skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Predicting Wildlife Trafficking Routes with Differentiable Shortest Paths
Wildlife trafficking (WT), the illegal trade of wild fauna, flora, and their parts, directly threatens biodiversity and conservation of trafficked species, while also negatively impacting human health, national security, and economic development. Wildlife traffickers obfuscate their activities in plain sight, leveraging legal, large, and globally linked transportation networks. To complicate matters, defensive interdiction resources are limited, datasets are fragmented and rarely interoperable, and interventions like setting checkpoints place a burden on legal transportation. As a result, interpretable predictions of which routes wildlife traffickers are likely to take can help target defensive efforts and understand what wildlife traffickers may be considering when selecting routes. We propose a data-driven model for predicting trafficking routes on the global commercial flight network, a transportation network for which we have some historical seizure data and a specification of the possible routes that traffickers may take. While seizure data has limitations such as data bias and dependence on the deployed defensive resources, this is a first step towards predicting wildlife trafficking routes on real-world data. Our seizure data documents the planned commercial flight itinerary of trafficked and successfully interdicted wildlife. We aim to provide predictions of highly-trafficked flight paths for known origin-destination pairs with plausible explanations that illuminate how traffickers make decisions based on the presence of criminal actors, markets, and resilience systems. We propose a model that first predicts likelihoods of which commercial flights will be taken out of a given airport given input features, and then subsequently finds the highest-likelihood flight path from origin to destination using a differentiable shortest path solver, allowing us to automatically align our model’s loss with the overall goal of correctly predicting the full flight itinerary from a given source to a destination. We evaluate the proposed model’s predictions and interpretations both quantitatively and qualitatively, showing that the predicted paths are aligned with observed held-out seizures, and can be interpreted by policy-makers  more » « less
Award ID(s):
1935451 2039951
PAR ID:
10442320
Author(s) / Creator(s):
Editor(s):
Cire, A.A. 
Date Published:
Journal Name:
Part of the Lecture Notes in Computer Science book series (LNCS,volume 13884)
Page Range / eLocation ID:
460–476
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Illicit Wildlife Trade (IWT) is a serious global crime that negatively impacts biodiversity, human health, national security, and economic development. Many flora and fauna are trafficked in different product forms. We investigate a network interdiction problem for wildlife trafficking and introduce a new model to tackle key challenges associated with IWT. Our model captures the interdiction problem faced by law enforcement impeding IWT on flight networks, though it can be extended to other types of transportation networks. We incorporate vital issues unique to IWT, including the need for training and difficulty recognizing illicit wildlife products, the impact of charismatic species and geopolitical differences, and the varying amounts of information and objectives traffickers may use when choosing transit routes. Additionally, we incorporate different detection probabilities at nodes and along arcs depending on law enforcement’s interdiction and training actions. We present solutions for several key IWT supply chains using realistic data from conservation research, seizure databases, and international reports. We compare our model to two benchmark models and highlight key features of the interdiction strategy. We discuss the implications of our models for combating IWT in practice and highlight critical areas of concern for stakeholders. 
    more » « less
  2. We describe a novel database on wildlife trafficking that can be used for exploring supply chain coordination via game-theoretic collaboration models, geographic spread of wildlife products trafficked via multi-item knapsack problems, or illicit network interdiction via multi-armed bandit problems.</p> A publicly available visualization of this dataset is available at: https://public.tableau.com/views/IWTDataDirectory-Gore/Sheet2?:language=en-US&:display_count=n&:origin=viz_share_link 
    more » « less
  3. null (Ed.)
    Given a spatial graph, an origin and a destination, and on-board diagnostics (OBD) data, the energy-efficient path selection problem aims to find the path with the least expected energy consumption (EEC). Two main objectives of smart cities are sustainability and prosperity, both of which benefit from reducing the energy consumption of transportation. The challenges of the problem include the dependence of EEC on the physical parameters of vehicles, the autocorrelation of the EEC on segments of paths, the high computational cost of EEC estimation, and potential negative EEC. However, the current cost estimation models for the path selection problem do not consider vehicles’ physical parameters. Moreover, the current path selection algorithms follow the “path + edge” pattern when exploring candidate paths, resulting in redundant computation. Our preliminary work introduced a physics-guided energy consumption model and proposed a maximal-frequented-path-graph shortest-path algorithm using the model. In this work, we propose an informed algorithm using an admissible heuristic and propose an algorithm to handle negative EEC. We analyze the proposed algorithms theoretically and evaluate the proposed algorithms via experiments with real-world and synthetic data. We also conduct two case studies using real-world data and a road test to validate the proposed method. 
    more » « less
  4. Despite more than 40 years of counterdrug interdiction efforts in the Western Hemisphere, cocaine trafficking, or ‘narco-trafficking’, networks continue to evolve and increase their global reach. Counterdrug interdiction continues to fall short of performance targets due to the adaptability of narco-trafficking networks and spatially complex constraints on interdiction operations (e.g., resources, jurisdictional). Due to these dynamics, current modeling approaches offer limited strategic insights into time-varying, spatially optimal allocation of counterdrug interdiction assets. This study presents coupled agent-based and spatial optimization models to investigate the co-evolution of counterdrug interdiction deployment and narco-trafficking networks’ adaptive responses. Increased spatially optimized interdiction assets were found to increase seizure volumes. However, the value per seized shipment concurrently decreased and the number of active nodes increased or was unchanged. Narco-trafficking networks adaptively responded to increased interdiction pressure by spatially diversifying routes and dispersing shipment volumes. Thus, increased interdiction pressure had the unintended effect of expanding the spatial footprint of narcotrafficking networks. This coupled modeling approach enabled the study of narco-trafficking network evolution while being subjected to varying interdiction pressure as a spatially complex adaptive system. Capturing such co-evolution dynamics is essential for simulating traffickers’ realistic adaptive responses to a wide range of interdiction scenarios. 
    more » « less
  5. Human trafficking is a serious crime and violation of human rights that results in numerous harms. Although the phenomenon is not new, scholarship on the issue has grown substantially since the first legal framework was passed in 2000. However, the existing literature has been criticized for its skewed focus on victims, among other things. The dearth of information on traffickers and their operations limits our ability to reduce or prevent perpetration. The current study presents a comprehensive and critical review of the existing literature focused on traffickers to synthesize what is already known and highlight the key gaps. Twenty-nine articles met the inclusion criteria of (1) focusing on traffickers and their operations and (2) relying on data either directly from traffickers or sources that contained detailed information about criminal cases against traffickers. We used an iterative process to identify relevant studies, which included collecting articles of which we were already familiar or were identified in existing reviews, searching their reference lists, and conducting cited-by searches until saturation was reached. Topics found in the extant literature included: characteristics of traffickers, relationships between traffickers and victims, organizational characteristics and networks, operations, connections with other crimes, motivations, perceptions of behavior, and risks associated with trafficking. It concludes with recommendations for future research and a discussion of how bridging gaps in the literature could support more rigorous mathematical modeling that is needed to identify and assess promising perpetration prevention and intervention strategies. 
    more » « less