Skip to main content Accessibility help
×
Home
Hostname: page-component-55597f9d44-rn2sj Total loading time: 0.472 Render date: 2022-08-17T10:15:49.542Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "useNewApi": true } hasContentIssue true

The Illicit Antiquities Trade as a Transnational Criminal Network: Characterizing and Anticipating Trafficking of Cultural Heritage

Published online by Cambridge University Press:  19 June 2013

Peter B. Campbell*
Affiliation:
Archaeology, University of Southampton, Avenue Campus, Highfield, Southampton SO17 1BJ, UK. Email: pbc1g11@soton.ac.uk

Abstract

The illicit antiquities trade is composed of a diverse population of participants that gives the appearance of complexity; however, using the network paradigm, a simple underlying structure is revealed based on specific geographical, economic, political, and cultural rules. This article uses a wide range of source material to chart interactions from source to market using a criminal network approach. Interchangeable participants are connected through single interactions to form loosely based networks. These flexible network structures explain the variability observed within the trade, as well as provide the basis behind ongoing debates about the roles of organized crime, terrorism, and the Internet in antiquities trafficking. Finally, a network understanding of trade's organization allows for anticipation, though not necessarily prediction, of antiquities trafficking and offers the opportunity to develop new strategies for combating the trade.

Type
Research Article
Copyright
Copyright © International Cultural Property Society 2013 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adler, Christine, and Polk, Kenneth. “The Illicit Traffic in Plundered Antiquities.” In Handbook of Transnational Crime and Justice, edited by Reichel, Philip, 98113. Thousand Oaks, CA: Sage, 2005.Google Scholar
Alderman, Derek, and Campbell, Rachel. “Symbolic Excavation and the Artifact Politics of Remembering Slavery in the American South: Observations from Walterboro, South Carolina.” Southeastern Geographer 48 (2008): 338–55.CrossRefGoogle Scholar
Alderman, Kimberly. “Honor Amongst Thieves: Crime and the Illicit Antiquities Trade.” Indiana Law Review 45 (2012): 602–27.Google Scholar
Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso, 2006.Google Scholar
Antoniadou, Ioanna. “Reflections on an Archaeological Ethnography of ‘Looting’ in Kozani, Greece.” Public Archaeology: Archaeological Ethnographies 8, no. 2-3: 246–61.CrossRefGoogle Scholar
Atwood, Roger. Stealing History: Tomb Raiders, Smugglers, and the Looting of the Ancient World. New York: St. Martin's, 2004.Google Scholar
Baker, Aryn, and Anjar, Majdal. “Syria's Looted Past: How Ancient Artifacts Are Being Traded for Guns.” TIME World. http://world.time.com/2012/09/12/syrias-looted-past-how-ancient-artifacts-are-being-traded-for-guns (2012; accessed 3 December 2012).Google Scholar
Bator, Paul. “An Essay on the International Trade in Art.” Stanford Law Review 34 (1982): 275384.CrossRefGoogle Scholar
Bell, Duncan S. A.Mythscapes: Memory, Mythology, and National Identity.” British Journal of Sociology 54 (2003): 6381.CrossRefGoogle ScholarPubMed
Bessieres, Michael, “‘We Have to Change the Buyer's Attitude’ Investigative Journalist Ozgen Acar Interview,” UNESCO Courier, April 2001.Google Scholar
Bowman, Blythe. “Transnational Crimes Against Culture: Looting at Archaeological Sites and the “Grey” Market in Antiquities.” Journal of Contemporary Criminal Justice 24 (2008): 225–42.CrossRefGoogle Scholar
Bowman Proulx, Blythe. “Organized Criminal Involvement in the Illicit Antiquities Trade.” Trends in Organized Crime 14 (2011): 129.CrossRefGoogle Scholar
Brems, Peter, and Van den Eynde, Wim. Blood Antiquities. Surrey, UK: Journeyman Pictures, 2009.Google Scholar
Brodie, Neil. “Pity the Poor Middlemen.” Culture Without Context 3 (1998): 79.Google Scholar
Brodie, Neil. “The Market in Iraqi Antiquities 1980–2008.” In Organised Crime in Art and Antiquities, edited by Manacorda, Stefano, 6374. ISPAC: Milan, 2009.Google Scholar
Brodie, Neil, Doole, Jenny, and Watson, Peter. Stealing History: The Illicit Trade in Cultural Material. Cambridge, UK: MacDonald Institute for Archaeology Research, 2000.Google Scholar
Brulle, Robert. Agency, Democracy, and Nature: The US Environmental Movement from a Critical Theory Perspective. Cambridge, MA: MIT Press, 2000.Google Scholar
Calvani, Sandro. “Frequency and Figures of Organized Crime in Art and Antiquities.” In Organised Crime in Art and Antiquities, edited by Manacorda, Stefano, 2940. ISPAC: Milan, 2009.Google Scholar
Central Intelligence Agency. “The World Factbook: Unemployment Rate.” Central Intelligence Agency. https://www.cia.gov/library/publications/the-world-factbook/rankorder/2129rank.html (January 2012; accessed 10 January 2012).Google Scholar
Charney, Noah. “Art Crime in Context.” In Art and Crime, Exploring the Dark Side of the Art World, edited by Charney, Noah, xvii–xxv. Santa Barbara: ABC-CLIO, 2009.Google Scholar
Chippendale, Christopher, and Gill, David W. J.. “Material Consequences of Contemporary Classical Collecting.” American Journal of Archaeology 104 (2000): 463511.CrossRefGoogle Scholar
Colla, Elliot. Conflicted Antiquities: Egyptology, Egyptmania, Egyptian Modernity. Durham, NC: Duke University Press, 2007.CrossRefGoogle Scholar
Collins, Catherine, and Ali, Ashraf. “Financing the Taliban: Tracing the Dollars Behind Insurgencies in Afghanistan and Pakistan.” Counterterrorism Strategy Initiative Policy Paper. Washington, DC: New America Foundation, 2010.Google Scholar
Coluccello, Salvatore, and Massey, Simon. “Out of Africa: The Human Trade Between Libya and Lampedusa.” Trends in Organized Crime 10 (2007):7790.CrossRefGoogle Scholar
Conklin, John. Art Crime. Westport, CT: Praeger, 1994.Google Scholar
Cook, Roger. More Dangerous Ground: The Inside Story of Britain's Best Known Investigative Journalist. Brighton, UK: Book Guild, 2007.Google Scholar
De La Torre, Laura. “Terrorists Raise Cash by Selling Antiquities.” GSN: Government Security News, February 2006.Google Scholar
Department of Defense. “Several Theories Justifying Our Need to Respect and Safeguard Cultural Property.” Department of Defense. http://www.cemml.colostate.edu/cultural/09476/chp03iraqenl.html (2011; accessed 27 March 2011).Google Scholar
Doole, Jenny. “In the News.” Culture Without Context. http://www.mcdonald.cam.ac.uk/projects/iarc/culturewithoutcontext/issue4/news.htm (1999; accessed 14 January 2011).Google Scholar
Dragieva, Lina. Political Corruption Practices in Bulgarian Post-Communist Executive Power: Case Study Analysis of Bulgaria. Budapest: Central European University, 2008.Google Scholar
Drake, Cathryn. “Italy Awaits Biggest Ever Trial of Tomb Robbers.” The Art Newspaper (2008) 187: 11.Google Scholar
eBay. “eBay My World: SilenosCoins.” http://myworld.ebay.com/silenoscoins (accessed 6 January 2011).Google Scholar
eBay. “Uncleaned Crusty Roman Coins.” http://www.ebay.com/itm/UNCLEANED-CRUSTY-ROMAN-COINS-/370508691269 (16 July 2011; accessed 24 January 2012).Google Scholar
eBay. “What Percentage of People Leave Feedback?” eBay Forums. http://forums.ebay.com/db2/topic/Ebay-Stores/What-Percent-Of/520090737 (16 February 2009; accessed 8 April 2011).Google Scholar
Eichstedt, Jennifer, and Small, Stephen. Representations of Slavery: Race and Ideology in Southern Plantation Museums. Washington, DC: Smithsonian Institution Press, 2002.Google Scholar
Elia, Ricardo. “A Seductive and Troubling Work.” In Archaeological Ethics, edited by Vitelli, Karen, 5461. Walnut Creek, CA: Altamira Press, 1996.Google Scholar
Federal Bureau of Investigation. “Iraqi Artifacts Seized.” Federal Bureau of Investigation. http://baltimore.fbi.gov/dojpressrel/pressrel10/ba102510a.htm (25 October 2010; accessed 12 January 2011).Google Scholar
Felch, Jason, and Frammolino, Ralph. Chasing Aphrodite: The Hunt for Looted Antiquities at the World's Richest Museum. Boston: Houghton Mifflin Harcourt, 2011.Google Scholar
Felson, Marcus. Crime and Nature. London: SAGE, 2006.Google Scholar
Felson, Marcus. “The Ecosystem for Organized Crime.” HEUNI Paper no. 26 (2006). Helsinki: The European Institute for Crime Prevention and Control.Google Scholar
Felson, Marcus, and Boba, Rachel. Crime and Everyday Life. London: SAGE, 2010.CrossRefGoogle Scholar
Finckenauer, James O.Problems of Definition: What is Organized Crime?Trends in Organized Crime 8 (2005): 6383.CrossRefGoogle Scholar
Finckenauer, James, and Waring, Elin. Russian Mafia in America. Boston: Northeastern University Press, 1998.Google Scholar
ForgeryNetwork. “Item: 7090.” ForgeryNetwork.com. http://www.forgerynetwork.com/asset.aspx?id=qgR8EHp4XvA= (2010; accessed 20 February 2011).Google Scholar
Friedman, Robert. Red Mafiya: How the Russian Mob Has Invaded America. Boston: Little, Brown, 2000.Google Scholar
Friedman, Robert. “The Most Dangerous Mobster in the World,” The Village Voice, 26 May 1998, http://www.villagevoice.com/1998-05-26/news/the-most-dangerous-mobster-in-the-world/full/ (accessed 21 April 2013).Google Scholar
Gill, David. “The Portable Antiquities Scheme and the Treasure Act: Protecting the Archaeology of England and Wales?Papers from the Institute of Archaeology University College London 20 (2010): 1.CrossRefGoogle Scholar
Gill, David W. J., and Chippendale, Christopher. “Material and Intellectual Consequences of Esteem for Cycladic Figures.” American Journal of Archaeology 97 (1993): 602–73.CrossRefGoogle Scholar
GlobalWitness.org. “Conflict Diamonds.” http://www.globalwitness.org/conflict-diamonds (accessed 21 January 2012).Google Scholar
Green, Timothy. The Smugglers. New York: Walker, 1969.Google Scholar
Greenhalgh, Michael. Marble Past, Monumental Present: Building with Antiquities in the Mediaeval Mediterranean. Boston: Brill, 2009.Google Scholar
Guineva, Maria. “Illegal Antiques Channels and Lyudmila Zhivkova's Role Part V,” Novinite, 5 June 2008, http://www.novinite.com/view_news.php?id=93830 (accessed 21 April 2013).Google Scholar
Harris, Lucian. “German Court Orders Return of Ancient Vessel to Iraq,” The Art Newspaper, 18 November 2009, http://www.theartnewspaper.com/articles/German-court-orders-return-of-ancient-vessel-to-Iraq/19796 (accessed 21 April 2013).Google Scholar
Hoving, Thomas. Making the Mummies Dance: Inside the Metropolitan Museum of Art. New York: Simon & Schuster, 1993.Google Scholar
ICOM. Red List of Afghanistan Antiquities at Risk. Paris: International Council of Museums, 2008.Google Scholar
Kaplan, David E.“Paying for Terror: How Jihadist Groups Are Using Organized Crime Tactics and Profits to Finance Attacks on Targets Around the Globe.” U.S. News & World Report, November 2005.Google Scholar
Keefe, Patrick Radden. “The Idol Thief: Inside One of the Biggest Antiquities-Smuggling Rings in History.” The New Yorker. http://www.newyorker.com/reporting/2007/05/07/070507fa_fact_keefe?currentPage=all (7 May 2007; accessed 8 December 2012).Google Scholar
Keith, Donald, and Carrell, Toni. “Going, Going, Gone: Underwater Cultural Resources in Decline.” International Handbook of Historical Archaeology, edited by Majewski, T. and Gaimster, D., 105–39. New York: Springer, 2009.CrossRefGoogle Scholar
Kersel, Morag. “From the Ground to the Buyer: A Market Analysis of the Illegal Trade in Antiquities.” In Archaeology, Cultural Heritage and the Antiquities Trade, edited by Brodie, Neil, Kersel, Morag, Luke, Christina, and Tubb, Katheryn Walker, 188205. Gainesville: University Press of Florida, 2006.Google Scholar
Kletter, Raz. “The Friends of Antiquities: The Story of an Israeli Volunteer Group and Comparative Remarks.” Journal of Hebrew Scriptures 8 (2): 220.Google Scholar
Kline, Thomas. “Art Market.” In Yearbook of Cultural Property Law, edited by Tarler, David and Hutt, Sherry, 101–18. Walnut Creek, CA: Left Coast Press, 2008.Google Scholar
Lo, Shiu Hing. The Politics of Cross-Border Crime in Greater China: Case Studies of Mainland China, Hong Kong, and Macao. Armonk: M.E. Sharp, 2009.Google Scholar
MacKenzie, Simon R. M.Going, Going, Gone: Regulating the Market in Illicit Antiquities. Leicester, UK: Institute of Art and Law, 2005.Google Scholar
MacKenzie, Simon R. M.Identifying and Preventing Opportunities for Organized Crime in the International Antiquities Market.” In Organised Crime in Art and Antiquities, edited by Manacorda, Stefano, 4162. ISPAC: Milan, 2009.Google Scholar
McCalister, Andrew. “Organized Crime and the Theft of Iraqi Antiquities.” Trends in Organized Crime 9 (2005): 2437.CrossRefGoogle Scholar
McIntosh, Roderick, Togola, Téréba, and McIntosh, Susan Keech. “The Good Collector and the Premise of Mutual Respect Among Nations.” African Arts 28 (1995): 60112.CrossRefGoogle Scholar
McNall, Bruce, and D'Antonio, Michael. Fun While It Lasted: My Rise and Fall in the Land of Fame and Fortune. New York: Hyperion, 2003.Google Scholar
Merryman, John Henry. “Two Ways of Thinking about Cultural Property.” American Journal of International Law 80 (1986): 831–53.CrossRefGoogle Scholar
Merryman, John Henry, Elsen, Albert Edward, and Urice, Stephen K.. Law, Ethics, and the Visual Arts. Frederick, MD: Kluwer Law International, 2007.Google Scholar
Meskell, Lynn. “Pharaonic Legacies: Postcolonialism, Heritage, and Hyperreality.” In The Politics of Archaeology and Identity in a Global Context, edited by Kane, Susan, 149–71. Boston, MA: Archaeological Institute of America, 2003.Google Scholar
Miksic, John N., Goh, Geok Yiah, and O'Connor, Sue. Rethinking Cultural Resource Management in Southeast Asia: Preservation, Development, and Neglect. London: Anthem Press, 2011.Google Scholar
MyVisaJobs.com. “Silenos Coins and Antiquities—H1B Visa and Green Card Profile.” MyVisaJobs.com. http://www.myvisajobs.com/Visa-Sponsor/Silenos-Coins-and-Antiquities/489743.htm (accessed 1 April 2011).Google Scholar
Pastore, Ferruccio, Mozini, Paola, and Sciortino, Giuseppe. “Schengen's Soft Underbelly? Irregular Migration and Human Smuggling Across Land and Sea Borders to Italy.” International Migration 44 (2006): 95119.CrossRefGoogle Scholar
Pearce, Susan M., and Arnold, Kenneth, The Collector's Voice: Early Voices, Vol. 2. Aldershot, UK: Ashgate, 2000.Google Scholar
Peters, Gretchen. Crime and Insurgency in the Tribal Areas of Afghanistan and Pakistan. New York: West Point Combating Terrorism Center, 2010.CrossRefGoogle Scholar
Peters, Gretchen. “More than 1,500 Stolen Afghan Artifacts Return to Kabul.” National Geographic (March 2009).Google Scholar
Peters, Gretchen. Seeds of Terror: How Drugs, Thugs, and Crime Are Reshaping the Afghan War. New York: Picador, 2010.Google Scholar
Ruiz, Cristina. “9/11 Hijacker Attempted to Sell Afghan Loot.” The Art Newspaper 210 (2010): 1.Google Scholar
Ruiz, Cristina. “My Life as a Tombarolo.” The Art Newspaper 112 (2000): 3638.Google Scholar
SalaryList.com. “Silenos Coins and Antiquities.” SalaryList.com. http://www.salarylist.com/company/Silenos-Coins-Antiquities/Antiquities-Appraiser-Salary.htm (1 October 2001; accessed 9 March 2012).Google Scholar
Schetter, Conrad. “The ‘Bazaar Economy’ of Afghanistan: A Comprehensive Approach.” In Afghanistan: A Country Without a State?, edited by Noelle-Karimi, Christine, Schetter, Conrad, and Schlagintweit, Reinhard, 119. Frankfurt am Main: IKO, 2004.Google Scholar
Sedra, Mark. “Introduction.” In Confronting Afghanistan's Security Dilemma: Reforming the Security Sector, edited by Sedra, Mark, 816. Bonn: Bonn International Centre for Conversion, 2003.Google Scholar
Shelley, Louise. “The Globalization of Crime and Terrorism.” America.gov. http://www.america.gov/st/business-english/2006/February/20080608103639xjyrreP4.218692e-02.html (1 February 2006; accessed 26 February 2011).Google Scholar
Shentov, Ognian. Organized Crime in Bulgaria: Markets and Trends. Sofia: Center for the Study of Democracy, 2007.Google Scholar
Slayman, Andrew. “The Trial in Rome.” Archaeologyhttp://archive.archaeology.org/online/features/italytrial/ (6 February 2006; accessed 21 April 2013).Google Scholar
Slocum-Schaffer, Stephanie. “Animal Rights: Subordinate or Equal Species?Moral Controversies in American Politics, edited by Tatalovich, Raymond and Daynes, Byron, 227–81. New York: M.E. Sharpe, 2011.Google Scholar
Stanish, Charles. “Forging Ahead: Or, How I Learned to Stop Worrying and Love eBay.” Archaeologyhttp://archive.archaeology.org/0905/etc/insider.html (May 2009; accessed 21 April 2013).Google Scholar
Tijhuis, Antonius. Transnational Crime and the Interface between Legal and Illegal Factors: The Case of the Illicit Art and Antiquities Trade. Nijmegen, Netherlands: Wolf Legal, 2006.Google Scholar
UNESCO. International Flows of Selected Cultural Goods and Services, 1994–2003: Defining and Capturing the Flows of Global Cultural Trade. Montreal: UNESCO Institute for Statistics, 2005.Google Scholar
United Nations. United Nations Convention Against Transnational Organized Crime and the Protocols Thereto. New York: United Nations, 2004.Google Scholar
van Dijck, Maarten. “Discussing Definitions of Organised Crime: Word Play in Academic and Political Discourse.” HUMSEC 1 (2007): 6590.Google Scholar
Van Rijn, Michel. Hot Art, Cold Cash. London: Little, Brown, 1993.Google Scholar
Watson, Peter. Sotheby's: The Inside Story. New York: Random House, 1997.Google Scholar
Watson, Peter, and Todeschini, Cecilia. The Medici Conspiracy: The Illicit Journey of Looted Antiquities from Italy's Tomb Raiders to the World's Greatest Museums. New York: BBS Public Affairs, 2007.Google Scholar
Waxman, Sharon. “Chasing the Lydian Hoard.” Smithsonian. http://www.smithsonianmag.com/history-archaeology/Loot-Chasing-the-Lydian-Hoard.html (14 November 2008; accessed 21 April 2013).Google Scholar
WikiLeaks. “Criminal Event Smuggling RPT 2008-01-27.” WikiLeaks. http://warlogs.owni.fr (27 January 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Criminal Event) Smuggling RPT 2008-4-3.” WikiLeaks. http://warlogs.owni.fr (3 April 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “Criminal Event Smuggling RPT 2009-06-07.” WikiLeaks. http://warlogs.owni.fr (7 June 2009; accessed 16 December 2010).Google Scholar
WikiLeaks. “During op. 2004-02-20.” WikiLeaks. http://warlogs.owni.fr (20 February 2004; accessed 16 December 2010).Google Scholar
WikiLeaks. “Friend Action Confiscation RPT 2009-08-18.” WikiLeaks. http://warlogs.owni.fr (18 August 2009; accessed 16 December 2010).Google Scholar
WikiLeaks. “Friendly Action Arrest RPT 2008-03-18.” WikiLeaks. http://warlogs.owni.fr (18 March 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Friendly Action) Arrest RPT Kirkuk 2007-12-27.” WikiLeaks. http://warlogs.owni.fr (27 December 2007; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Friendly Action) Cache Found 2008-05-28.” WikiLeaks. http://warlogs.owni.fr (28 May 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Friendly Action) Cache Found 2008-11-02.” WikiLeaks. http://warlogs.owni.fr (2 November 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Friendly Action) Raid RPT 2007-12-07.” WikiLeaks. http://warlogs.owni.fr (7 December 2007; accessed 16 December 2010).Google Scholar
WikiLeaks. “Friendly Action Raid RPT 2008-7-3.” WikiLeaks. http://warlogs.owni.fr (3 July 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “(Friendly Action) Detain RPT 2008-10-19.” WikiLeaks. http://warlogs.owni.fr (19 October 2008; accessed 16 December 2010).Google Scholar
WikiLeaks. “In An Nasiriyah (South Part) 2004-10-28:1.” WikiLeaks. http://warlogs.owni.fr (28 October 2004; accessed 16 December 2010).Google Scholar
WikiLeaks. “Materials Recovered by 2004-02-20.” WikiLeaks. http://warlogs.owni.fr (20 February 2004; accessed 16 December 2010).Google Scholar
WikiLeaks. “Raid by 2005-06-03.” WikiLeaks. http://warlogs.owni.fr (3 June 2005; accessed 16 December 2010).Google Scholar
WikiLeaks. “Raid by Wolf BDE 2005-07-18.” WikiLeaks. http://warlogs.owni.fr (18 July 2005; accessed 16 December 2010).Google Scholar
WikiLeaks. “Threat Warning: Poss Attk on 2005-12-28.” WikiLeaks. http://warlogs.owni.fr (28 December 2005; accessed 16 December 2010).Google Scholar
WikiLeaks. “UK Possession of Arts Works Looted from Iraq: Schoyen UCL Inquiry Report 2009.” WikiLeaks. http://wikileaks.org/wiki/UK_possession_of_art_works_looted_from_Iraq:_Schoyen_UCL_Inquiry_report,_2009 (11 November 2009; accessed 12 March 2012).Google Scholar
WikiLeaks. “WikiLeaks Iraq War Logs.” WikiLeaks. http://warlogs.owni.fr (23 October 2010; accessed 16 December 2010).Google Scholar
Williams, Phil. “Networks, Markets, and Hierarchies.” In Combating Transnational Crime: Concepts, Activities, and Responses, edited by Williams, Phil and Vlassis, Dimitri, 5787. London: Frank Cass, 2001.Google Scholar
Williams, Phil. “Transnational Criminal Networks.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by Arquilla, John and Ronfeldt, David, 6197. Santa Monica: RAND, 2001.Google Scholar
Williams, Phil, and Godson, Roy. “Anticipating Organized and Transnational Crime.” Crime, Law & Social Change 37 (2002): 311–55.CrossRefGoogle Scholar
58
Cited by

Save article to Kindle

To save this article to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

The Illicit Antiquities Trade as a Transnational Criminal Network: Characterizing and Anticipating Trafficking of Cultural Heritage
Available formats
×

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox.

The Illicit Antiquities Trade as a Transnational Criminal Network: Characterizing and Anticipating Trafficking of Cultural Heritage
Available formats
×

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive.

The Illicit Antiquities Trade as a Transnational Criminal Network: Characterizing and Anticipating Trafficking of Cultural Heritage
Available formats
×
×

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *