Skip to content

Pathways of Crime

How Bad Actors Exploit the Internet and Payment Ecosystems to Funnel Their Wares to Consumers

A collaboration between LegitScript and TraCCC,
The Terrorism, Transnational Crime, and Corruption Center



Watch now on-demand!


Like legitimate businesses, criminal operations employ sophisticated supply chain operations to get their goods into the hands of consumers. This can include sourcing of materials, manufacturing or authentication of goods, marketing to potential customers, processing payments, and shipping to buyers. Unlike legitimate businesses, however, illicit operations often employ subterfuge and illicit pathways to avoid scrutiny from law enforcement, internet platforms, and payments companies.

In this educational session, leading experts in counterfeit personal protective equipment, problematic pharmaceuticals, and stolen antiquities will share how illegitimate actors exploit legitimate business to reach consumers. You'll hear about both the similarities and differences in the supply chain management of various illicit operations, and learn how internet platforms and payments companies can better identify and disrupt these operations.


Duration: 1 hour

This course is approved for one hour of ETA Certified Payment Professional Continuing Education credit.



Session Speakers


Louise Shelley, PhD
Dr. Shelley's research examines the illicit trade in all forms of natural resources - fish, wildlife, timber, metals and other natural commodities. It studies the patterns of this trade as well as their impact on human and political security. Illicit trade was probably at the heart of the COVID-19 pandemic as illicit trade of animals in wet markets may have led to the initial transmission of the COVID-19 virus. Her book on illicit trade, Dark Commerce: How a New Illicit Economy Threatens Our Future, saw the great harm and threatening consequences that could result from diverse forms of illicit trade including natural resources. Her research focuses on how this illicit trade in natural resources is deeply tied to corruption.


Layla M. Hashemi, PhD
Dr. Hashemi is a researcher and data analyst at the Terrorism, Transnational Crime and Corruption Center (TraCCC) studying digital technology, internet policy and human rights. She has extensive experience of large scale data analytics of the open web, dark web and social media. Her current research uses both qualitative and quantitative methods to analyze illicit trade, corruption, gender, peace and security in the Middle East and North Africa (MENA). She seeks to use her research skills and knowledge of social media and data analytics to develop solutions to policy issues.


Daniel J. Rogers, PhD
Dr. Rogers is the co-founder and CTO of the Global Disinformation Index, a non-profit focused on catalyzing change within the tech industry to disincentivize the creation and dissemination of disinformation. Prior to founding the GDI, Danny founded and led Terbium Labs, an information security and dark web intelligence startup based in Baltimore, Maryland. He is a computational physicist with experience supporting Defense and Intelligence Community Cyber Operations, as well as startup experience in the defense, energy, and biotech sectors. Danny is an author and expert in the field of quantum cryptography and has published numerous patents and papers on that and other subjects.