- Award ID(s):
- 1935618
- PAR ID:
- 10483190
- Publisher / Repository:
- Victims @ Offenders
- Date Published:
- Journal Name:
- Victims & Offenders
- Volume:
- 18
- Issue:
- 3
- ISSN:
- 1556-4886
- Page Range / eLocation ID:
- 473 to 511
- Subject(s) / Keyword(s):
- labor trafficking supply chain criminal networks disruption law enforcement intervention
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
Agrawal, A. (Ed.)Wildlife trafficking, whether local or transnational in scope, undermines sustainable development efforts, degrades cultural resources, endangers species, erodes the local and global economy, and facilitates the spread of zoonotic diseases. Wildlife trafficking networks (WTNs) occupy a unique gray space in supply chains—straddling licit and illicit networks, supporting legitimate and criminal workforces, and often demonstrating high resilience in their sourcing flexibility and adaptability. Authorities in different sectors desire, but frequently lack knowledge about how to allocate resources to disrupt illicit wildlife supply networks and prevent negative collateral impacts. Novel conceptualizations and a deeper scientific understanding of WTN structures are needed to help unravel the dynamics of interaction between disruption and resilience while accommodating socioenvironmental context. We use the case of ploughshare tortoise trafficking to help illustrate the potential of key advancements in interdisciplinary thinking. Insights herein suggest a significant need and opportunity for scientists to generate new science-based recommendations for WTN-related data collection and analysis for supply chain visibility, shifts in illicit supply chain dominance, network resilience, or limits of the supplier base.more » « less
-
Problem definition: Approximately 11,000 alleged illicit massage businesses (IMBs) exist across the United States hidden in plain sight among legitimate businesses. These illicit businesses frequently exploit workers, many of whom are victims of human trafficking, forced or coerced to provide commercial sex. Academic/practical relevance: Although IMB review boards like Rubmaps.ch can provide first-hand information to identify IMBs, these sites are likely to be closed by law enforcement. Open websites like Yelp.com provide more accessible and detailed information about a larger set of massage businesses. Reviews from these sites can be screened for risk factors of trafficking. Methodology: We develop a natural language processing approach to detect online customer reviews that indicate a massage business is likely engaged in human trafficking. We label data sets of Yelp reviews using knowledge of known IMBs. We develop a lexicon of key words/phrases related to human trafficking and commercial sex acts. We then build two classification models based on this lexicon. We also train two classification models using embeddings from the bidirectional encoder representations from transformers (BERT) model and the Doc2Vec model. Results: We evaluate the performance of these classification models and various ensemble models. The lexicon-based models achieve high precision, whereas the embedding-based models have relatively high recall. The ensemble models provide a compromise and achieve the best performance on the out-of-sample test. Our results verify the usefulness of ensemble methods for building robust models to detect risk factors of human trafficking in reviews on open websites like Yelp. Managerial implications: The proposed models can save countless hours in IMB investigations by automatically sorting through large quantities of data to flag potential illicit activity, eliminating the need for manual screening of these reviews by law enforcement and other stakeholders.
Funding: This work was supported by the National Science Foundation [Grant 1936331].
Supplemental Material: The online appendix is available at https://doi.org/10.1287/msom.2023.1196 .
-
Illicit Wildlife Trade (IWT) is a serious global crime that negatively impacts biodiversity, human health, national security, and economic development. Many flora and fauna are trafficked in different product forms. We investigate a network interdiction problem for wildlife trafficking and introduce a new model to tackle key challenges associated with IWT. Our model captures the interdiction problem faced by law enforcement impeding IWT on flight networks, though it can be extended to other types of transportation networks. We incorporate vital issues unique to IWT, including the need for training and difficulty recognizing illicit wildlife products, the impact of charismatic species and geopolitical differences, and the varying amounts of information and objectives traffickers may use when choosing transit routes. Additionally, we incorporate different detection probabilities at nodes and along arcs depending on law enforcement’s interdiction and training actions. We present solutions for several key IWT supply chains using realistic data from conservation research, seizure databases, and international reports. We compare our model to two benchmark models and highlight key features of the interdiction strategy. We discuss the implications of our models for combating IWT in practice and highlight critical areas of concern for stakeholders.more » « less
-
Human trafficking is a complex and challenging global crime exacerbated by the use of technology. Traffickers utilize technology for scalability, anonymity, and profitability as the Internet, social media platforms and encrypted messaging make the recruitment, exploitation and profit of an individual a low-risk, high-reward enterprise. Counter-trafficking efforts are often siloed approaches, resulting in decentralized information and analysis on the size and scope of trafficking in persons. Resources and tools such as the human trafficking kill chain methodology and Artemis, a machine learning (ML) human trafficking risk classifier, show promising disruption tactics which may also be applied to other asymmetrical threats. Recommendations for centralized data collections methods, inter-agency collaboration, and cybersecurity adjacent legislation are also made.more » « less
-
The trade in illicit items, such as counterfeits, not only leads to the loss of large sums of private and public revenue, but also poses a danger to individuals, undermines governments, and--in the most extreme cases--finances criminal organizations. It is estimated that in 2013 trade in illicit items accounted for 2.5% of the global commerce. To combat illicit trade, it is necessary to understand its illicit supply networks. Therefore, we present in this article an approach that is able to find an optimal description of an illicit supply network using a series of Variable State Resolution-Markov Chains. The new method is applied to a real-world dataset stemming from the Global Product Authentication Service of Micro Focus International. The results show how an illicit supply network might be analyzed with the help of this method.more » « less