skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Advertising with Anonymity and Impunity: The Harmful Consequences of Counterfeit PPE Supply Chains
The rapid growth of illicit supply chains during and after the Covid-19 pandemic reveals a need for effectively combating and preventing the cross-border movement of contraband, including but not limited to counterfeit goods. A proactive approach by companies along with public stakeholders, such as government agencies and individual consumers, toward disrupting illicit supply chains operating across borders is especially important during moments of global crisis when consumers are more susceptible to unknowingly purchasing substandard counterfeit products such as respirators. While marketplaces, platforms, and other legitimate businesses have worked to prevent movement of counterfeits and illicit goods through their services, the high adaptability and sophistication of counterfeiters requires more preventative and multistakeholder approaches. This article outlines a multidisciplinary and multilayered approach to detecting and disrupting illicit supply chains of counterfeit personal protective equipment (PPE) with a focus on respirators. It utilizes research conducted for a National Science Foundation (NSF) grant on Covid-19 related crime, including the advertising and sale of counterfeit respirators. One layer examines online content as seen by the end user and the activity of vendors or sellers used to advertise and sell counterfeit products. The research is also informed by data on the information, financial, and physical flows of counterfeit respirators obtained through a public-private partnership with George Mason University’s Terrorism, Transnational Crime and Corruption Center (TraCCC-GMU) and 3M, one of the largest manufacturers of respirators in the world. The article examines an important and relatively recent trend - how emerging technological shifts in the marketplace are affecting global security. Research from the TraCCC-GMU and 3M partnership, including a data sharing agreement, revealed that counterfeiters constantly change their modus operandi to continue selling illicit goods with impunity, facilitating illicit activity with the use and abuse of legitimate companies such as ecommerce marketplaces and social media. The article presents an overview of the current state of counterfeit supply chains and provides concrete policy recommendations on how legitimate companies can move beyond just removing listings but must also actively prevent these transnational crimes through innovative multidisciplinary approaches, advanced data analytics, and public awareness campaigns. The research also seeks to connect the dots to broader policy implications in terms of the legitimate economy and environmental sustainability.  more » « less
Award ID(s):
2039779
PAR ID:
10544218
Author(s) / Creator(s):
Publisher / Repository:
Journal of Science Policy & Governance
Date Published:
Journal Name:
Journal of Science Policy & Governance
Volume:
22
Issue:
03
ISSN:
2372-2193
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. B. Feng, G. Pedrielli (Ed.)
    Increased demand for medical supplies, and specifically respirators and face masks, during the Covid-19 pandemic along with the inability of legitimate suppliers to meet these needs created a window of opportunity for counterfeiters to capitalize on the supply chain disruptions caused by a global health crisis. Both legitimate and illicit businesses began shifting their scope from sectors such as textiles to producing and distributing personal protective equipment (PPE), many of which were counterfeit or unauthentic products and thus unable to properly protect users. To study cost-effective disruption strategies, this study proposes a simulation-optimization framework. The framework is used to model counterfeiters’ behavior and analyze the effectiveness of different disruption strategies for counterfeit PPE supply chains during the Covid-19 pandemic. 
    more » « less
  2. Agrawal, A. (Ed.)
    Wildlife trafficking, whether local or transnational in scope, undermines sustainable development efforts, degrades cultural resources, endangers species, erodes the local and global economy, and facilitates the spread of zoonotic diseases. Wildlife trafficking networks (WTNs) occupy a unique gray space in supply chains—straddling licit and illicit networks, supporting legitimate and criminal workforces, and often demonstrating high resilience in their sourcing flexibility and adaptability. Authorities in different sectors desire, but frequently lack knowledge about how to allocate resources to disrupt illicit wildlife supply networks and prevent negative collateral impacts. Novel conceptualizations and a deeper scientific understanding of WTN structures are needed to help unravel the dynamics of interaction between disruption and resilience while accommodating socioenvironmental context. We use the case of ploughshare tortoise trafficking to help illustrate the potential of key advancements in interdisciplinary thinking. Insights herein suggest a significant need and opportunity for scientists to generate new science-based recommendations for WTN-related data collection and analysis for supply chain visibility, shifts in illicit supply chain dominance, network resilience, or limits of the supplier base. 
    more » « less
  3. Abstract This article reviews extant multidisciplinary literature to uncover existing themes and directions in the knowledge of the overlap between natural resource scarcity and illicit supply chain activity. In doing so, the authors present a novel review of this nascent, complex, and multidisciplinary research area. This review has uncovered 127 articles that have not been synthesized or organized in a meaningful way with the supply chain literature. It extracts insights and develops a comprehensive process framework encompassing the following: (a) antecedents associated with natural resource extraction, which foments the opportunity for illicit activity to thrive; (b) resulting economic, social, and environmental outcomes from illicit activity as it relates to natural resource extraction; and (c) potential moderating processes, which either enable or inhibit illicit activity to occur, including firm‐level tactics that businesses can employ to counteract illicit activity throughout the supply chain and to promote sustainable long‐term operations. An extensive agenda is presented suggesting future research paths, methodologies, theories, and potential contributions. 
    more » « less
  4. This paper analyses several promising policies in the electronic parts industry for disrupting the flow of counterfeit electronic parts. A socio-technical electronic part supply-chain network model has been developed to facilitate policy analysis. The model is used to understand the technical and social dynamics associated with the insertion of counterfeit electronic components into critical systems (e.g., aerospace, transportation, defense, and infrastructure) and to analyze the impact of various anti-counterfeiting policies and practices. This network model is used to assess the effectiveness of mandatory original component manufacturer buyback programs and the debarment of distributors found to provide counterfeit components. In this agent-based model, each participant in the supply chain is modeled as an independent entity governed by its own motivations and constraints. The entities in the model include the original component manufacturers, distributors, system integrators, operators, and counterfeiters. Each of these entities has dynamic behaviors and connections to the other agents. Since time is an integral factor (lead times and inventory levels can be drivers behind the appearance of counterfeits), the simulation is dynamic. The model allows the prediction of the risk of counterfeits making it into an operator’s system and the length of time between relevant supply-chain events/disruptions and the appearance of counterfeits. 
    more » « less
  5. The trade in illicit items, such as counterfeits, not only leads to the loss of large sums of private and public revenue, but also poses a danger to individuals, undermines governments, and--in the most extreme cases--fi nances criminal organizations. It is estimated that in 2013 trade in illicit items accounted for 2.5% of the global commerce. To combat illicit trade, it is necessary to understand its illicit supply networks. Therefore, we present in this article an approach that is able to find an optimal description of an illicit supply network using a series of Variable State Resolution-Markov Chains. The new method is applied to a real-world dataset stemming from the Global Product Authentication Service of Micro Focus International. The results show how an illicit supply network might be analyzed with the help of this method. 
    more » « less