be inversely related to the democracy score.
Origin’s Freedom Score: A similar reasoning for the inclusion of regime type exists to the
extent that repression of political freedoms entails spread of corruption and thereby
encourages illicit activity outside of the realm of legitimate economic activity. Curtailment of
social and political freedoms might also draw individuals to criminal networks as potential
34
recruits, strengthening the hand of organized crime in these states (Shelley 1999). The freedom
score comes from the Freedom House index (Freedom House 2004).
criminal networks (Buscaglia and Dijk 2003). Moreover, corruption hinders enforcement of
Organized Crime in Origin: While the focus of this paper is on human trafficking as a
form of organized crime, scholars have articulated that trafficking tends to gain a foothold in
societies characterized by the pervasiveness of organized crime in general. To control for this
effect, I use an indicator from the World Economic Forum that ranges from 1 to 7 (WEF 2010).
The original measure is based on executive surveys’ assessment of costs imposed by organized
crime on business and ranges from worst to best. The indicator in the models is reversed, for
ease of interpretation, to range from -7 for best (least cost to business) to -1 for worst (most
cost to business).
with the functioning of transborder criminal networks (Apap et al. 2002). Furthermore,
pervasive violent crime might be an indicator of a faulty judicial system or more broadly,
weak state capacity (Buscaglia and Dijk 2003). This measure uses data from the Global Peace
Index (GPI) and varies from 1 to 5, representing a higher predominance of criminal activity in
35
Women’s Rights in Origin: Bartilow (2010) argues that women’s socioeconomic rights are
instrumental to easing the problem of human trafficking. Societies defined by gender equality
are less conducive to the growth of trafficking networks. To control for this effect, I include
measure for women’s economic and social rights from the Cingranelli-Richards Index; the
variable runs from 0 to 4 to indicate more widespread rights for women in origin states
(Cingranelli and Richards 2008). The measure I use is the minimum score for the last decade to
capture the weakest-link logic that preponderance of human trafficking in societies is likely to
Origin Treaty Signature: Lastly, I include an indicator for whether the origin state is a
signatory to the United Nations Convention against Transnational Organized Crime (TOC) or
its major two protocols: The Protocol to Prevent, Suppress and Punish Trafficking in Persons,
Especially Women and Children and The Protocol against the Smuggling of Migrants by
Land, Sea and Air. Scholars have proposed treaty membership as an important instrument
through which human trafficking may be mitigated. 17 Signature of the TOC also shows that a
state takes the issue seriously and is engaged in international efforts to curb the problem
(Avdeyeva forthcoming; Cho et al. 2011; Simmons and Lloyd 2010). Logically, we might
expect human trafficking to be less widespread in signatory origin states. The variable takes
on the value of 1 if the origin has signed the TOC or its Protocols: because the two protocols
supplement the TOC, a state is more likely to have signed the TOC before becoming a
17I acknowledge that treaty ratification rather than signature is a stronger indication that the state is engaged in
international efforts to combat trafficking in carrying a higher level of legal obligation. However, given that the focus
of this paper is not on treaty compliance, I rely on becoming a signatory to the TOC as a more inclusive measure of
efforts against trafficking on the part of the origin country.
36
signatory to the protocols (UNODC 2004). The list of signatory states comes from the Global
Methodology
countries and border policies enacted by destination states. This calls for a model that directly
models the simultaneous determination of border policies and trafficking. Given endogeneity,
a single equation model such as ordinary least squares (OLS) would result in bias even in the
absence of omitted variables (Baum et al. 2003). I model the relationship using an
instrumental variables approach designed for two equation systems in which one dependent
variable in the system is dichotomous and the other is continuous (Hegre et al. 2010; Keshk et
al. 2004; Maddala 1983). In the models presented here, border policy variables are
hold: at least one variable must be found for each equation that affects the dependent variable
that is excluded from the other equation (Baum et al. 2003; Maddala 1998). Moreover, the
instruments should affect the other dependent variable only through their impact on the
dependent variable of the equation in which they are included. For the border policy
equation, all the variables except for the origin’s Polity IV score and GNI per capita of the
origin state serve as instruments as they are excluded from the human trafficking equation.
For the trafficking equation, a useful approach is to include as instruments variables that
18I consider ordinal variables with more than 5 categories to be continuous. The only indicator that fails to satisfy this
rule is the origin country’s tier rankings by the State department.
37
pertain to social, political, and economic conditions in the origin that affect trafficking
prevalence but do not directly influence border policies. Given that all the right hand side
variables in the trafficking equation other than the regime type and GNI per capita are
excluded from the border policy equation, the identification condition for instrumental
Results
Table 1 displays the results for the simultaneous equation model for border policy and
human trafficking.
The first and second columns show the probit results for visa restrictions as the
dependent variable; corrected IV standard errors are given in parentheses in the next column.
The third and fourth columns portray the OLS results with human trafficking as the
instrument for trafficking in the first column is significant and positive. This finding
demonstrates that destination states react to the threat of trafficking in origin states by
imposing restrictions on access to their territories. The other explanatory variables included in
19Although the application of the Maddala procedure in Stata—cdsimeq-- does not permit a test of the
appropriateness of simultaneous equations, I estimated the same model through ivreg. The endogeneity test,
equivalent to a Hausman test of instrumental variables estimation against OLS, was significant at the 0.000 level,
showing that simultaneous equation modeling is warranted. More specifically, the significant statistic shows that
OLS would be inconsistent. Similarly, the tests for overidentifying restrictions –such as the Sargan and J tests--are
not available with the Maddala procedure. I estimated the equations separately, through ivreg2 and ivprobit, to
confirm the suitability of instruments; in other words that instruments are not correlated with the error term in each
equation.
38
the border equation behave as expected and are significant at the 0.000 level, with the
exception of terrorism by citizens of the origin and shared colonial history. In accordance with
literature, states are more likely to impose visas on citizens from poor and unstable countries,
as illustrated by the negative sign on origin’s GNI per capita and the positive sign on domestic
instability. They are less likely to restrict access from countries with democratic governments,
as indicated by the negative sign on the Polity score for the origin state. Destination state
characteristics also have the proposed effects: liberal states and states that enjoy higher levels
of tourism revenue are less likely to impose restrictions. Dyadic controls also behave in line
with intuition: proximity and trade ties make for more liberal border policies.
Turning now to human trafficking equation, we note that the coefficient on the
instrument for visa restrictions is positive. This corroborates the notion of a virtuous cycle:
human trafficking is endogenous to border controls but visa restrictions dampen the
prevalence of trafficking in origin states. The coefficients for controls for women’s economic
rights, organized crime and corruption in the origin, and international cooperation emerge as
expected. Although marginally significant, accession to the TOC and Protocols is negatively
associated with the threat of trafficking. Higher scores for women’s rights, as the literature
suggests, decrease the prevalence of trafficking. Higher costs of organized crime on business
and the corruption perception index also behave as expected and are positively correlated
It is worth saying a few remarks on some of the controls in the human trafficking
equation that seem to go against intuition. Democracy emerges as positive and significant. It
39
is plausible to argue that this finding is attributable to the way that human trafficking is
measured in this model: the score hinges on visibility of trafficking in media, and domestic
and international resources. Thus, it is possible to suggest that due to higher levels of
transparency, trafficking has a higher chance of being reported in democratic origin states.
Controls for the macroeconomic context, GNI per capita and the GINI coefficient are also
contrary to expectations: although the former has a substantially small positive impact, the
positive coefficient seems to suggest that greater per capita income enhances trafficking
potential. The negative sign on the GINI indicates that greater inequality dampens rather than
increases trafficking. We might imagine that these effects point to an opportunity logic
whereby a minimal level of per capita income is necessary for both demand and supply for
trafficking to exist. A final surprising result concerns the negative coefficient on violence in the
that violence in the origin restricts the opportunity for organized crime to gain a foothold. To
the degree that human trafficking mimics legitimate business operations, violence and
Next, I present the same model using U.S. Department of State tier rankings to model
human trafficking. The first two columns give the border policy equation and the final two
40
The results from Table 2 parallel those obtained using the Global Patterns indicator for
human trafficking in the origin country. As can be seen in the first column, the coefficient for
the tier score for the origin is positive and highly significant, indicating that consistent with
migration by the destination state. Caution is warranted in interpreting this result, however,
given the criticisms that the tier rankings are biased by US policy interests. Thus, it is possible
that the visa restrictions in place are partially employed as a tool to induce policy change in
origins deemed to have poor compliance with TVPA. 20 Nevertheless, this dynamic might not
necessarily underpin the restrictions placed by all recipients, even if present in the motives of
The controls in the border equation behave in accordance with expectations from the
literature on migration and parallel the findings shown in Table 1. Except for GNI per capita
and colonial link all right hand side variables in the border equation are statistically
significant. Thus, recipient states that rely more heavily on tourism revenues and enjoy a
liberal regime are less likely to impose visa controls. Instability in the origin, an autocratic
regime, and involvement in global terrorism increase the probability of facing visa restrictions,
as illustrated by the positive coefficient on global terrorism, domestic instability, and the
Turning our attention to the human trafficking equation, we observe that consistent
with Hypothesis 2, the imposition of visa controls has a negative impact on the prevalence of
20 See Meyers (2004) for a discussion of how migration policy may be used as a foreign policy tool through issue-
linkages.
41
human trafficking in the origin state. Reevaluating the finding in terms of what the indicator
for trafficking is measuring, it is possible to suggest that tighter controls on migration result in
Shifting attention to the controls, we see that international cooperation to combat human
trafficking and women’s economic rights decrease the predominance of trafficking in the
origin, as demonstrated by the negative sign on treaty signature and women’s economic
rights. In contrast to the findings in Table 1, this time, GDP per capita and inequality are in
line with expectations: higher personal income and a more equal distribution of societal
wealth decrease the prevalence of human trafficking. The effects of socioeconomic conditions,
however, paint a more puzzling picture. Organized crime and corruption in the origin are
both negatively associated with human trafficking. Recalling that both indicators are
measured as costs to economic transactions, it is possible to surmise that to the degree that
human trafficking operates in ways similar to legitimate business, crime and corruption may
The results with the Global Patterns Citation Index and the State Tier Scores paint a
picture of a virtuous circle: the presence of visa restrictions weakens the hold that trafficking
has in countries of origin. Unpacking this finding further, we might imagine that the negative
impact of visa controls on human trafficking dominance may be driven by two mechanisms.
First, the existence of visa controls circumscribes the opportunities available for trafficking
networks to operate by raising the costs of transporting migrants into destination states.
However, although visas raise the transaction costs of operation for trafficking networks,
42
traffickers may find alternate ways of entry into destination states’ territories. To the extent
that such alternate routes are at the disposal of traffickers, we should expect an insignificant or
weak effect from the imposition of visas. A second mechanism, however, may be at play. The
imposition of visas induces destination states to undertake domestic policy changes designed
to counter human trafficking. In order to assess this second mechanism, I use the Cho et al. 3-
Point Policy Index to model the interrelationship between border policy and trafficking (Cho
et al. 2011). Table 3 presents the results with the 3-P Policy Index.
To reiterate, the 3-P Policy Index runs from 1 to 15 and assigns a higher score across all
this in mind, Hypothesis 1 would predict that a better record of anti-trafficking in the origin
decreases the propensity of recipient states to impose border controls. This expectation is
borne out by the significant and negative coefficient on the instrumented policy index in the
border policy equation. This finding emphasizes that destination states’ policies not only
embody concerns over the predominance of trafficking in the origin but also factor in the
policy measures enacted by origin country governments to monitor trafficking. The behavior
of the right hand side variables in the border policy equation are in accordance with the
findings depicted in Tables 1 and 2. Recipient’s liberal regime status, tourism revenues,
regional and cultural ties detract from the probability that visa restrictions will be in place.
Conversely, poverty, instability in the origin, and autocracy increase the probability of
encountering visas.
43
Taking a look at the trafficking equation, we observe that importantly, visa restrictions
lead to an improvement on the 3-P policy index: the coefficient on the instrument for visa
controls is significant and positive. This finding reaffirms the contention that border controls
compel origin countries plagued by trafficking to craft policies to minimize the problem. The
trafficking equation also controls for the strength of trafficking—by including the Global
Patterns Citation score as a right hand side variable— in the origin in order to account for the
possibility that policy improvements are driven by concerns over the strength of trafficking
and not necessarily by external factors. The negative sign on trafficking prevalence indicates
that the dominance of human trafficking in the origin is negatively associated with a good
rating on the 3-P Index. Most of the control variables in the human trafficking equation are
significant and in the expected direction. Democracy and liberalism are positively associated
with a good record on the anti-trafficking index, as is being a signatory to the TOC. Similarly,
better economic health—in terms of higher GNI per capita and logged GDP for the origin—is
associated with a higher score on the anti-trafficking index while conversely poor economic
index. The corruption perception index emerges as positive, a finding that is potentially
driven by a dynamic similar to the effect of trafficking prevalence: states facing higher
corruption and trafficking are more likely to make efforts to counter trafficking.
gives the marginal effects for the estimated equations, with all explanatory variables set to
their respective means. The models are presented in the order in which they were discussed in
44
the empirical section, as illustrated by the first column in the table. Table 4 displays the
marginal effect of trafficking in origin country on visa policies and visa policy on trafficking
prevalence, for each model estimated. The final two columns give the lower and upper bounds
Table 4 informs us of a similar pattern across all models: consistent with the
simultaneous equations presented, the instantaneous change of border policy when trafficking
increases is positive, demonstrating once again that the probability of visa restrictions
increases with trafficking prevalence in the origin. The marginal effect of visa restrictions on
cycle proposition. Second, the marginal impact of trafficking on visa policies is weakest for
the Global Patterns Citations Index and strongest for the 3-P policy score. In the latter case,
the negative coefficient indicates that a better record of anti-trafficking in the origin produces a
negative instantaneous change in the propensity to impose visa restrictions on the part of the
destination country. Third, when the marginal effects for visa restrictions on trafficking in the
origin are taken into account, the weakest effect is observed for the 3-P policy index. Finally,
Conclusion
relationship between border policies and human trafficking. I argued that border policies of
destination states and human trafficking prevalence in origin states are characterized by a
45
reciprocal relationship. The models presented in this paper found evidence in favor of the
virtuous cycle thesis. I contended that the beneficial effect of visa restrictions whereby border
controls reduce human trafficking in origin states may occur through two mechanisms. First,
visa controls constrain the choices available to human traffickers by raising the costs of
territorial access to destination states. Second, visa controls prompt policy improvements in
more generally to studies of organized crime in world politics. It is, to my knowledge, one of
the first attempts to systematically analyze states’ responses to human trafficking. The paper
also engages the debate in security studies on the effectiveness of border and migration
control measures on combating organized crime. On one side of the debate, pundits argue
that states’ hands are tied in coping with organized crime networks because tighter controls
embolden traffickers and smugglers by increasing demand for clandestine entry into states’
territories. On the other end, scholars suggest that more stringent controls can act as a
deterrent for traffickers by increasing the costs of operation and the likelihood that traffickers
While the results presented in this paper rule in favor of the optimistic thesis, a few
remarks are in order before drawing such a conclusion. For one, two of the main indicators
for human trafficking –the Global Patterns Citation Score and the US Department of State Tier
Ranking—hinge on visibility of organized crime. In the former, the citation is based on the
visibility of trafficking in domestic and international resources as well as media. In the latter
46
case, the ranking is based on a third-party (subjective) assessment of compliance with TVPA.
First, to the degree that both scores would be affected by how visible human trafficking is in
the origin, we might conjecture that tight border controls serve to drive trafficking further
underground, rather than directly undercutting the process. Second, the paper focuses on visa
policies as an instrument of border and migration control. Although visas are undeniably an
trafficking relies on entry with forged documentation, human traffickers rely on alternate
methods to gain cross borders. In other words, visas may raise the costs of travel for
traffickers but push them toward more clandestine means of entry. Furthermore, the cross-
sectional nature of the analysis undertaken in this paper prohibits a test of the extent to which
the virtuous-cycle effect is time sensitive. It is conceivable to imagine, for instance, that the
long-term effects of stringent effects are defined by a vicious cycle. Finally, while the results
show that visa controls diminish the prevalence of human trafficking, they are agnostic to how
Shedding light on this debate is important from a broader theoretical perspective in the
sense that the efficacy of states’ policy responses vis-à-vis non-state actors demonstrates that
sovereignty is not as much at peril as globalization scholars would have us believe. Instead,
states are able to modify the security environment they face through careful policy responses.
47
TABLES
Coefficient SE Coefficient SE
Visa Restriction (instrument) -0.07* (0.03071)
Human trafficking (instrument) 0.07*** (0.01027)
Origin unemployment 0.00 (0.00351)
Origin Gini -0.13*** (0.00250)
Origin GDP (logged) 0.05*** (0.01318)
Origin freedom 0.15*** (0.01735)
Origin women's econ rights -1.06*** (0.05122)
Origin domestic violence -0.22*** (0.02775)
Origin organized crime 0.76*** (0.02886)
Origin corruption 0.07*** (0.01879)
TOC dummy -0.09+ (0.04523)
Origin GNI per capita 0.00*** (0.00000) 0.00*** (0.00000)
Origin Polity score -0.05*** (0.00404) 0.14*** (0.01039)
Two tailed tests: + p <= 0.10, * p <=0.05, ** p <0.01, *** p < 0.001
Corrected standard errors from Maddala (1983) in parentheses.
48
Table 2: Simultaneous Estimation of Border Policy and Human Trafficking: State
Tier Rankings
Border Policy Equation Trafficking Equation
Coefficient Std. Err. Coefficient Std. Err.
Two tailed tests: + p <= 0.10, * p <=0.05, ** p <0.01, *** p < 0.001
Corrected standard errors from Maddala (1983) in parentheses.
49
Table 3: Simultaneous Model of Border Policy and Human Trafficking from the
Policy Perspective (3-P Policy Index)
50
Table 4: Marginal Effects for Models I –III
51
References:
Adamson, Fiona B, and Andrew D. Grossman. 2004. "Framing "Security" in a Post 9/11 Context."
Social Science Research Council.
Adamson, Fiona B. 2006. Crossing Borders: International Migration and National Security.
International Security 31 (1): 165-199.
Agnew, J. 1994. The territorial trap: the geographical assumptions of international relations
theory. Review of International Political Economy.
Alesina, A., and D. Dollar. 2000. Who Gives Foreign Aid to Whom and Why? JOurnal of
Economic Growth 5: 33-63.
Andreas, Peter. 2000. Border Games. Cornell: Cornell University Press.
Andreas, Peter. 2000. "Introduction: The Wall after the Wall." In The Wall Around the West, ed.
Peter Andreas and Timothy Snyder. Oxford: Rowman and Littlefield Publishers Inc. 1-
15.
Andreas, Peter and Richard, Price. 2001. From War Fighting to Crime Fighting: Transforming
the American National Security State. International Studies Review 3 (3): 31-52.
Apap, Joanna, Peter Cullen, and Felicita Medved. 2002. "Counteracting Human Trafficking:
Protecting the Victims of Trafficking." Presented at the European Conference on
Preventing and Combating Trafficking in Human Beings, Brussels.
Archibold, Randald C. 2011. "Despite Violence, U.S. Firms Expand In Mexico." In The New York
Times. New York.
Avdeyeva, Olga. forthcoming. Enforcement of Anti-Trafficking Norms. International Journal of
Human Rights.
Bales, Kevin. 2000. Disposable People: Slavery in the Age of Globalization. Journal of
International Affairs 53: 461-484.
Bales, Kevin. 2005. Understanding Global Slavery. Berkeley: University of California Press.
Bartilow, Horace. 2010. "Gender Representation and International Compliance Against Human
Trafficking." In.
Baum, Christopher, Mark E. Schaffer, and Steven Stillman. 2003. "Instrumental variables and
GMM: Estimation and Testing." In. Boston.
Berdal, Mats, R., and Monica Serrano. 2002. "Transnational Organized Crime and International
Security: The New Topography." In Transnational organized crime and international security
: business as usual?, eds. Mats R. Berdal and Monica Serrano. Boulder: Lynne Rienner
Publishers.
Bibes, Patricia. 2001. Transnational Organized Crime and Terrorism: Colobia, a Case Study.
Journal of Contemporary Criminal Justice 17 (3): 243-258.
Boehmer, Charles R., and Sergio Peña. 2008. "The Determinants of Open and Closed Borders."
Presented at the International Studies Association (ISA), San Francisco.
Brambor, Thomas; William Roberts Clark; and Matt Golder. 2006. Understanding Interaction
Models: Improving Econometric Analyses. Political Analysis 14: 63-82.
Buscaglia, Edgargo, and Jan van Dijk. 2003. Controlling Organized Crime and Corruption in the
Public Sector. Forum on Crime and Society 1 and 2 (December): 1-32.
52
Buzan, Barry, Waever Ole, and de Jaap Wilde. 1998. Security: A New Framework for Analysis.
Colorado: Rienner Publishers Inc.
Caporaso, James A. 2000. Changes in the Westphalian Order: Territory, Public Authority, and
Sovereignty. International Studies Review: 1-28.
Cho, Seo-Young, Axel Dreher, and Eric Neumayer. 2011. "The Spread of Anti-Trafficking
Policies: Evidence from a New Index." In CESIFO Working Papers.
Cingranelli, David, and David Richards. 2008. The Cingranelli-Richards (CIRI) Human Rights Data
Project Coding Manual.
Clark, Anne. 2003. Trafficking in Humans: An Issue of Human Security. Journal of Human
Development 4 (2): 247-63.
Donaldson, John W. 2005. "Fencing the Line: Analysis of the recent rise in security measures
along disputed and undisputed boundaries." In Global Surveillance and Policing: Borders,
Security, Identity, ed. Elia Zureik and Mark B. Salter. Portland, Oregon: William
Publishing.
Faist, Thomas. 2005. "The Migration Security Nexus: International MIgration and Security
before and after 9/11." In Comcad Working Papers. 1-19.
Feingold, David A. 2005. Human Trafficking. Foreign Policy 150: 26-32.
Freeman, Gary P. 1995. Modes of Immigration Politics in Liberal Democratic States. International
Migration Review 29 (4).
Friebel, Guido, and Sergei Guriev. 2006. Smuggling Humans: A Theory of Debt-Financed
Migration. Journal of the European Economic Association 4 (6): 1085-1111.
Friedman, Thomas L. 1999. The Lexus and the Olive Tree. New York: Anchor Books.
Gallagher, Anne. 2001. Human Rights and the New UN Protocols on Trafficking and Migrant
Smuggling: A Preliminary Analysis. Human Rights Quarterly 23: 975-1004.
Gallagher, Anne. 2009. Human Rights and Human Trafficking: Quagmire or Firm Ground? A
Response to James Hathaway. Virginia Journal of International Law 49 (4): 789-848.
Goldstein, Judith, and Robert O. Keohane. 1993. Ideas and Foreign Polciy: Beliefs, Institutions, and
Political Change. Ithaca, NY: Cornell University Press.
GPI. 2005. "The Global Peace Index." In: Institute for Economics and Peace.
Graycar, Adam. 1999. "Trafficking in Human Beings." Presented at the International Conference
on Migration, Culture, and Crime, Israel.
Hathaway, James C. 2009. The Human Rights Quagmire of "Human Trafficking". Virginia
Journal of International Law 49 (1): 1-59.
Hegre, Havard, John R. Oneal, and Bruce Russett. 2010. Trade Does Promote Peace: New
Simultaneous Estimates of the Reciprocal Effects of Trade and Conflict. Journal of Peace
Research 47 (6): 763-774.
Held, David; Anthony McGrew; David Goldblatt; Jonathan Perraton. 1999. Global
Transformations: Politics, Economics and Culture. Stanford, CA: Stanford University Press.
Henderson, E.A., and R. Tucker. 2001. Clear and Present Strangers: The Clash of Civilizations
and International Conflict. International Studies Quarterly 45: 317-38.
Herz, John H. 1968. The Territorial State Revisited: Reflections on the Future of the Nation-State.
Polity 1 (1): 11-34.
53
Hollifield, JF. 1992. Immigrants, Markets, and States: The Political Economy of Postwar Europe.
Cambridge, MA: Harvard University Press.
Hollifield, JF. 2000. "The politics of international migration: How can we "bring the state back
in"?" In Migration Theory: Talking Across the Disciplines, ed. CB and Hollifield Brettel, JF.
New York: Routledge. 137-85.
House, Freedom. 2004. Annual Surveys of Freedom Country Ratings 1972 to 2003. New York:
Freedom House.
Huysmans, Jef. 2006. The Politics of Insecurity: Fear, Migration, and Asylum in the EU. New York:
Routledge.
IATA. 2004. "Travel Information Manual." In, ed. International Air Transport Association.
Badhoevedorp.
Interpol. 2011. "Trafficking in Human Beings. http://www.interpol.int/Public/THB/default.asp."
(July 13 2011.
Jervis, Robert. 1997. System Effects: Complexity in Political and Social Life. Princeton, NJ: Princeton
University Press.
Jonnson, Anna. 2009. Human Trafficking and Human Security. London: Routledge.
Kaldor, Mary. 1999. New and Old Wars: Organized Violence in a Global Era. Stanford, CA: Stanford
University Press.
Kara, Siddharth. 2009. Sex Trafficking: Inside the Business of Modern Slavery. New York: Columbia
University Press.
Keohane, Robert O. 2002. The Globalization of Informal Violence, Theories of World Politics,
and the "Liberalism of Fear". Dialogue IO (Spring): 29-43.
Keshk, Omar M.G., Brian M. Pollins, and Rafael Reuveny. 2004. Trade Still Follows the Flag:
The Primacy of Politics in a Simultaneous Model ofInterdependence and Armed
Conflict. Journal of Politics 66 (4): 1155-1179.
Koslowski, Rey. 2001. "Economic Globalization, Human Smuggling, and Global Governance." In
Global Human Smuggling. Baltimore, MA: The Johns Hopkins University Press. 337-359.
Koslowski, Rey. 2005. "Real Challenges for Virtual Borders: The Implementation of US-VISIT."
In. Washington D.C.: Migration Policy Institute.
Krasner, Stephen. 1999. Organized Hypocrisy. Princeton: Princeton University Press.
Lahav, Gallya. 2004. Immigration and Politics in New Europe: Reinventing Borders. Cambridge:
Cambridge University Press.
Lavenex, Sandra. 2001. Migration and the EU's new eastern border: between realism and
liberalism. Journal of European Public Policy 8 (1): 24-42.
Leblang, David A., Jennifer Fitzgerald, and Jessica Teets. 2009. "Defying the Law of Gravity: The
Political Economy of International Migration." In Working Paper Series. Boulder,
Colorado.
Lobasz, Jennifer. 2009. Beyond Border Security: Feminist Approaches to Human Trafficking.
Security Studies 18: 319-344.
Maddala, G.S. 1983. Limited Dependent and Qualitative Variables in Econometrics. Cambridge:
Cambridge University Press.
54
Maddala, G.S. 1998. Recent Developments in Dynamic Econometric Modeling: A Personal
Viewpoint. Political Analysis 7: 59-87.
Marshall, Monty G. , and Keith Jaggers. 2000. "Polity IV Project." In.
Messina, Anthony M, and Gallya Lahav, eds. 2006. The Migration Reader: Exploring Politics and
Policies. Boulder, Colorado: Lynne Rienner Publishers.
Meyers, Eytan. 2004. International Immigration Policy: A Theoretical and Comparative Analysis.
Basingstoke, UK.: Palgrave Macmillan.
Mickolus, E., Todd Sandler, J. Murdock, and P. Flemming. 2007. "International Terrorism:
Attributes of Terrorist Events (ITERATE)." In. Dunn Loring, VA: Vinyard Software.
Mittleman, J, and R. Johnston. 2000. "Global Organized Crime." In The Globalization Syndrome:
Transformation and Resistance. Princeton: Princeton University Press. 203-22.
Naim, Moises. 2005. Illicit: How Smugglers, Traffickers, and Copycats Are Hijacking the Global
Economy. New York: Doubleday.
Neumayer, Eric. 2005. Bogus Refugees? The Determinants of Asylum Migration to Western
Europe. International Studies Quarterly 49: 389-409.
Neumayer, Eric. 2006. Unequal Access to Foreign Spaces: how states use visa restrictions to
regulate mobility in a globalized world. Transactions of the Institute of British Geographers
31 (1): 72-84.
Neumayer, Eric. 2009. "On The Detrimental Impact of Visa Restrictions on Bilateral Trade and
Foreign Direct Investment." In. London.
Raine, Linnea P., and Frank J. Cilluffo. 1994. Global Organized Crime: The New Evil Empire.
Washington D.C.: Center for Strategic and International Studies.
Rose, Andrew. 2005. "Bilateral Trade Data." In: University of California, Berkeley.
Rudolph, Christopher. 2006. National Security and Immigration: Policy Development in the United
States and Western Europe Since 1945. Stanford, CA: Stanford University Press.
Salehyan, Idean. 2006. "Rebels Without Borders: State Boundaries, Transnational Opposition,
and Civil Conflict." Doctor of Philosophy PhD Thesis University of California San Diego.
Salt, John. 2000. Trafficking and Human Smuggling: A European Perspective. International
Migration 1 (special issue): 31-56.
Salt, John, and Jeremy Stein. 1997. Migration as a Business: The Case of Trafficking. International
Migration 35 (4): 467-494.
Sanderson, Thomas M. 2004. Transnational Terror and Organized Crime: Blurring the Lines.
SAIS Review 24 (1): 49-61.
Sharma, Nandita. 2005. Anti-Trafficking Rhetoric and the Making of a Global Apartheid. NWSA
Journal 17 (3).
Shelley, Louise. 1999. "Transnational Crime: The New Authoritarianism." In The Illicit Global
Economy and State Power, eds. Richard H. Freeman and Peter Andreas. New York:
Rowman and Littlefield.
Signorino, Curtis. 1999. Strategic Interaction and the Statistical Analysis of International
Conflict. American Political Science Review 93 (279-297).
Simmons, Beth, and Zachary Elkins. 2004. The Globalization of Liberalization: Policy Diffusion
in the International Political Economy. American Political Science Review 98 (1): 171-189.
55
Simmons, Beth, and Paulette Lloyd. 2010. "Subjective Frames and Rational Choice:
Transnational Crime and the Case of Human Trafficking." Harvard University.
State, United States Department of. 2010. Annual Reports on Trafficked Persons. Washington D.C.:
U.S. Department of State.
Strand, H., L. Williamsan, and N.P. Gleditsch. 2004. Armed Conflict Dataset Codebook. Oslo:
International Peace Research Institute.
Thielemann, Eiko R. 2006. "The Effectiveness of Governments' Attempts to Control Unwanted
Migration." In Immigration and the Transformation of Europe, ed. Parsons C. and Smeeding
T. Cambridge: Cambridge University Press.
UNODC. 2004. United Nations Convention against Transnational Organized Crime and its Protocols
Thereto. New York: United Nations Office on Drugs and Crime.
UNODC, (United Nations Office on Drugs and Crime). 2009. "Global Report on Trafficking in
Persons Report and Appendices."
WDI. 2008. "World Development Indicators." In: World Bank.
WEF. 2010. The Global Competitiveness Report. World Economic Forum.
Williams, Phil. 2001. "Organizing Transnational Crime: Networks, Markets, and Hierarchies." In
Combating Transnational Crime: Concepts, Activities, and Responses. Portland, Oregon:
Frank Cass Publishers. 57-88.
Williams, Phil. 2001. "Transnational Criminal Networks." In Networks and netwars: the future of
terror, crime, and militancy, eds. John Arquilla and David F. Ronfeldt. D.C.: Rand
Corporation.
56