The De-Territorialization of Crime: A Structural Shift in Security Economics

Technology is fundamentally altering the economics of crime and militancy by decoupling operations from physical territory. Criminal profits from AI-enabled scams, ransomware, and cryptocurrency laundering now exceed hundreds of billions to over a trillion dollars annually, surpassing traditional illicit economies. This creates a security landscape where digital infrastructure battles replace traditional border conflicts.

The End of Territorial Monopoly

For decades, organized crime and militant groups built their power on territorial control. The Islamic State, Taliban, Sinaloa Cartel, and similar organizations depended on physical domination of territory to access resources, populations, and trade corridors. This model enabled taxation, control of legal and illicit economies, and psychological dominance over populations. The territorial approach created predictable patterns that law enforcement could target through border controls, interdiction operations, and intelligence gathering focused on physical spaces.

Today, synthetic drug production, digital payment systems, AI, and networked devices are eroding these traditional advantages. AI-enabled scams and online fraud schemes now yield earnings larger than taxation of legal or illegal economies. Synthetic drug manufacturing clusters in residential basements rather than sprawling agricultural fields. Cryptocurrency-based laundering operates across jurisdictions without physical infrastructure. The result is a fundamental shift: revenue generation no longer requires territorial control, and violence no longer depends on physical presence.

Weapons, Attacks, and Labor Without Geography

Three critical dimensions demonstrate how technology enables de-territorialization. First, weapons procurement shifts from international smuggling networks to localized production through 3D printing and additive manufacturing. Brazilian criminal groups already print high-power rifles, creating untraceable "ghost guns" with simplified logistics. This reduces dependence on specialized intermediaries and weakens traditional crime-militancy nexuses built around smuggling routes.

Second, attacks transform from bombings requiring physical delivery to remote operations using inexpensive aerial drones. Criminal groups in Mexico use drones to target government officials and police stations from great distances. More significantly, attackers can compromise critical infrastructure through cyberattacks, sabotage individual vehicles through hacking, or turn internet-connected household appliances into instruments of harm. This expansion of tactical options and target sets creates unprecedented security challenges.

Third, labor requirements shrink dramatically. Traditional criminal operations required thousands of fighters, sentinels, tax collectors, and smugglers. AI systems now enable automated scams, deepfake-enabled identity fraud, and algorithmic phishing that impact millions of victims with minimal human involvement. Synthetic drug production reduces required labor from tens of thousands to hundreds. Aerial and marine drones eliminate the need for human smugglers. This creates a paradox: as AI adoption threatens middle-class jobs, criminal groups lose their traditional political capital as employers of last resort, potentially pushing them toward heavier reliance on coercion.

Data as the New Territory

While physical territory loses importance for revenue generation, data becomes the most valuable asset. The capacity to collect information, breach rivals' systems, and protect one's own data defines competitive advantage. High-quality data and the ability to separate AI "slop" from actionable intelligence become premium commodities. Instead of controlling large territories and managing populations, militants' and criminals' operations increasingly revolve around dominating digital infrastructure and manipulating information flows.

This creates new strategic geography. Localities rich in critical minerals, rare earth elements, water, energy production, and data infrastructure become priority targets. Marine drones advance smuggling capabilities, increasing the importance of littoral regions. Physical havens beyond law enforcement reach, such as territory shielded by rival states, continue offering advantages, as seen with Chinese, Russian, and Iranian hackers operating under government protection.

Law Enforcement's Center of Gravity Shift

The security competition pivots toward data control in a complex, crowded, and transparent battlefield. Criminals who can spoof data—faking geolocation of assets or hijacking electronic identities of legitimate commercial drones—gain significant advantages. Corrupting and recruiting data custodians in governments, private-sector firms, and rival groups becomes a top priority through bribery, intimidation, or deepfake trickery. Insider threats emerge as key risk vectors.

This struggle fuels fierce public debates over privacy. How much access to private spaces will publics cede to governments, law enforcement, and tech companies for security? The policy window is narrowing: the more public policies develop before terrorists or criminals unleash major shockwaves, the more balanced choices will likely be. Law enforcement must deploy the same technologies as criminals while developing defenses, creating a technological arms race where adoption speed determines advantage.

Strategic Implications for Security Markets

The de-territorialization of crime creates clear winners and losers in security markets. Cybersecurity firms experience increased demand for advanced threat detection and prevention solutions. Technology companies developing AI and analytics tools find growing markets for security applications and predictive systems. Government intelligence agencies gain enhanced capabilities for surveillance, monitoring, and threat assessment. Private security consultants see rising need for specialized expertise in emerging threat landscapes.

Conversely, traditional law enforcement agencies struggle to adapt to rapidly evolving digital crime methods. Small businesses and individuals face increased vulnerability to sophisticated cyberattacks with limited defense capabilities. Privacy advocates and civil liberties groups confront erosion of privacy rights due to expanded surveillance powers. Developing nations with limited technological infrastructure experience growing digital divides in security capabilities against transnational threats.

The New Security Economy

This structural shift transforms security from reactive law enforcement to proactive, intelligence-led ecosystems with integrated public-private partnerships and global coordination mechanisms. The market impact is profound: security spending shifts from border controls and physical interdiction to cybersecurity, data analytics, and predictive systems. International cooperation platforms become essential as crimes cross jurisdictions without physical movement.

The competition between states and nonstate armed actors over technological adoption accelerates. While this dynamic has played out over centuries, the current pace of technological change creates unprecedented challenges. Security forces must balance technological surveillance and predictive capabilities with protection of civil liberties and human rights—a tension that will define policy debates for the coming decade.




Source: Brookings Economics

Rate the Intelligence Signal

Intelligence FAQ

Technology decouples revenue generation from territorial control—AI scams and crypto laundering now yield more than traditional illicit economies, while synthetic drugs and 3D-printed weapons reduce physical infrastructure needs.

Data dominance replaces land control as the primary objective—the ability to collect, exploit, and protect information defines competitive advantage in the new security landscape.

Shift investments from physical security to cybersecurity and data protection, develop partnerships with tech security providers, and prepare for regulatory changes balancing surveillance needs with privacy rights.

Cybersecurity firms, AI analytics companies, government intelligence contractors, and private security consultants gain market share as traditional law enforcement agencies struggle to adapt.