skip to main content


This content will become publicly available on May 1, 2024

Title: Predicting Wildlife Trafficking Routes with Differentiable Shortest Paths
Wildlife trafficking (WT), the illegal trade of wild fauna, flora, and their parts, directly threatens biodiversity and conservation of trafficked species, while also negatively impacting human health, national security, and economic development. Wildlife traffickers obfuscate their activities in plain sight, leveraging legal, large, and globally linked transportation networks. To complicate matters, defensive interdiction resources are limited, datasets are fragmented and rarely interoperable, and interventions like setting checkpoints place a burden on legal transportation. As a result, interpretable predictions of which routes wildlife traffickers are likely to take can help target defensive efforts and understand what wildlife traffickers may be considering when selecting routes. We propose a data-driven model for predicting trafficking routes on the global commercial flight network, a transportation network for which we have some historical seizure data and a specification of the possible routes that traffickers may take. While seizure data has limitations such as data bias and dependence on the deployed defensive resources, this is a first step towards predicting wildlife trafficking routes on real-world data. Our seizure data documents the planned commercial flight itinerary of trafficked and successfully interdicted wildlife. We aim to provide predictions of highly-trafficked flight paths for known origin-destination pairs with plausible explanations that illuminate how traffickers make decisions based on the presence of criminal actors, markets, and resilience systems. We propose a model that first predicts likelihoods of which commercial flights will be taken out of a given airport given input features, and then subsequently finds the highest-likelihood flight path from origin to destination using a differentiable shortest path solver, allowing us to automatically align our model’s loss with the overall goal of correctly predicting the full flight itinerary from a given source to a destination. We evaluate the proposed model’s predictions and interpretations both quantitatively and qualitatively, showing that the predicted paths are aligned with observed held-out seizures, and can be interpreted by policy-makers  more » « less
Award ID(s):
1935451 2039951
NSF-PAR ID:
10442320
Author(s) / Creator(s):
Editor(s):
Cire, A.A. 
Date Published:
Journal Name:
Part of the Lecture Notes in Computer Science book series (LNCS,volume 13884)
Page Range / eLocation ID:
460–476
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Despite more than 40 years of counterdrug interdiction efforts in the Western Hemisphere, cocaine trafficking, or ‘narco-trafficking’, networks continue to evolve and increase their global reach. Counterdrug interdiction continues to fall short of performance targets due to the adaptability of narco-trafficking networks and spatially complex constraints on interdiction operations (e.g., resources, jurisdictional). Due to these dynamics, current modeling approaches offer limited strategic insights into time-varying, spatially optimal allocation of counterdrug interdiction assets. This study presents coupled agent-based and spatial optimization models to investigate the co-evolution of counterdrug interdiction deployment and narco-trafficking networks’ adaptive responses. Increased spatially optimized interdiction assets were found to increase seizure volumes. However, the value per seized shipment concurrently decreased and the number of active nodes increased or was unchanged. Narco-trafficking networks adaptively responded to increased interdiction pressure by spatially diversifying routes and dispersing shipment volumes. Thus, increased interdiction pressure had the unintended effect of expanding the spatial footprint of narcotrafficking networks. This coupled modeling approach enabled the study of narco-trafficking network evolution while being subjected to varying interdiction pressure as a spatially complex adaptive system. Capturing such co-evolution dynamics is essential for simulating traffickers’ realistic adaptive responses to a wide range of interdiction scenarios. 
    more » « less
  2. null (Ed.)
    Given a spatial graph, an origin and a destination, and on-board diagnostics (OBD) data, the energy-efficient path selection problem aims to find the path with the least expected energy consumption (EEC). Two main objectives of smart cities are sustainability and prosperity, both of which benefit from reducing the energy consumption of transportation. The challenges of the problem include the dependence of EEC on the physical parameters of vehicles, the autocorrelation of the EEC on segments of paths, the high computational cost of EEC estimation, and potential negative EEC. However, the current cost estimation models for the path selection problem do not consider vehicles’ physical parameters. Moreover, the current path selection algorithms follow the “path + edge” pattern when exploring candidate paths, resulting in redundant computation. Our preliminary work introduced a physics-guided energy consumption model and proposed a maximal-frequented-path-graph shortest-path algorithm using the model. In this work, we propose an informed algorithm using an admissible heuristic and propose an algorithm to handle negative EEC. We analyze the proposed algorithms theoretically and evaluate the proposed algorithms via experiments with real-world and synthetic data. We also conduct two case studies using real-world data and a road test to validate the proposed method. 
    more » « less
  3. Human trafficking is a serious crime and violation of human rights that results in numerous harms. Although the phenomenon is not new, scholarship on the issue has grown substantially since the first legal framework was passed in 2000. However, the existing literature has been criticized for its skewed focus on victims, among other things. The dearth of information on traffickers and their operations limits our ability to reduce or prevent perpetration. The current study presents a comprehensive and critical review of the existing literature focused on traffickers to synthesize what is already known and highlight the key gaps. Twenty-nine articles met the inclusion criteria of (1) focusing on traffickers and their operations and (2) relying on data either directly from traffickers or sources that contained detailed information about criminal cases against traffickers. We used an iterative process to identify relevant studies, which included collecting articles of which we were already familiar or were identified in existing reviews, searching their reference lists, and conducting cited-by searches until saturation was reached. Topics found in the extant literature included: characteristics of traffickers, relationships between traffickers and victims, organizational characteristics and networks, operations, connections with other crimes, motivations, perceptions of behavior, and risks associated with trafficking. It concludes with recommendations for future research and a discussion of how bridging gaps in the literature could support more rigorous mathematical modeling that is needed to identify and assess promising perpetration prevention and intervention strategies.

     
    more » « less
  4. Location information is critical to a wide variety of navigation and tracking applications. GPS, today's de-facto outdoor localization system has been shown to be vulnerable to signal spoofing attacks. Inertial Navigation Systems (INS) are emerging as a popular complementary system, especially in road transportation systems as they enable improved navigation and tracking as well as offer resilience to wireless signals spoofing and jamming attacks. In this paper, we evaluate the security guarantees of INS-aided GPS tracking and navigation for road transportation systems. We consider an adversary required to travel from a source location to a destination and monitored by an INS-aided GPS system. The goal of the adversary is to travel to alternate locations without being detected. We develop and evaluate algorithms that achieve this goal, providing the adversary significant latitude. Our algorithms build a graph model for a given road network and enable us to derive potential destinations an attacker can reach without raising alarms even with the INS-aided GPS tracking and navigation system. The algorithms render the gyroscope and accelerometer sensors useless as they generate road trajectories indistinguishable from plausible paths (both in terms of turn angles and roads curvature). We also design, build and demonstrate that the magnetometer can be actively spoofed using a combination of carefully controlled coils. To experimentally demonstrate and evaluate the feasibility of the attack in real-world, we implement a first real-time integrated GPS/INS spoofer that accounts for traffic fluidity, congestion, lights, and dynamically generates corresponding spoofing signals. Furthermore, we evaluate our attack on ten different cities using driving traces and publicly available city plans. Our evaluations show that it is possible for an attacker to reach destinations that are as far as 30 km away from the actual destination without being detected. We also show that it is possible for the adversary to reach almost 60--80% of possible points within the target region in some cities. Such results are only a lower-bound, as an adversary can adjust our parameters to spend more resources (e.g., time) on the target source/destination than we did for our performance evaluations of thousands of paths. We propose countermeasures that limit an attacker's ability, without the need for any hardware modifications. Our system can be used as the foundation for countering such attacks, both detecting and recommending paths that are difficult to spoof. 
    more » « less
  5. Despite increased awareness of sex trafficking of minors in the U.S., prosecution of traffickers remains difficult, in part because of victim uncooperativeness. There are questions about how that uncooperativeness is expressed, whether it is evident in successfully prosecuted cases, and whether it is unique to trafficked minors or it emerges in similar age victims of sexual abuse. To provide insight relevant to these questions, we compared appellate opinions in two types of successfully prosecuted criminal cases: sex trafficking and sexual abuse of adolescent victims. In the trafficking opinions, victims were rarely described as disclosing on their own or as knowing their trafficker before the victimization. The opinions also often alluded to the trafficking victims’ uncooperativeness and delinquency history, and frequently mentioned electronic evidence and prosecution experts. The sexual abuse opinions, in contrast, tended to suggest that victims’ own disclosures initiated the case, perpetrators were known and trusted adults, and caregiver support during the case was common. Finally, the sexual abuse opinions never explicitly mentioned victim uncooperativeness or electronic evidence and rarely mentioned expert testimony or delinquency. The different characterizations of the two case types highlight the need for improved education concerning effective prosecution of sex crimes against minors.

     
    more » « less