1 Introduction

Illicit trade is defined as the trade in illegal goods and services that have a negative impact on our economies, societies, and environments [12]. Two of the most prevalent forms of illicit trade are counterfeiting and piracy, whose negative effects have been studied by both the OECD and the ICC. The former estimates that in 2013 counterfeiting and piracy accounted for \(2.5\%\) of all world imports [10], while the latter assesses that by 2022 counterfeiting and piracy will drain 4.2 trillion dollars from the world economy and put 5.4 million jobs at risk. Footnote 1 The consequences of illicit trade go beyond the loss of public and private revenue. Counterfeit medicines, for instance, have caused a large number of malaria and tuberculosis related deaths [6], while counterfeit cigarettes, cd’s, etc. have been linked to terrorist organizations [1]. These examples show the danger that illicit trade poses to our communities. Therefore, finding ways to combat this type of trade is of paramount importance.

A possibility for battling illicit trade is through the disruption of its illicit supply networks (ISNs). Different methods on how to achieve this disruption are found in literature. Many articles deal with technologies for distinguishing between licit and illicit goods, such as the works of Dégardin et al. [3], Simske et al. [15], and Meruga et al. [9]. More closely related to the present article are those in which the ISNs are investigated directly. Some examples of this type of articles are shown by Giommoni et al., [5], Magliocca et al. [7], and Triepels et al. [16]. In the first, network analysis of the heroin trafficking networks in Europe is conducted. In the second, a simulation of the response of drug traffickers to interdiction is presented. In the third, international shipping records are used to create Bayesian networks able to detect smuggling and miscoding.

The goal of this article is to identify the locations in which illicit activity is more prevalent. To achieve this goal, we make use of Markov Chains, as they are a type of model that is useful at determining the amount of time that a system (i.e. a supply network) spends on a given state (i.e. a location) [13]. The first step for creating a Markov Chain is to define what the states, or nodes, of the model will be. These states can be defined at different resolution levels, as shown for instance in [8]. In this article, the states represent possible geographic locations within a supply network; which in turn can be defined in terms of countries, regions, continents, etc. Unfortunately, the state description (i.e. the Markov Chain design) that is best at modeling a given system is not immediately clear. To address this issue, we present in this work a new method that optimizes—in terms of a user-defined cost function—the design of a Markov Chain. Notice that the models created via this new method are referred to as Variable State Resolution-Markov Chains (VSR-MCs) to denote the fact that their states are a combination of the various possible descriptions. Furthermore, a real world dataset containing spatio-temporal information of serial code authentications is used to show how the new approach can be used to analyze ISNs. This dataset stems from the Global Product Authentication Service of Micro Focus International. The VSR-MC obtained with this data is then used to compare a licit supply network to its illicit counterpart. The results of this comparison offer insight on the locations in which illicit activity is more prevalent.

The remainder of this article is organized as follows: Sect. 2 offers preliminary information on Markov Chains. Section 3 shows the new method. Section 4 describes this article’s experiment. Section 5 shows and discusses the obtained results and Sect. 6 contains the conclusion and outlook of this work.

2 Preliminaries

A Markov Chain can be defined as a discrete time random process \(\{X_{n}:n \in \mathbb {N}_{0}\}\) whose random variablesFootnote 2 only take values within a given state space, i.e. \(x_{n}\in S\) [2]. In this section, a state space—consisting of \(K \in \mathbb {N}_{>1}\) different states—is defined as \(S = \{s_{k}:k\in [1,K]\}\). In general, a Markov Chain can be viewed as a Markov Process with discrete time and state space.

The most important property of a Markov Chain is its lack of “memory”, i.e. the probability of an outcome at time \(n+1\) depends only on what happens at time n [11]. This is better described by the following equation:

$$\begin{aligned} \mathrm {P}(X_{n+1}| X_{n} = x_{n},\dots ,X_{1} = x_{1}) = \mathrm {P}(X_{n+1}|X_{n} = x_{n}). \end{aligned}$$
(1)

A Markov Chain is further characterized by its transition probability matrix \(\mathbf {P}_{n}\); a matrix defined as:

$$\begin{aligned} \mathbf {P}_{n} = \begin{bmatrix} p_{11} &{} \cdots &{} p_{1K} \\ \vdots &{} \ddots &{} \vdots \\ p_{K1} &{} \cdots &{} p_{KK} \end{bmatrix}_{n}, \end{aligned}$$
(2)

with the entries \(p_{ij,n}\) representing the probability of transitioning from state \(s_{i}\) to state \(s_{j}\) at time n, i.e. \(\mathrm {P}(X_{n+1} = s_{j}|X_{n} = s_{i})\). If the transition probabilities are independent of n (i.e. \(\mathbf {P}_{n} = \mathbf {P}\)), the Markov chain is called time homogeneous [11].

Additionally, the probabilities of \(X_{0}\) being equal to each one of the states can be written in vector form as follows:

$$\begin{aligned} \varvec{\pi }_{0} = [\mathrm {P}(X_{0}=s_{1}),\cdots ,\mathrm {P}(X_{0}=s_{K})]^{T} = [\pi _{01},\cdots ,\pi _{0K}]^{T}, \end{aligned}$$
(3)

where \(\varvec{\pi }_{0}\) is the start probability vector and \(\pi _{0k}\) is the probability of \(X_{0}\) being equal to \(s_{k}\).

Based on Eq. (1), (2), and (3), the probability of a sequence of events in a time homogeneous Markov Chain can be calculated as a multiplication of a start probability and the corresponding \(p_{ij}\) values [14]. For instance, the probability of the sequence \(\{X_{0} = s_{1}, X_{1} = s_{3},X_{2} = s_{2}\}\) is given as:

$$\begin{aligned} \mathrm {P}(X_{0} = s_{1},X_{1}=s_{3},X_{2}=s_{2}) = \pi _{01} \cdot p_{13} \cdot p_{32}. \end{aligned}$$
(4)

Interested readers are referred to [2] and [11] for more information on Markov Chains.

3 Variable State Resolution-Markov Chain

The method presented herein offers a novel alternative on how to optimize the design of a Variable State Resolution-Markov Chain (VSR-MC). The main difference between a traditional Markov Chain and a VSR-MC is the way in which the state space is defined. This difference stems from the fact that a state can be defined at different resolution scales, which are referred in this article as scales of connectivity. For example, a geographic location within a supply network can be described at a country or at a continent scale. Based on this idea, we define the state space of a VSR-MC as:

$$\begin{aligned} \begin{aligned} S&= \{\varPhi _{G}(s_{k}):k\in [1,K]\} \\&= \{s_{G,k'}:k'\in [1,K_{G}]\} \text { , with} \\ G&= \{g_{lr}: l\in [1,L],r\in [1,R_{l}] \}, \end{aligned} \end{aligned}$$
(5)

where \(s_{k}\) represents the states, G is a set containing the groups (i.e. \(g_{lr}\)) in which the states can be clustered, \(L \in \mathbb {N}_{>0}\) is the number of scales of connectivity, and \(R_{l} \in \mathbb {N}_{>1}\) is the number of groups within the \(l^{th}\) scale. Furthermore, \(\varPhi _{G}(s_{k})\) is a function that defines \(K_{G} \in \mathbb {N}_{>1}\) new states, which are referred to as \(s_{G,k'}\). In other words, \(\varPhi _{G}(s_{k})\) is defined as follows:

$$\begin{aligned} \varPhi _{G}(s_{k}) = {\left\{ \begin{array}{ll} s_{k} &{} \text {, if } s_{k} \notin G \\ g_{lr}: s_{k}\in g_{lr} &{} \text {, else }. \end{array}\right. } \end{aligned}$$
(6)

When defining G, it is important to consider that each \(s_{k}\) can only be contained in either one or none of the groups within the set. For the sake of illustration, Fig. 1 shows an example of possible high resolution states and their corresponding groups at different scales of connectivity.

Fig. 1.
figure 1

Example of various states and their corresponding groups

Based on all previous aspects, it is clear that we can create different Markov Chains based on the combination of different states and groups. For instance, consider a case in which four states (i.e. \(s_{1}\), \(s_{2}\), \(s_{3}\), and \(s_{4}\)) can be aggregated in two groups (i.e. \(g_{11} = \{s_{1}, s_{2}\}\) and \(g_{12} = \{s_{3}, s_{4}\}\)). As shown in Table 1, the possible combinations result in four VSR-MCs with different scales of connectivity.

Table 1. Possible state spaces of the Variable State Resolution-Markov Chains with four states \(s_{1}\), \(s_{2}\), \(s_{3}\), and \(s_{4}\), one scale of connectivity, and two groups \(g_{11} = \{s_{1}, s_{2}\}\) and \(g_{12} = \{s_{3}, s_{4}\}\). As given by Eq. (7), the number of possible group sets equals four.

In general, the number of combinations (i.e. group sets G) that can be obtained with L scales of connectivity is given by the next equation:

$$\begin{aligned} N_{\mathrm {c}} = 1 + \sum _{l=1}^{L} (l+1)^{R_{l}} - l^{R_{l}}, \end{aligned}$$
(7)

where \(N_{\mathrm {c}}\) is the number of all possible combinations and \(R_{l}\) is again the number of groups within each scale.

After defining the group sets G, the probabilities of the group set-dependent transition matrices (\(\mathbf {P}_{G}\)) and start probability vectors (\(\varvec{\pi }_{G,0}\)) are calculated. These probabilities are obtained using a dataset containing N sequences of events of the system we want to model. In this article the sequences are described as:

$$\begin{aligned} \mathbf {x}_{m} = \{x_{mn} : n\in [0,N_{m}]\}, \end{aligned}$$
(8)

in which \(\mathbf {x}_{m}\) is the \(m^{th}\) sequence within the dataset, \(N_{m} \in \mathbb {N}_{>0} \) is a value that defines the sequence length, and \(x_{mn}\) is one of the realizations forming the sequence.

As mentioned at the beginning, the main goal is to find the scale of connectivity that will optimize the Markov chain architecture. In other words, we are interested in finding the VSR-MC that minimizes a problem-specific cost function \(c(\cdot )\). This optimization problem can be described in general as:

$$\begin{aligned} G_{\mathrm {opt}} = \underset{G}{{\text {argmin}}}~c(G,S,\mathbf {P}_{G},\varvec{\pi }_{G,0},\cdots ), \end{aligned}$$
(9)

where \(G_{\mathrm {opt}}\) represents the optimal group set.

4 Experimental Study

4.1 Data

The dataset used comes from the Global Product Authentication Service (GPAS) of Micro Focus International. GPAS protects products in the marketplace by embedding a URL and unique serial number into a QR code placed on each product. The consumer is encouraged to scan the QR code which can authenticate their purchase in real-time. This dataset contains therefore spatio-temporal information of licit and illicit activity. To be more specific, it contains the authentication results (i.e. “True” or “False”) of 1,725,075 unique serial codes.Footnote 3 In addition to the authentication, the dataset contains the geographic position (i.e. latitude and longitude) and the time at which each serial code was authenticated. Since many codes have been authenticated several times at different times and places, we assume that a reconstruction of the supply network is possible.

In the present article, we are interested in analyzing licit and illicit serial codes that are authenticated a similar number of times at different geographic locations. Henceforth, the data is preprocessed as follows. First, all entries with missing geographic information, as well as all serial codes that do not change their position are removed from the dataset (i.e. 1,659,726). Afterwards, codes whose authentication result is sometimes “True” and sometimes “False” are also eliminated (i.e. 5,453). Note that the serial codes that have been removed are still of interest, as they can be used in the future for other type of analysis. For instance, serial codes that do not change position could be used to identify hot spots of serial code harvesting, while serial codes that change their authentication can be used to analyze locations in which the original licit codes might have been copied. As mentioned earlier, the serial codes we are considering here are the ones authenticated at different locations. We do this because we are interested in discovering the network architecture, and by inference the distribution channels, of the illicit actors. Finally, serial codes authenticated first and last at the exact same position, as well as those authenticated in more geographic positions than \(99\%\) of all serial codes are deleted (i.e. 3,897). The goals of this final step are the removal of serial codes that are suspect of being demos and the elimination of copied serial codes authenticated a huge number of times (i.e. with a clearly different behavior than licit serial codes).

The resulting dataset contains 55,999 unique serial codes, of which 31,989 are authenticated as “True”, while 24,010 are authenticated as “False”.

4.2 Description

The goal of this experiment is to find a VSR-MC able to accurately describe a licit and an illicit supply network. To do so, we create a series of Markov Chains with computed probabilities of state-state transitions for both licit and illicit serial codes. Then, we select the one that is best at classifying illicit activity as the one with the optimal scale of connectivity. To solve this classification problem and to obtain representative results, we create three different training/test set pairs, by randomly selecting—three separate times—50% of the unique serial codes as training set and the rest as test set.

We begin the experiment by defining three different ways in which the location of a serial code can be described, i.e. country, region, or continent. These descriptions are the scales of connectivity of the VSR-MC we are looking to create. Using the given geographic positions, we can easily determine the countries and continents where the serial codes were authenticated. The regions, in contrast, are calculated using a clustering algorithm, i.e. the affinity propagation algorithm [4]. This algorithm clusters the countries of a specific continent based on a similarity measure. The similarity measure we use here is the geographic proximity between the countries’ centroids. For the sake of illustration, Table 2 shows the three scales of connectivity used in this article.

Table 2. Scales of connectivity

As Eq. (7) shows, the regional and continental descriptions can be used to create a staggering number of possible combinations; whose individual testing would be computationally infeasible. For this reason, the next paragraphs describe a two step alternative to deal with this issue.

Step 1: We begin by finding an optimal VSR-MC using only the regions and continents. In other words, we define the regions as the Markov states \(s_{k}\) and the continents as the groups at the first—and only—scale of connectivity, i.e. \(g_{1r} \in \{\text {Africa},\) \(\text {Asia},\) \(\text {North America},\) \(\text {South America},\) \(\text {Oceania}\}\). Using these groups and Eq. (5), we define a total of 64 different state spaces S.

Afterwards, we calculate for each state space and each available training set the probabilities that are necessary to construct a Markov Chain. To be more specific, for each state space two start probability vectors and two transition probability matrices are calculated, for licit and illicit serial codes, respectively. These probabilities are based on the trajectories that are described herein as a sequence of geographic positions in which a serial code has been authenticated. Based on Eq. (8), the trajectories can be described as:

$$\begin{aligned} \mathbf {x}^{\alpha }_{m} = \{x^{\alpha }_{mn} : n\in [0,N_{m}]\}: \alpha = \{\mathrm {licit},\mathrm {illicit}\}, \end{aligned}$$
(10)

where \(\alpha \) indicates if the trajectory corresponds to a licit or an illicit serial code.

Notice that we assume the Markov Chains to be homogeneous. Therefore, all sequences within the training sets that have an \(N_{m} > 1\) are divided in \(N_{m}\) sequences of two realizations each. With these new set of sequences as well as Eq. (5), the start probabilities can be calculated:

$$\begin{aligned} \pi ^{\alpha }_{G,0i} = \dfrac{1}{M^{\alpha }} \sum _{m=1}^{M^{\alpha }} I(x^{\alpha }_{m0} = s_{G,i}) : \alpha = \{\mathrm {licit},\mathrm {illicit}\},~i\in [1,K_{G}], \end{aligned}$$
(11)

where \(\pi ^{\alpha }_{G,0i}\) is the probability of a sequence starting at state \(s_{G,i}\), \(M^{\alpha }\) represents the number of available sequences (licit or illicit), and \(I(\cdot )\) is a function that equals one if its condition is fulfilled and equals zero otherwise. Thereafter, the elements of the transition matrices can be obtained using Bayes’s rule:

$$\begin{aligned} \begin{aligned} p^{\alpha }_{G,ij} =&\dfrac{1}{M^{\alpha } \pi ^{\alpha }_{G,0i}} \sum _{m=1}^{M^{\alpha }} I(x^{\alpha }_{m0} = s_{G,i}\cap x^{\alpha }_{m1} = s_{G,j}) \\&: \alpha = \{\mathrm {licit},\mathrm {illicit}\},~i,j\in [1,K_{G}], \end{aligned} \end{aligned}$$
(12)

with \(p^{\alpha }_{G,ij}\) being the probability of transitioning from state \(s_{G,i}\) to \(s_{G,j}\).

So, using the previous values we can determine—in every state space—the probability of a serial code sequence if we assume it to be licit or illicit, i.e. \(\mathrm {P}_{G}(\mathbf {x}_{m}|\alpha ) : \alpha = \{\mathrm {licit},\mathrm {illicit}\}\). Thereafter, we can use the resulting probabilities to classify a serial code as illicit if \(\mathrm {P}_{G}(\mathbf {x}_{m}|\mathrm {illicit}) \ge \mathrm {P}_{G}(\mathbf {x}_{m}|\mathrm {licit})\).

The method described previously is used to classify all codes within the test sets. Afterwards, the classification results are evaluated using the weighted F-Score, i.e.:

$$\begin{aligned} F_{\beta ,G} = (1+\beta ^{2})~\dfrac{Q_{\mathrm {p},G}~Q_{\mathrm {r},G}}{\beta ^{2}~Q_{\mathrm {p},G} + Q_{\mathrm {r},G}}, \end{aligned}$$
(13)

where \(Q_{\mathrm {p},G}\) represents the precision, \(Q_{\mathrm {r},G}\) is the recall, and \(\beta \) is a parameter that defines which of the former values is weighted more strongly. The value of \(\beta \) is set equal to 0.5 to give precision two times more importance than recall. This is done, since we are more interested in correctly identifying illicit serial codes (precision) than we are in flagging every possible one (recall).

After finishing the evaluation on each test set, the mean value and variance of the weighted F-Score are calculated, i.e. \(\overline{F}_{\beta ,G}\) and \(\sigma ^{2}_{\beta ,G}\), respectively. With these values, the optimization problem described in Eq. (9) can be redefined as:

$$\begin{aligned} G_{\mathrm {opt}} = \underset{G}{{\text {argmin}}}~\gamma ~(1-\overline{F}_{\beta ,G}) + (1-\gamma )~\sigma ^{2}_{\beta ,G} : \gamma \in [0,1]. \end{aligned}$$
(14)

Notice that in this article the parameter \(\gamma \) is set equal to 0.5 to give both terms of the cost function an equal weight and to make the cost function less sensitive to noise. Solving Eq. (14) results in an optimal VSR-MC whose state space S (defined by \(G_{\mathrm {opt}}\)) might be a combination of regions and continents.

Step 2: If the number of regions within the state space S is greater than zero, we can conduct an additional experiment to test if a country level description of the regions improves our modeling of the supply network. Note that our experiment uses a forward selection to reduce the number of combinations that need to be tested. We first create new state spaces by individually separating the regions within S into their corresponding countries. For instance, if S contains 6 regions we obtain 6 new state spaces. Afterwards, we test if some of these new state spaces result in a Markov Chain with a cost (cf. Eq (14)) that is lower than the one currently consider optimal. If so, we define the VSR-MC with the lowest cost as the new optimal one and its state space as the new optimal state space S. Afterwards, we repeat the previous steps again until none of the new Markov Chains result in a better cost or until there are no more regions within the state space. The result of this process is a VSR-MC with states that could stem from all of our available scales of connectivity (i.e. countries, regions, and continents). For the sake of simplicity, we will refer to the group set that maps the individual countries to the state space of this new optimal VSR-MC also as \(G_{\mathrm {opt}}\). It is worth noting, that since we are not testing all possible state spaces, the solution of our method may not be the global optimum. Nevertheless, we still consider our approach of dividing one region at a time to be acceptable. There are two main reasons for this: (i) we are able to improve the overall cost function testing only a small subset of all combinations; and (ii) we are able to increase the resolution of our network description, something that may improve our understanding of how the network operates.

After finding the best VSR-MC, we use all available data to recalculate the probabilities of the transition matrices to analyze the differences between the licit and the illicit supply networks with more detail. The analysis consists in calculating the limiting distributions of the licit and illicit transition matrices. These describe the probabilities of authenticating the serial codes at the different locations if we observe our system (i.e. the supply network) over a long period of time. In other words, these values can be interpreted as estimates of the amount of time that licit or illicit serial codes will spend on the different locations. Therefore, a comparison of licit and illicit limiting distributions will allow us to estimate the locations where we expect illicit serial codes to spend more time. The comparison is based on a relative difference that is defined in this article as:

$$\begin{aligned} \varDelta \pi '_{s_{G_{\mathrm {opt}},i}} = \dfrac{\pi ^{\mathrm {licit}}_{s_{G_{\mathrm {opt}},i}}-\pi ^{\mathrm {illicit}}_{s_{G_{\mathrm {opt}},i}}}{\pi ^{\mathrm {licit}}_{s_{G_{\mathrm {opt}},i}}}, \end{aligned}$$
(15)

where \(\pi ^{\mathrm {licit}}_{s_{G_{\mathrm {opt}},i}}\) is the licit limiting distribution value of \(s_{G_{\mathrm {opt}},i}\), \(\pi ^{\mathrm {illicit}}_{s_{G_{\mathrm {opt}},i}}\) represents the illicit limiting distribution value of \(s_{G_{\mathrm {opt}},i}\), and \(\varDelta \pi '_{s_{G_{\mathrm {opt}},i}}\) is the relative difference for state \(s_{G_{\mathrm {opt}},i}\).

After estimating the relative differences, we can test the difference between our approach and a simple descriptive analysis. This test consists in comparing the \(\varDelta \pi '_{s_{G_{\mathrm {opt}},i}}\) values to benchmark relative differences (BRDs) calculated using descriptive statistics. To be more specific, the BRDs are also obtained with Eq. (15), but instead of using the limiting distribution values, we use the actual percentage of true and false authentications on the given states.

5 Results and Discussion

The results obtained on the three separate test sets by the VSR-MCs with only regions and continents as scales of connectivity (cf. Sect. 4.2; Step 1) are depicted in Fig. 2.

Fig. 2.
figure 2

Group set-dependent mean values and standard deviations of the precision, recall, and weighted F-score (cf. Eq. (13)) obtained on the three separate test sets

The first thing we notice when looking at Fig. 2 is that the standard deviations are relatively small. This not only means that the results on all test sets are similar, but also that our mean estimates are quite accurate, as the standard error of the mean is directly proportional to the standard deviation. In addition, Fig. 2 also shows that the precision does not appear to change when modifying the state space; as it is consistently around 90%. In contrast, the use of different group sets divides the recall in two distinct groups with different recall values; the first between 60 and 70% and the second between 80 and 90%. The decrease in recall is caused by considering Asia as a continent instead of looking at its individual regions. In other words, individual networks between Asian regions seem to play an important role in the accurate modeling of licit and illicit supply networks. Due to the recall, the weighted F-Score is also dependent on Asia being modeled as a single state or as individual regions. This result, i.e. that the scale of connectivity affects the quality of the supply network models, supports the use of this article’s method (cf. Sect. 3). Therefore, we use Eq. (14) and the obtained weighted F-Scores to determine the scale of connectivity that will best describe the licit and illicit supply networks.

According to Eq. (14), the optimal VSR-MC is the one with states representing the continents of Africa, Europe, North America, South America, and Oceania, as well as the individual regions of Asia, i.e. \(G_{\mathrm {opt}} = \{\text {Africa},\) \(\text {Europe},\) \(\text {North America},\) \(\text {South America},\) \(\text {Oceania}\}\). This result shows again the importance that Asia appears to play in the accurate modeling of the supply networks.

After finding the best VSR-MC, we can identify the regions that, when divided, improve our model (cf. Sect. 4.2; Step 2). Our method concludes that our description of the licit and illicit supply networks improve if we consider five of the eight Asian regions (i.e. Asia 1, Asia 5, Asia 6, Asia 7, and Asia 8) as individual countries. Therefore, we redefine the optimal group set as \(G_{\mathrm {opt}} = \{\text {Asia 2},\) \(\text {Asia 3},\) \(\text {Asia 4},\) \(\text {Africa},\) \(\text {Europe},\) \(\text {North America},\) \(\text {South America},\) \(\text {Oceania}\}\). This group set defines a new VSR-MC with a state space that combines the three scales of connectivity we considered in this article. Lastly, it is important to mention, that the cost of this new optimal VSR-MC (i.e. 0.047) is not only lower than the one obtained when Asia is divided purely into regions (i.e. 0.054), but also than the one obtained when Asia is divided purely into countries (i.e. 0.048).

Once the optimal scale of connectivity, given any limitations of our process, has been found, we recalculate the Markov Chain probabilities with all available data and use Eq. (15) to identify the states in which illicit serial codes are more prevalent. It is important to mention that having some of the countries as states results in the transition matrices having absorbing states; a type of state that complicates the calculation of the limiting distributions. Therefore to calculate the limiting distributions, we first group those countries with the “less absorbing” countries within their region. In this context, “less absorbing” refers to countries whose rows in their transition matrices have the least number of zeros when compared to all other countries within their region.

The relative differences \(\varDelta \pi '_{s_{G_{\mathrm {opt}},i}}\) (cf. Eq. (15)), the number of times a serial code is authenticated, and the benchmark relative differences (BRDs) are all contained in Table 3.

Table 3. Number of authentications, relative limiting distribution difference \(\varDelta \pi '_{s_{G_{\mathrm {opt}},i}}\), and benchmark relative difference (BRDs) of the states forming the optimal Variable State Resolution-Markov Chain; the absorbing states and their realization are shown in parentheses next to the name and realizations of their corresponding “less absorbing” countries

When looking at Table 3, we notice a state with a relative difference of minus infinity (i.e. Mongolia) and another with a relative difference of one (i.e. Tajikistan). This means that in those locations only illicit or only licit serial codes were authenticated. Even though these types of results might be interesting, they will not be investigated further, as the number of authentications in those locations is extremely low.

Table 3 also shows that the countries that would have formed absorbing states are locations in which serial codes are authenticated a small number of times, specially compared to the number of authentications within the “less absorbing” countries they are grouped with (i.e. India, Malaysia, Pakistan, and Turkey). Henceforth, we can safely assume that the “less absorbing” countries are the ones responsible for the relative differences obtained. Furthermore, the results in Table 3 show that there are several states in which illicit serial codes appear to spend more time than licit ones. These states are the ones with a negative relative difference (cf. Eq. (15)) and are further referred to as “critical” states. The fact that most of these critical states are countries within the regions selected by our forward selection algorithm (cf. Sect. 4.2; Step 2), speaks in favor of our approach.

As Table 3 shows, Turkey is the most “critical” state, as its relative difference estimates that illicit serial codes will spend close to \(1200\%\) more time there than their licit counterparts. This is an extreme result that needs to be investigated further, for instance by identifying the reasons behind this outcome and/or by finding out if Turkey is again a critical state when looking at illicit activities, such as serial code harvesting. The critical states with the next three lowest relative differences are Georgia, Singapore, and Syria. There the limiting distribution values of an illicit serial code are between 200 and \(300\%\) higher than those of a licit one. However, we can also observe that the number of authentications occurring on those locations is quite low in comparison to other places. Henceforth, a further investigation of those locations may not be of extreme importance. In addition to the results mentioned above, there are several “critical” states with relative difference that can still be considered high, i.e. between 20 and 50%. Within these states, Europe and China are the ones with a considerably larger amount of authentications. Therefore, a more in depth study of these two locations could be interesting for future related works.

It is also important to mention that a state having a relative difference close to zero does not mean that it is free of illicit activity. For instance, Sri Lanka, North America, and South America have relative differences of just −0.07, −0.01, and 0, respectively, meaning that their limiting distribution values for licit and illicit serial codes are almost the same. In other words, states whose relative differences are close to zero may have a similar rate of licit and illicit activity and thus should be investigated further.

Lastly, we observe that some relative difference values vary significantly or do not agree to those calculated using simple descriptive statistics (i.e. the BRDs). For example, though China has the relative difference of a so-called “critical” state, its BRD is clearly above zero. Similarly, North and South America have BRDs that indicate more licit than illicit authentications, while their relative differences estimate instead similar rates. Note that though we are aware about the interesting results obtained for Bhutan (its BRD and its relative difference are complete opposites), no further investigation and analysis were conducted given its relatively small number of authentications. In general, the results obtained in this work demonstrate that modeling the spatio-temporal information of a supply network (as we do with our approach) leads to conclusions that are different from those obtained through a simple descriptive analysis. Furthermore, since our method models the behavior of the illicit supply network as a whole, we can argue that it is better suited at combating illicit trade than a descriptive analysis.

6 Conclusion and Outlook

This article presents a new approach for describing illicit supply networks based on Variable State Resolution-Markov Chain (VSR-MC) models. These type of models stem from the idea that a location within a supply network can be described at different scales of connectivity (e.g., countries, regions, continents).

The new method described herein is divided in two main steps. The first step creates a series of VSR-MCs that describe the same network using different state spaces, while the second uses a user-defined cost function to select the VSR-MC that best describes the network. The new method is applied to a dataset containing spatio-temporal information of licit and illicit activity. This dataset comes from the Global Product Authentication Service of Micro Focus International and contains information of the time and place in which licit and illicit serial codes have been authenticated. Applying our new method to this dataset results in Markov Chain models of the licit and illicit supply networks. The comparison of both networks enables us to ascertain the geographic locations in which illicit serial codes are expected to spend more time than their licit counterparts.

Even though this article shows a promising approach for analyzing illicit supply networks, there are still a number of aspects that have to be studied in future related works. For instance, in this article all scales of connectivity stem from grouping the countries based on their geographic proximity. Therefore, future works should investigate if better descriptions of the illicit supply networks can be obtained by clustering the countries based on other measures of similarity; such as, their number of free trade agreements, their culture, or their language. Such a study will allow us to better identify the aspects that drive illicit supply networks. Additionally, we should also use the method described herein to compare networks stemming from different forms of illicit trade, such as counterfeiting, serial code harvesting, and human trafficking. A comparison like this will enable us to identify both similarities and differences between different types of illicit trade. Moreover, future works should also investigate the use of \(n^{th}\) order and non-homogeneous Markov Chains. Finally, we must compare our method to other approaches to better understand its advantages and limitations.