Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Research to Map Organized Crime, Terrorism Hotspots in Eurasia

June 8, 2015

Research at the University of Kansas aims to pinpoint hotspots in Eurasia where drug trafficking, human trafficking and terrorism coincide.

Selected to receive a $953,500 Minerva grant from the U.S. Department of Defense’s Minerva Research Initiative, Mariya Omelicheva, the study’s principal investigator, along with KU geography professor Stephen Egbert and Rowan University political science associate professor Lawrence Markowitz, will examine the connections between terrorism and organized crime in Central Asia, South Caucasus and Russia. The three-year project also will look at the conditions under which terrorist-trafficking alliances are forged and changed and the ability for governments and international organizations to monitor, prevent and dismantle the terrorist and criminal activity.

“Distinguishing this study is its systematic approach, which does not rely on anecdotal or piecemeal evidence,” said Omelicheva, who is director of the KU Center for Russian, East European and Eurasian Studies and associate professor of political science.

Using GIS tools, the project will map and model the nexus between trafficking and terrorism in nine Eurasian countries. Researchers will pull the geographical coordinates of major terrorist incidents from the Global Terrorism Database, geo-reference drug seizures reported by the United Nations’ Office on Drugs and Crime, and human trafficking data assembled from the International Organization for Migration survey. KU students will help with the mapping and analyzing of data.

A better understanding of the connection between trafficking and terrorism in Eurasia improves U.S. national security, Omelicheva said. Ultimately, the project hopes to identify trafficking and terrorism hotspots where the U.S. military can direct assets to disrupt the activity.

“Trafficking and terrorism adversely impact governance, security, stability and development in this region and beyond,” Omelicheva said. “They create conditions precipitous for the rise of crime, violence and extremism in states that are U.S. partners and allies.”

More than a quarter of all the drugs produced in opium-rich Afghanistan pass through Eurasia. Drug trafficking in the region has been linked to the strength of such terrorists groups as the Islamic Movement of Uzbekistan, Islamic Jihad Union and al-Qaida. The illicit sale of weapons is common in the area, and locals are drawn into human trafficking rings either for forced labor or sexual exploitation.

“Central Asia is a hotspot for human trafficking and drug trafficking. A lot of the trafficking that is happening is for Russian and European consumption, while the Central Asian states are where most of the traffickers and trafficking victims originate,” Omelicheva said.

Over the past few decades, the means by which terrorist organizations are funded has dramatically changed. The breakup of the Soviet Union eliminated the major state funders.

And after 9/11, the U.S. led efforts to clamp down on money laundering and other financial operations that supported terrorism. Those changes have left terrorist groups more dependent on organized crime. “They have been either engaged in criminal activities themselves or form alliances and partnerships with criminal organizations,” Omelicheva said.

The connection between terrorism and organized crime can be a complex one, Omelicheva said. For example, drug dealers and traffickers can be recruited while in prison to be terrorists, creating a hybrid identity. Deciphering if acts of violence are terrorism or organized crime can be difficult. In some tumultuous areas of Central Asia, bombings or assassinations have been attributed to terrorism when they were actually part of a drug turf war.

“If we misrepresent those type of violent activities as terrorism, we are giving the wrong idea of what is going on,” Omelicheva said. “The policy implication is that funds get misplaced and we are coming up with solutions that don’t match the nature of the problem."

See more at: http://news.ku.edu/2015/05/22/research-map-organized-crime-and-terrorism-hotspots-eurasia#sthash.moZ4d3Fk.dpuf

KEYWORDS: crime organized crime Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ATM Crime Grows, Thanks to Skimming and Organized Crime

    See More
  • The Los Angeles Airport police have a full-time emergency services unit armed with rifles and a tactical team that provides protection in those areas along with patrol officers

    Addressing Terrorism and Crime in Your City: Why the Public and Private Sectors Need to Work Together

    See More
  • Retailers Make a Dent in Organized Retail Crime

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing