Figures
Abstract
The illegal movement of wildlife poses a public health, conservation and biosecurity threat, however there are currently minimal screening tools available at international ports of entry to intercept wildlife trafficking efforts. This review first aimed to explore the screening tools available or under development for the detection of concealed wildlife contraband at international ports, including postal services, airlines, road border crossings and maritime routes. Where evidence was deficient, publications detailing the use of methods to uncover other illicit substances, such as narcotics, weapons, human trafficking, explosives, radioactive materials, or special nuclear material, were compiled and assessed for their applicability to the detection of wildlife. The first search identified only four citations related to the detection of wildlife, however the secondary search revealed 145 publications, including 59 journal articles and 86 conference proceedings, describing screening tools for non-wildlife illicit contraband detection. The screening tools uncovered were analysed for potential fitness for purpose for wildlife contraband detection, to evaluate the feasibility of their implementation and their ease of use. The deficiencies evident in terms of resource availability and research efforts targeting wildlife trafficking highlights a potentially substantial national and international security threat which must be addressed.
Citation: Moloney GK, Chaber A-L (2024) Where are you hiding the pangolins? screening tools to detect illicit contraband at international borders and their adaptability for illegal wildlife trafficking. PLoS ONE 19(4): e0299152. https://doi.org/10.1371/journal.pone.0299152
Editor: Tommaso Lomonaco, University of Pisa, ITALY
Received: July 26, 2023; Accepted: February 5, 2024; Published: April 3, 2024
Copyright: © 2024 Moloney, Chaber. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper and its Supporting Information files.
Funding: This review was sponsored by World Wildlife Fund (WWF) France. Georgia Moloney received funding from the Australian Government Research Training Program Scholarship and the CMA CGM SA Supplementary Scholarship. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
Introduction
Illegal wildlife trafficking is one of the greatest threats to international security and biosecurity, with estimates evaluating a trillion-dollar economic loss associated with the impact on biodiversity, ecosystem disruption and public health [1]. Wildlife is trafficked via various routes including postal services, airlines, road border crossings and maritime routes. Each year, over 159 billion packages, 22 million passenger flights and 800 million twenty-foot equivalent units (TEUs) of cargo containers are in transit worldwide, providing a multitude of opportunities for traffickers to smuggle wildlife products [2–4]. Many screening tools have been developed for the detection of other illicit contraband transiting via these international routes, however there are significant shortcomings in the development or adaptation of tools for wildlife detection. Current limitations opposing adequate regulation include a lack of resources, funding and acknowledgement of the impact and consequences of the illegal wildlife trade.
The USAID Reducing Opportunities for Unlawful Transport of Endangered Species (ROUTES) Partnership was implemented between 2015 and 2021 to disrupt wildlife trafficking activities, with a particular focus on strengthening air transport routes. This initiative brought together transport and logistics companies, government agencies, development groups, law enforcement, conservation organizations, academia and donors, with a focus on improving data analytics, engaging corporate leadership, improving staff training to assist law enforcement, strengthening policies and protocols, and increasing collaboration between the transport sector and law enforcement [5]. Similarly, in 2022 the International Maritime Organization ‘guidelines for the prevention and suppression of the smuggling of wildlife on ships engaged in international maritime traffic’ were published to complement recommendations previously provided by relevant organisations to assist with reducing wildlife trafficking through the maritime sector [6]. These initiatives highlight the newfound acknowledgement of wildlife trafficking and the need for a multisectoral, collaborative approach. One of the deficiencies identified by these initiatives was the lack of screening tools available, but also a desire to improve these capabilities across sectors as the impacts of the illegal wildlife trade are recognised.
Wildlife trafficking is an all-encompassing term for the illegal movement of wild flora and fauna which can take many forms. Animals can be traded live or are poached for various parts including their bones, scales, meat, horns, skin, teeth, bile and blood. The raw materials themselves can be altered into powders, liquids, or other forms. These products are used for a wide range of applications including traditional medicines, clothing and accessories, while some also carry cultural or spiritual significance [7,8]. Plants and their derivatives including timber, seeds, orchids, oils, succulents and other products are also traded, wherein certain species are highly valued for their cultural, medicinal, or ornamental properties [9]. Due to this endless catalogue of products, there is a need for different screening tools to uncover these commodities based on their inherent properties.
With enhanced accessibility to the sale of wildlife products and an increasingly interconnected society, additional safeguards must be implemented. Without the installation of efficient screening tools at international ports, wildlife traffickers will continue to evade authorities with potentially devastating consequences. Therefore, we aimed to investigate the scientific literature for tools and technologies which are currently available for the detection of illegally trafficked wildlife contraband at international ports, including postal services, airports, vehicle border checkpoints and shipping ports. Where no publications are available, literature describing tools either developed or investigated for the detection of other illicit contraband will be screened and the potential for adaptation to the detection of wildlife will be assessed. We aim to provide a practical guide for law enforcement agencies (LEA) to strengthen their knowledge and capabilities and to raise awareness for the significance of the illegal wildlife trade.
Methods
Data sources and search strategy
The scoping review was conducted in accordance with the Joanna Briggs Institute methodology for scoping reviews [10] and Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews Checklist [11] to ensure a thorough and well-informed analysis of the available literature. A preliminary search of review databases was conducted and the authors identified no current or underway scoping or systematic reviews summarising wildlife detection tools. The following questions were used to guide this review: (i) What tools (physical screening tools only) are currently being implemented to detect illegal wildlife products at airports, vehicle border checkpoints, shipping ports and postal facilities and how effective are these methods? (ii) What additional tools exist to enable the detection of other illicit contraband at ports of entry? (iii) How can these techniques be applied to wildlife contraband detection? The search strategy aimed to uncover primary scientific reports, reviews and conference proceedings published between 1990 and 2023. The initial literature search was conducted between 28 February and 8 March 2022 across four databases including PubMed, CAB Abstracts, Web of Science and Google Scholar. An additional literature search was conducted in IEEE Xplore and Scopus on 4 April 2023. The protocol adapted for this review to screen articles consisted of three levels: (1) screening based on title and abstract, (2) screening of the full article, and (3) data extraction from selected articles.
Current tools for wildlife trafficking detection
Published literature was first assessed for evidence of detection tools specifically being investigated or implemented to combat wildlife trafficking. Combinations of key terms relevant to the review aims were trialled, consisting of ‘illegal wildlife trade’ synonyms paired with detection methods and/or known modes of transport. The full search strategy is outlined in the Supporting Information (S1 Table). Only articles referring directly to a method of detection and containing a combination of select search terms in the title, abstract or key words were considered for analysis. Meanwhile, articles wherein the full text was inaccessible, or which referred to the identification of a sample which had already been seized (as opposed to the initial detection of the product) were excluded. For databases which generated thousands of results, the a priori decision was made to only screen the first 200 articles. While this approach was elected to expedite the initial screening process, we acknowledge that it may have potential consequences for our empirical results, but believe this to be balanced by our subsequent rigorous screening and selection processes. Only four articles detailing wildlife detection methods were uncovered [12–15]. The reference lists of these papers were screened for additional resources but generated no suitable articles. Whilst limited papers were discovered through the search strategy employed, the authors are aware of other technologies being trialled for wildlife detection, such as environmental DNA (eDNA) [16–18], however they are either not currently used or evaluated in the context of wildlife contraband screening.
Current tools for other illicit contraband detection
Due to the substantial lack of literature pertaining to the detection of illegal wildlife products, published literature detailing screening tools and technologies for other illicit contraband were explored. A preliminary search of the internet and grey literature was conducted for key terms to guide the database search term generation. The database search centred around major international crimes including the transport of illegal narcotics, weapons and human trafficking, with the addition of detection methods and transport routes. The full search strategy is provided in the Supporting Information (S2 Table). Citations were imported into EndNote 20 (v20.2.1) [19] and duplicates were removed. Titles and abstracts were screened by the reviewers for assessment against the review inclusion criteria. Articles were included if they detailed a detection method used to uncover illicit contraband such as narcotics, weapons, human trafficking, explosives, radioactive materials or special nuclear material. Potentially relevant sources and their citation details were retrieved in full for further analysis. Sources were excluded at this stage if the full text was inaccessible, or if they described the identification of a type of contraband (i.e. after it has been detected) as opposed to screening for the unknown presence of the product. Reasons for exclusion of sources which did not meet the inclusion criteria have been reported. For example, cases uncovering ‘body packers’ (i.e. persons who have swallowed containers of narcotics or other illicit substances to conceal them) or ‘body pushers’ (i.e. persons who conceal containers of illicit substances in their vagina or rectum) were excluded as these techniques were not considered relevant to wildlife trafficking [20]. The reference list of all included articles were also scrutinised for additional references detailing novel screening methods or applications. Metadata was extracted and collated from selected articles (Supplementary Information). The overall search and inclusion process is presented in Fig 1.
Preferred Reporting Items for Systematic Reviews and Meta-analyses extension for scoping review (PRISMA-ScR) flowchart illustrating the search strategy and screening process for articles published between 1990 and 2023. The search criteria identified 2,587 articles, which were then refined as per the process described in the flowchart to produce 145 English language full-text articles for analysis. A further fifteen references describing novel techniques or applications derived from reference lists (snowballing) were also included.
Results
A total of 145 articles were included in the study consisting of 59 peer-reviewed scientific articles and 86 conference proceedings. Of the published articles, 39% were conducted in or sponsored by the United States of America (23/59), followed by 19% in the Netherlands (11/59) and 15% in the United Kingdom (9/59). Meanwhile, 55% of the conferences occurred in the United States of America (47/86), followed by 26% in Europe (22/86) and 17% in Asia (15/86).
We identified 59 different inspection systems or system variations (including artificial intelligence (AI)) and categorised them for ease of reader comprehension across six categories based on their mode of action or required sample type: ionising radiation, photon/neutron interrogation, nuclear, non-ionising radiation, trace detection and acoustic (S3–S8 Tables). Detection methods were applicable for a wide variety of contraband including narcotics and other drugs (such as cigarettes), weapons, human trafficking, nuclear waste, special nuclear material, explosives, chemical warfare agents, organic and inorganic materials, radiological material and other hazardous substances. The relative proportion of the literature associated with each category is represented in Fig 2.
The proportion of literature cited describing detection tools within each of the six categories based on their mode of action or required sample type.
1. Ionising radiation
Techniques utilising ionising radiation are the most widely used for contraband detection, with 31 papers describing 11 different ionising radiation tools (including AI enhancements) currently in use (S3 Table). The techniques described enable material discrimination and determination of the internal properties and contents of objects, including shape, density, location, relative atomic number and effective nuclear charge (Zeff). Ionising radiation scanning systems are non-invasive, versatile and have been deployed in various environments. One of the main disadvantages with these systems however is the health and safety concerns for personnel, as ionising radiation leads to the formation of oxygen-derived free radicals which damage cellular DNA [21]. Radiation sources are controlled worldwide by International Atomic Energy Agency safety standards, under which all radiation sources must be registered and companies and users are required to hold a license [22]. The two main ionising radiation systems described were x-ray radiography (including single view, dual angle and backscatter variations) and computed tomography (CT), meanwhile gamma radiation or passive radiation detection may be employed in specific circumstances to identify the elemental composition of materials. In addition, there were five different AI programs described to enhance digital imaging processing techniques, including automatic image recognition to assist in the identification of weapons, explosives and other dangerous goods for x-ray images of luggage or cargo [23–33]. AI has been described as a powerful addition to these systems for enhanced efficiency and adaptability to other types of contraband.
2. Photon and neutron interrogation techniques
Photon and neutron interrogation techniques exploited in 11 tools were described in 25 papers and rely on the determination of the elemental composition or ratio of interrogated materials to support contraband identification (S4 Table). Ionising radiation is used in these methods, where most employ pulsed or fast, thermal or non-thermal, neutrons or photons [34–41]. Fast neutron and high-energy gamma-ray scanners have been explored in combination with x-ray radiography to enable the determination of compositional information and discrimination between a wide range of organic materials. The combination of these techniques enables the detection of narcotics, chemical, biological, radiological, nuclear and explosive (CBRN&E) materials [42]. While organic materials may be detectable through these methods, their properties are largely not conducive to detecting wildlife products and thus they are unlikely to be useful for this application, hence they will not be discussed in further detail.
3. Nuclear material detection systems
A total of 21 papers describing eight different nuclear-based detection systems were included in this review (S5 Table). Nuclear-based methods compare elemental information for material detection, such as nitrogen content for explosives [43]. Some techniques derive both images and elemental information based on the irradiation of an object with thermalised neutrons and sensitive detection of the associated/scattered gamma-rays produced for the detection of special nuclear material, narcotics and explosives concealed in cargo or luggage [44,45]. However, as there are no known examples of these technologies being used to detect wildlife or similar contraband, they are unlikely to be useful for this application, hence will not be discussed in further detail in this report.
4. Non-ionising radiation
Non-ionising radiation techniques, such as millimetre wave and terahertz scanners, are also popular and avoid the safety concerns associated with ionising radiation. In this review, seven different tools were described across 29 papers (S6 Table). These systems are considered safe, non-intrusive and offer full-body screening while preserving the privacy of individuals by generating images that reveal concealed items but not anatomical details. Harmer et al. even described the application of millimetre wavelengths to image footwear without necessitating prior removal, which would greatly accelerate passenger screening processes [46]. Their ability to deliver rapid, real-time results contributes to efficient screening processes in high-traffic areas. Furthermore, their versatility and ability to penetrate clothing and non-metallic materials allows for the detection of various contraband types, including weapons, explosives and narcotics [47,48]. These systems can be integrated into existing security infrastructure, offering adaptability and complementing other screening technologies. However, non-ionizing radiation systems may struggle to distinguish between specific materials or chemical compositions, potentially affecting their effectiveness in identifying certain contraband types. The interpretation of images can be complex, necessitating well-trained operators and, while designed to respect privacy, concerns about data collection and usage may persist. These technologies have been widely used in airports and postal facilities worldwide and complement current security procedures.
5. Trace detection techniques
Trace detection refers to the detection of minute substances which cannot be seen with the naked eye that may indicate the presence of illegal or harmful materials, such as particles on surfaces, odours or volatile organic compounds (VOCs). Across the 30 papers focusing on trace detection techniques included in this review, 19 different tools were described (S7 Table). These systems enable fast, non-invasive and sensitive screening, but typically work best in a controlled environment with minimal airflow [49–51]. Most methods are highly sensitive, minimally invasive, rapid, safe, maintain sample integrity and require minimal or no sample preparation [52,53]. Most require the detection of a specific biomarker, such as VOCs, and can identify a range of contraband including CBRN&E materials and even animals. However, while trace detection systems are sensitive, their ability to identify specific substances or materials is limited, often requiring additional analysis for confirmation. False positives can also occur due to the presence of common substances such as medications. The maintenance and calibration of these systems is critical for optimal performance and their effectiveness is contingent on operator training and vigilance.
6. Acoustic and other
The remaining seven papers described three acoustic and related technologies (S8 Table). Acoustic or ultrasonic pulses can be used to determine the physical properties of a material and feature advantages over x-ray inspection systems as they are able to penetrate dense materials and liquids. Pulses are launched into a material or container, then the returning echoes are analysed based on frequency and time-of-flight to determine the physical properties of the object, namely acoustic velocity and attenuation coefficient. These methods have been used to uncover concealed explosives and other contraband in containers [54–57]. Respiration of concealed persons in cargo containers can also be determined using this method through measurement of time-varying phase shift of the returning acoustic wave using high-power ultrasonic transducers [57]. Smart containers are another innovation currently being commercialised to enable real-time monitoring of container status and cargo contents. These containers are fitted with specialised sensors to collect and transmit information directly to operators to enable constant monitoring of cargo and provide non-specific indicators of suspicious activity [58,59]. This technology is listed in this category for the purposes of this report as acoustic sensors have been trialled in smart containers to identify sounds which may be exclusively associated with an attack (i.e. a grinder) to reduce false alarm rates [59].
7. Applicability to wildlife trafficking
Based on the properties of the tools explored through this review, those most likely to be adapted for wildlife trafficking detection have been identified in Table 1, listed with their main advantages as well as limitations and shortcomings. We have broadly grouped these into categories (for example, while there were seven different x-ray variations, they have been generally classed as ‘x-ray’) to improve the clarity of this manuscript. While these tools may be appropriate for wildlife detection based on their mode of operation, it is also important to consider their inherent properties and whether they are ideally suited to law enforcement operations [60]. Many of the properties considered important when selecting a detection tool have been evaluated with the tools and should also be taken into consideration (Table 2).
Note that this summary is intended to be used as a visual aid and guide only. An increase in the number of symbols associated with each category indicates how strongly it applies to the detection tool, unless otherwise indicated.
Discussion
Summary of the literature
The findings of this review highlight tools and techniques currently in use or under investigation to facilitate contraband detection at international borders and ports. A total of 59 screening tools for the detection of illicit contraband at airports, vehicle border crossings, postal services and maritime ports were described in the literature assessed. However, interestingly there was a difference between the technologies available across these different sectors, not necessarily proportional to the volume of goods handled or known contraband smuggling routes. More than half of the technologies described were available for airports, including air freight, luggage and personnel screening, particularly targeted towards uncovering illicit weapons and drugs. The expansion of these technologies demonstrates a reactionary approach to risk mitigation, with a significant increase in research and security efforts particularly evident after the infamous September 11 terrorist attacks in the United States of America. The distribution of research also closely reflects government priorities, with the United States driving airport security research and implementation, reflected by 39% and 55% of publications and conference proceedings respectively. However, these events should highlight the importance of proactive measures to prevent the devastating consequences associated with illicit activities. The international illegal wildlife trade poses a major threat to biodiversity and public health [107] and has even been linked to recent global pandemic events [108]. However, screening tools used for wildlife trafficking detection were severely lacking in the scientific literature. Currently, wildlife seizures predominately rely on prior intelligence as opposed to active surveillance methods, thus seizures reported likely represent a very small percentage of all smuggling attempts. The aim of implementing screening tools is to increase the probability of detection of wildlife trafficking, even in the absence of intelligence.
Challenges for screening tool implementation
All stakeholders and international ports share similar requirements for screening tools, including compatibility and adaptability, versatility, non-invasiveness, automation ability, efficiency, sensitivity, specificity, portability and ease of operation and sample collection [60]. However, screening requirements can vary greatly between countries and ports due to local regulations, political will, infrastructure, resource availability and threat perception, which can be influenced by cultural and political differences and prior security threats encountered [8]. Ideally, standardised screening protocols should be implemented to ensure consistency and predictability. Technologies available in some regions are restricted due to resource limitations and each country is at a different stage in fighting wildlife crime [8]. Unfortunately, traffickers will leverage any known weaknesses in the supply chain. For example, if traffickers were seeking to smuggle products from Africa to Europe via airports, they may take advantage of an initial connection to another African country with weaker screening technology, therefore avoiding the more advanced technology at the European destination as baggage is not re-screened on arrival [109]. Where possible, research efforts should be focused towards underdeveloped regions with limited resource capacity, especially as these regions are more frequently associated with wildlife trade activities. Different transport modalities also handle goods differently and in diverse quantities. For example, postal facilities handle thousands of letters and packages daily, but each item contains a relatively small quantity, in comparison to shipping ports which handle thousands of containers and much larger quantities of goods. The time taken for transport chains to deliver goods also varies, where for example in the context of the wildlife trade traffickers are more likely to smuggle live animals either in the mail or via airlines as transit times are much shorter. Comparatively, maritime routes or trucks are more likely to be used where large quantities of wildlife products (from deceased animals or plant derivatives) are transported between international or land-locked countries, respectively. While passenger luggage is largely screened at the point of loading, most luggage, parcels and containers are only re-screened upon arrival into a country for biosecurity concerns, with varying entry requirements and procedures implemented between countries. In the context of the wildlife trade, it is important to consider the differences in routes and methods used to tailor screening efforts. A combined bulk detection method (used to determine the size and shape of suspicious objects) and trace detection method (detects trace contaminants and identifies chemicals, with higher selectivity than bulk detection) may be ideal to improve confidence. Screening tools demonstrating promise for adaption for wildlife detection are described using case-based scenarios, but these technologies are not exclusive to one application or port and may be used in various scenarios across these sectors.
Screening of passenger luggage through airports
Techniques utilising ionising radiation are commonly employed in ports of entry, thus the infrastructure is widely accessible and suitable for border control operations. They are non-invasive and easy to use, offering either single or dual views in pseudo-colours which facilitate material differentiation [110,111]. X-ray systems including single view, dual view and backscatter scanner variations are appropriate for investigating animal anatomy, particularly bones, horns, ivory and teeth, but also to enable the detection of other products through the distinction of organic materials. Media reports have exposed the use of x-ray scanners to uncover wildlife trafficking attempts in passenger luggage, such as in 2020 where two women were caught smuggling 109 live animals from Thailand to India [112]. CT scanners are an advanced screening technology favoured over conventional x-ray systems to produce high resolution 3D images of cargo or luggage with the advantages of automation, ability to characterise more complex objects and providing positioning information. However, these systems are not portable or hand-held, are typically more expensive than 2D x-ray scanners and some units may require a longer scanning time, which may present resource and capacity limitations in at-risk countries. CT scanners are already required by law to screen hold baggage in the United States and Europe and are even being used in some Asian and African regions. While CT systems are adaptable, they are non-specific and require trained operators to classify objects. In areas with limited access to CT scanners, conventional x-ray scanners can be used, but may provide comparative weaknesses in the system for traffickers to exploit. AI software and machine learning are currently being explored to overcome these issues through automatic identification and classification of contraband. AI programs have been developed specifically for the detection of wildlife contraband in luggage and cargo based on x-ray and CT imaging. Project SEEKER enables automated screening of 3D images to detect the presence of animal products in luggage [113]. Similarly, Project Vikela screens 2D radiological images of luggage and cargo for the automated detection of rhino horn, a highly valued and trafficked commodity from Africa [114], and can be implemented in African regions where 3D technology is not yet available. Australian researchers have also trialled the implementation of innovative 3D Real Time Tomography with an algorithm for the detection and identification of wildlife products in mail and luggage [15]. AI can reduce human error and false alarm rates and therefore improve the efficiency and accuracy of threat detection. Some AI programs will be offered free of charge to authorities once developed [60], providing a great option for under-resourced areas, but they may be difficult to implement where there are issues in the digitalization of monitoring infrastructures or outdated scanners. Although not yet widely available, the combination of AI software with already implemented ionising radiation apparatus provides a powerful tool for wildlife trafficking detection.
Screening of persons concealing wildlife products through airports
Wildlife traffickers have been known to transport animals and wildlife products directly on their persons through airports. Non-ionising radiation techniques are ideal for use in these situations, where millimetre wave and terahertz technology are already widely available in airports and mailrooms for the detection of concealed threats. While they are not specifically designed to detect wildlife products, the literature demonstrates how full body scanners detect irregularities and could therefore be adapted to detect various instances of contraband smuggling [46,54]. While this technology would require modifications such as AI and additional testing to ensure their effectiveness, any irregularities are confirmed by a trained officer through a physical search. The difficulty with this method in relation to the wildlife trade however is that the trade can take on many different shapes and forms, therefore it would be difficult to standardise and train the image recognition software, compared with the standard shape of a gun, for example. Infrared imaging relies on the difference between body temperature and the temperature of the concealed object. This technology could be used to detect wildlife products smuggled on persons, for example by detecting body heat signatures of live animals, but would be ineffective where temperature variations are minimal. Concurrent use of infrared with terahertz or millimeter wave imaging would provide superior insight into concealed objects and overcome some of the individual limitations associated with image resolution [86]. There have been multiple instances of wild bird eggs being concealed on traffickers as they pass through airports [115–117]. While these cases were fortunately detected by security, not all persons are screened thoroughly and could easily evade detection. The use of full-body scanners on these passengers would have revealed an abnormality, warranting further investigation. These non-ionising methods typically require trained human operators to interpret images, however investment in image fusion technology and automated detection software, similar to those already being developed for other contraband types [47,80,81,94,118], could enhance their reliability.
Screening large volumes transiting via cargo containers
The substantial volume of goods transiting daily via cargo containers poses a huge challenge for authorities as less than 2% of all containers are currently able to be inspected. Traffickers heavily exploit these routes for the distribution of large quantities of lucrative products including pangolin scales, rhino horn, ivory and rosewood [119]. A screening tool which is already routinely being used in other ports is and currently being explored for shipping ports is detection animals. Detector dogs have already been successfully trained to detect commonly trafficked wildlife contraband, such as ivory, rhino horn and pangolin scales, and are employed at some border checkpoints [14,120–124]. The Remote Air Sampling for Canine Olfaction (RASCO) detection system is one example of a successful detection dog program which has been deployed to detect the presence of wildlife contraband in cargo containers through non-invasive canine examination of air samples [125,126]. Despite small-scale success, these animals are not being widely used in shipping ports. Meanwhile, other animal models have also shown promise for wildlife trafficking detection, where African giant pouched rats have been trained to detect hardwood timber and pangolin parts in shipments between Africa and Asia [127]. Detection animals are highly sensitive and specific in their operation and can be trained to detect a variety of different wildlife scents. Despite their accuracy however there are limitations with the implementation of detection animals, largely associated with the investment in training required and constraints of use under certain environmental or operational conditions. For example, overheating and excessive panting can reduce dog and handler performance [128], while the sensitivity of canine detection may be lowered by strong-smelling obfuscation items [14]. Where there may be hesitancy to invest in detection animals, the device equivalent, the electronic nose (eNose), has also been explored for wildlife trafficking detection. Volatilomes of wildlife and confiscated products have been characterised using 2D gas chromatography coupled with time-of-flight mass spectrometry, therefore it is possible to apply VOC detection methodology to the development of wildlife screening tools [12,129] and for the identification of unknown wildlife contraband [12,13]. This technology could provide a cost-effective, easy to use and automated alternative to detect wildlife odours in environments which are not conducive to the presence of detection animals. The concept of eNose for wildlife trafficking detection is currently being investigated [130], but not in the context of shipping containers. The device would require prior identification of specific biomarkers associated with wildlife products of interest obtained through mass spectrometry methodology. This device, once calibrated, could provide a rapid, easy to use, portable method of wildlife identification. In addition to screening at the port, smart containers are an emerging technology which record non-specific indications of illicit activity. This technology could be adapted to indirectly monitor and prevent wildlife trafficking. Smart containers are typically equipped with GPS and tampering notification systems, allowing them to be tracked throughout their journey. Therefore, any transshipping, unexpected stops, unauthorised opening of containers, or tampering of contents is recorded and used to alert authorities in real-time. This technology is already in use in many major companies and could be combined with other technologies to enhance detection capabilities, but it’s effectiveness would rely on widespread adaptation across all containers and cooperation with relevant law enforcement agencies and shipping companies. The information obtained from these containers would also need to be viewed by port authorities and container operators with consideration for known trafficking routes and other risk indicators [119]. For example, if there was tampering of a container transiting from Nigeria to Vietnam, a known high-risk trafficking route for pangolin scales, the shipping documentation could be reviewed and the container inspected before it is released. Naturally, the concern with such a system is that traffickers are likely to choose containers which are not fitted with this technology, thus it may not be as useful until there is widespread adoption of the containers.
Screening large volumes of small parcels through postal services
Live animals and their derivatives are frequently trafficked through the post. This is a particularly prevalent issue in Australia as their native reptiles are highly sought-after in the international exotic pet trade [131]. An example of a trafficking attempt was uncovered in 2021, wherein blue-tongue lizards (Tiliqua nigrolutea) were found bound and hidden inside DVD players at an Australian mail sorting facility. This information was obtained as part of a 15-month investigation and the package likely would not have been detected otherwise [132]. X-ray and CT scanners could have uncovered these animals as ionising radiation is particularly useful for highlighting skeletal structures. Pirotta et al. have developed an algorithm to accompany Real Time Tomography 3D X-ray imaging to detect native Australian wildlife trafficked through parcels, demonstrating the feasibility of this method [15]. However, due to the large volume of letters and parcels processed daily, it is unlikely that these scanners would be efficient enough to screen all incoming mail as a standalone detection method, even with AI. Instead, active or passive surveillance methods should first be employed to isolate dubious postal items which warrant further investigation. As previously described, dogs have been successfully trained to detect wildlife-specific scents, including reptiles [133,134]. To overcome the challenges of screening items individually, dogs could actively screen large areas efficiently and indicate the presence of wildlife products in the mail sorting room itself. This method however may be resource intensive, potentially disruptive and time consuming, especially in large facilities. Alternatively, passive surveillance via continuous air sampling could be considered. This would involve installing a device which periodically extracts air samples from a mail triage room to notify of the detection of trace VOCs or airborne biomarkers predetermined by mass spectrometry techniques, similar to an eNose device [130]. Where there is positive identification, more targeted detection protocols could be initiated to isolate the threat. The combination of large-scale screening followed by individual parcel investigation would exponentially increase detection capabilities. The proposed proactive screening approach would also need to be reflected in accompanying protocols, as screening is typically directed towards biosecurity threats entering the country rather than animal products leaving the country [135]. Thus, not only should the tools be improved, but protocols need to be adapted to prevent the movement of wildlife in and out of the country. The laws surrounding the protection of these native species are much stricter in Australia, but the same protections do not apply in the importing countries. Therefore, in the case of live animals, a proactive screening approach is also essential to safeguard animal welfare.
Complementary screening protocols
Screening tools play a pivotal role in enhancing detection capabilities at ports, but they must be integrated with a comprehensive set of complementary components to establish a successful strategy. Effective detection achieved through a risk-based assessment is crucial for optimizing resource allocation, especially in high-traffic port environments. This approach hinges on robust communication, coordination and collaboration among port personnel, customs authorities and law enforcement agencies. Sharing intelligence and seizure data is imperative to fine-tune risk assessment algorithms and create a unified global network to combat criminal organizations. The process of gathering data relies on adequately training frontline staff and raising awareness among authorities regarding the modus operandi of illegal wildlife traffickers. This includes knowledge of how to identify illicit products, recognize suspicious behaviours and properly collect and process samples for further investigation. For example, goods originating from specific regions may require different screening protocols based on their assessed risks. Developing and maintaining an informative tool for this purpose would necessitate collaborative efforts among entry and exit port authorities. Seizure data collected should be continually integrated into the system to enhance its effectiveness. Furthermore, countries of origin should bolster their efforts to screen outgoing cargo rather than solely relying on detection and interception at the final destination, particularly in cases where screening tools are known to be limited. Additionally, the establishment of baseline screening standards across international ports is vital to diminish opportunities for wildlife traffickers to exploit routes perceived as having weaker enforcement. The combination of screening standards and collaboration between frontline and law enforcement personnel, coupled with the targeted use of screening tools appropriate to the port requirements and suspected wildlife products, is essential to the establishment of an effective screening program for the illegal wildlife trade.
Summary and recommendations
The illegal wildlife trade is one of the largest and most lucrative organised crimes, however publications detailing wildlife detection methods are scarce as this remains an under-researched area. There are several detection tools either currently in use or under investigation for other contraband types, some of which may be adapted for the detection of wildlife. Techniques including x-ray, CT, detection animals and electronic nose have already been used to detect wildlife at international ports and should continue to be used in conjunction with AI. Other techniques which show promise include non-ionising radiation scanners, smart containers and trace detection techniques. It is further evident that certain techniques, particularly those related to the detection of radioactive isotopes or nuclear materials, would not be appropriate for wildlife. There is likely not one solution or tool which can be universally applied, but a combination of methods may be required to enhance detection capacity, dependent on known risk factors, transport routes and composition of wildlife products traded. Physical detection tools should also be coupled with a risk-based approach to screening, particularly where high volumes of goods are involved, to enable the adequate allocation of resources to optimise performance. Efforts and funding should be directed towards developing regions facing resource limitations in particular, as these ports are at a greater risk of exploitation by wildlife traffickers and facilitate global trade. There is a dire need to strengthen our borders from the threats posed by the illegal wildlife trade and this should be reflected in the funding available for this research. Proactive research and active surveillance are essential to safeguard biodiversity, animal welfare, biosecurity and public health.
Supporting information
S1 Checklist. Preferred Reporting Items for Systematic reviews and Meta-Analyses extension for Scoping Reviews (PRISMA-ScR) checklist.
https://doi.org/10.1371/journal.pone.0299152.s001
(PDF)
S1 Table. Search strategy for wildlife detection tools.
https://doi.org/10.1371/journal.pone.0299152.s002
(DOCX)
S2 Table. Search strategy for screening tools for illicit contraband detection.
https://doi.org/10.1371/journal.pone.0299152.s003
(DOCX)
S3 Table. Ionising radiation detection tools.
Detection tools described in the literature which primarily utilise ionising radiation.
https://doi.org/10.1371/journal.pone.0299152.s004
(DOCX)
S4 Table. Photon and neutron detection tools.
Detection tools described in the literature which primarily utilise photon and neutron interrogation techniques.
https://doi.org/10.1371/journal.pone.0299152.s005
(DOCX)
S5 Table. Nuclear detection tools.
Detection tools described in the literature which primarily utilise nuclear material detection systems.
https://doi.org/10.1371/journal.pone.0299152.s006
(DOCX)
S6 Table. Non-ionising detection tools.
Detection tools described in the literature which primarily utilise non-ionising radiation.
https://doi.org/10.1371/journal.pone.0299152.s007
(DOCX)
S7 Table. Trace detection techniques.
Detection tools described in the literature which primarily utilise trace detection techniques.
https://doi.org/10.1371/journal.pone.0299152.s008
(DOCX)
S8 Table. Acoustic and other detection tools.
Detection tools described in the literature which primarily utilise acoustic or other methods.
https://doi.org/10.1371/journal.pone.0299152.s009
(DOCX)
Acknowledgments
This review is to contribute towards the Doctor of Philosophy for G.K.M. We would like to acknowledge Associate Professor Dr Tony Hooker for his contribution to the editing of the first draft.
References
- 1. World Bank Group. World Bank, Illegal Logging, Fishing, and Wildlife Trade: the Costs and How to Combat it [Internet]. 2019. Available from: https://thedocs.worldbank.org/en/doc/482771571323560234-0120022019/original/WBGReport1017Digital.pdf.
- 2. Statista. The Parcel Shipping Boom Continues [Internet]. 2022. Available from: https://www.statista.com/chart/10922/parcel-shipping-volume-and-parcel-spend-in-selected-countries/#:~:text=Parcel%20shipping%20is%20a%20booming%20business.%20Especially%20e-commerce,constitutes%20a%20104%20percent%20increase%20compared%20to%202014.
- 3. Statista. Container throughput at ports worldwide from 2012 to 2021 with a forecast for 2022 through 2025 [Internet]. 2022. Available from: https://www.statista.com/statistics/913398/container-throughput-worldwide/.
- 4. Statista. Number of flights performed by the global airline industry from 2004 to 2022 [Internet]. 2023. Available from: https://www.statista.com/statistics/564769/airline-industry-number-of-flights/.
- 5. ROUTES. The routes partnership: from take off to touch down [Internet]. 2022. Available from: https://routespartnership.org/news-room/routes-from-take-off-to-touch-down#:~:text=The%20ROUTES%20Partnership%20has%20released%20a%20final%20overview,focuses%20on%20four%20primary%20areas%20of%20impact%3A%20Knowledge.
- 6. International Maritime Organisation. Guidelines for the prevention and suppression of the smuggling of wildlife on ships engaged in international maritime traffic [Internet]. 2022. Available from: https://wwwcdn.imo.org/localresources/en/OurWork/Facilitation/Facilitation/FAL.5-Circ..50.pdf.
- 7. Uddin N, Islam A, Akhter T, Ara T, Hossain D, Fullstone C, et al. Exploring market-based wildlife trade dynamics in Bangladesh. Oryx. 2022 Nov 25;1–13.
- 8.
United Nations Office on Drugs and Crime. World Wildlife Crime Report: trafficking in protected species. New York: United Nations; 2020.
- 9. Margulies JD, Bullough L, Hinsley A, Ingram DJ, Cowell C, Goettsch B, et al. Illegal wildlife trade and the persistence of “plant blindness”. PLANTS PEOPLE PLANET. 2019 Jul;1(3):173–82.
- 10.
Chapter 11: Scoping reviews. In: JBI Manual for Evidence Synthesis [Internet]. JBI; 2020 [cited 2023 Oct 30]. Available from: https://jbi-global-wiki.refined.site/space/MANUAL/4687342/Chapter+11%3A+Scoping+reviews.
- 11. Tricco AC, Lillie E, Zarin W, O’Brien KK, Colquhoun H, Levac D, et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and Explanation. Ann Intern Med. 2018 Oct 2;169(7):467–73. pmid:30178033
- 12. Ueland M, Brown A, Bartos C, Frankham GJ, Johnson RN, Forbes SL. Profiling Volatilomes: A Novel Forensic Method for Identification of Confiscated Illegal Wildlife Items. Separations. 2020 Jan 10;7(1):5.
- 13. Ueland M, Ewart K, Troobnikoff AN, Frankham G, Johnson RN, Forbes SL. A rapid chemical odour profiling method for the identification of rhinoceros horns. Forensic Sci Int. 2016 Sep;266:e99–102. pmid:27240958
- 14. Narayanasamy SS, Chong E, Abdul Aziz S, Visscher W, Abdul Jaafar SZ, Reuben Clements G. Hide‐and‐sniff: can anti‐trafficking dogs detect obfuscated wildlife parts? Conserv Sci Pract. 2023 Mar;5(3):e12886.
- 15. Pirotta V, Shen K, Liu S, Phan HTH, O’Brien JK, Meagher P, et al. Detecting illegal wildlife trafficking via real time tomography 3D X-ray imaging and automated algorithms. Front Conserv Sci. 2022 Sep 22;3:757950.
- 16. Clare EL, Economou CK, Bennett FJ, Dyer CE, Adams K, McRobie B, et al. Measuring biodiversity from DNA in the air. Curr Biol. 2022 Feb;32(3):693–700.e5. pmid:34995488
- 17. Kyle KE, Allen MC, Dragon J, Bunnell JF, Reinert HK, Zappalorti R, et al. Combining surface and soil environmental DNA with artificial cover objects to improve terrestrial reptile survey detection. Conserv Biol. 2022 Dec;36(6):e13939. pmid:35603473
- 18. Lynggaard C, Bertelsen MF, Jensen CV, Johnson MS, Frøslev TG, Olsen MT, et al. Airborne environmental DNA for terrestrial vertebrate community monitoring. Curr Biol. 2022 Feb;32(3):701–707.e5. pmid:34995490
- 19.
EndNote Team. EndNote. Philadelphia, PA, Clarivate. 2013.
- 20. Wetter OE. Imaging in airport security: Past, present, future, and the link to forensic and clinical radiology. J Forensic Radiol Imaging. 2013 Oct;1(4):152–60.
- 21. Borek C. Antioxidants and Radiation Therapy J Nutr. 2004 Nov;134(11):3207S–3209S.
- 22. International Atomic Energy Agency. Radiation protection and safety of radiation sources: international basic safety standards [Internet]. 2014. Available from: https://www-pub.iaea.org/mtcd/publications/pdf/pub1578_web-57265295.pdf
- 23. Askari M, Beigzadeh AM, Taheri A. A new method for detecting the radioactive materials using X or γ -ray cargo inspection systems. Nucl Instrum Methods Phys Res Sect Accel Spectrometers Detect Assoc Equip. 2021 Jul;1003:165325.
- 24.
Lopez AD, Kollialil ES, Gopan KG. Adaptive Neuro-fuzzy Classifier for Weapon Detection in X-Ray Images of Luggage Using Zernike Moments and Shape Context Descriptor. In: 2013 Third International Conference on Advances in Computing and Communications [Internet]. Cochin, India: IEEE; 2013 [cited 2023 Oct 30]. p. 46–9. Available from: http://ieeexplore.ieee.org/document/6686334/.
- 25. Jaccard N, Rogers TW, Morton EJ, Griffin LD. Automated detection of smuggled high-risk security threats using Deep Learning. 2016 [cited 2023 Oct 30]; Available from: https://arxiv.org/abs/1609.02805.
- 26. Speller RD, Malden C, Ng E, Horrocks JA, Luggar RD, Lacey RJ. System tuning for x-ray scatter measurements in explosive detection. In: Malotky LO, Pennella JJ, editors. Boston, MA; 1997 [cited 2023 Oct 30]. p. 191–200. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1025983.
- 27.
Al-Najdawi N. A concealed ammo detection system for passengers luggage screening. In: 2014 International Conference on Multimedia Computing and Systems (ICMCS) [Internet]. Marrakech, Morocco: IEEE; 2014 [cited 2023 Oct 30]. p. 159–64. Available from: http://ieeexplore.ieee.org/document/6911324/.
- 28.
Cui Y, Oztan B. Automated firearms detection in cargo x-ray images using RetinaNet. In: Ashok A, Gehm ME, Greenberg JA, editors. Anomaly Detection and Imaging with X-Rays (ADIX) IV [Internet]. Baltimore, United States: SPIE; 2019 [cited 2023 Oct 30]. p. 24. Available from: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/10999/2517817/Automated-firearms-detection-in-cargo-x-ray-images-using-RetinaNet/10.1117/12.2517817.full.
- 29.
Kaur A, Kaur L. Concealed weapon detection from images using SIFT and SURF. In: 2016 Online International Conference on Green Engineering and Technologies (IC-GET) [Internet]. Coimbatore, India: IEEE; 2016 [cited 2023 Oct 30]. p. 1–8. Available from: http://ieeexplore.ieee.org/document/7916679/.
- 30.
Petrozziello A, Jordanov I. Automated Deep Learning for Threat Detection in Luggage from X-Ray Images. In: Kotsireas I, Pardalos P, Parsopoulos KE, Souravlias D, Tsokas A, editors. Analysis of Experimental Algorithms [Internet]. Cham: Springer International Publishing; 2019 [cited 2023 Oct 30]. p. 505–12. (Lecture Notes in Computer Science; vol. 11544). Available from: http://link.springer.com/10.1007/978-3-030-34029-2_32.
- 31.
A Novel Weapon Detection Framework in High-Energy X-Ray Dual-Energy Images Based on Shape and Edge Features. In: International Conference on Software Technology and Engineering, 3rd (ICSTE 2011) [Internet]. ASME Press; 2011 [cited 2023 Oct 30]. p. 227–31. Available from: https://asmedigitalcollection.asme.org/ebooks/book/200/chapter/37236/a-novel-weapon-detection-framework-in-high-energy.
- 32.
Song B, Li R, Pan X, Liu X, Xu Y. Improved YOLOv5 Detection Algorithm of Contraband in X-ray Security Inspection Image. In: 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI) [Internet]. Chengdu, China: IEEE; 2022 [cited 2023 Oct 30]. p. 169–74. Available from: https://ieeexplore.ieee.org/document/9904110/.
- 33.
Ye D, Li Z, Wang Y, Yan S. An auxiliary intelligent identification system for contraband of x-ray machine. In: Wang Q, Luo H, Xie H, Lee C, Cao L, Yang B, et al., editors. AOPC 2020: Display Technology; Photonic MEMS, THz MEMS, and Metamaterials; and AI in Optics and Photonics [Internet]. Beijing, China: SPIE; 2020 [cited 2023 Oct 30]. p. 313. Available from: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/11565/2579877/An-auxiliary-intelligent-identification-system-for-contraband-of-x-ray/10.1117/12.2579877.full.
- 34.
Batyaev VF, Belichenko SG, Bestaev RR, Gavryuchenkov AV, Karetnikov MD. Tagged neutron capabilities for detecting hidden explosives. In: Bishop SS, Isaacs JC, editors. Baltimore, Maryland, United States; 2015 [cited 2023 Oct 30]. p. 94541E. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.2182488.
- 35. El Kanawati W, Carasco C, Perot B, Mariani A, Raoux AC, Valkovic V, et al. Gamma-Ray Signatures Improvement of the EURITRACK Tagged Neutron Inspection System Database. IEEE Trans Nucl Sci. 2010 Oct;57(5):2879–85.
- 36.
Perot B, Carasco C, Valkovic V, Sudac D, Franulovic A, McDaniel FD, et al. Detection of Illicit Drugs with the EURITRACK System. In: AIP Conference Proceedings [Internet]. Fort Worth (Texas): AIP; 2009 [cited 2023 Oct 30]. p. 565–9. Available from: https://pubs.aip.org/aip/acp/article/1099/1/565-569/829105.
- 37.
Perot B, Perret G, Mariani A, Ma JL, Szabo JL, Mercier E, et al. The EURITRACK project: development of a tagged neutron inspection system for cargo containers. In: Vourvopoulos G, Doty FP, editors. Orlando (Kissimmee), FL; 2006 [cited 2023 Oct 30]. p. 621305. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.665380.
- 38. Sardet A, Perot B, Carasco C, Sannie G, Moretto S, Nebbia G, et al. Performances of C-BORD’s Tagged Neutron Inspection System for Explosives and Illicit Drugs Detection in Cargo Containers. IEEE Trans Nucl Sci. 2021 Mar;68(3):346–53.
- 39. Shaw TJ, Brown D, D’Arcy J, Liu F, Shea P, Sivakumar M, et al. Small threat and contraband detection with TNA-based systems. Appl Radiat Isot. 2005 Nov;63(5–6):779–82. pmid:16026994
- 40. Sudac D, Baricevic M, Obhodas J, Franulovic A, Valkovic V. The use of triangle diagram in the detection of explosive and illicit drugs. In: Carapezza EM, editor. Orlando, Florida; 2010 [cited 2023 Oct 30]. p. 76662V. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.850108.
- 41. Sudac D, Matika D, Valkovic V. Identification of materials hidden inside a sea-going cargo container filled with an organic cargo by using the tagged neutron inspection system. Nucl Instrum Methods Phys Res Sect Accel Spectrometers Detect Assoc Equip. 2008 Apr;589(1):47–56.
- 42. Eberhardt JE, Rainey S, Stevens RJ, Sowerby BD, Tickner JR. Fast neutron radiography scanner for the detection of contraband in air cargo containers. Appl Radiat Isot. 2005 Aug;63(2):179–88. pmid:15963428
- 43. Yang Yigang, Yang Jianbo, Li Yuanjing. Fusion of X-ray Imaging and Photoneutron Induced Gamma Analysis for Contrabands Detection. IEEE Trans Nucl Sci. 2013 Apr;60(2):1134–9.
- 44.
Cutmore NG, Liu Y, Tickner JR. Development and commercialization of a fast-neutron/x-ray Cargo Scanner. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST) [Internet]. Waltham, MA, USA: IEEE; 2010 [cited 2023 Oct 30]. p. 330–6. Available from: http://ieeexplore.ieee.org/document/5655030/.
- 45.
Cui T, Yang Y, Zhang Z, Zong C, Ming S, Wang D. An e-LINAC driven PGNAA system for concealed drug inspection. In: 2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC) [Internet]. Boston, MA, USA: IEEE; 2020 [cited 2023 Oct 30]. p. 1–2. Available from: https://ieeexplore.ieee.org/document/9508075/.
- 46. Harmer SW, Johnson CI, Wheeler DE, Bhabha H. THERMOGRAPHY AT MILLIMETRE WAVELENGTHS FOR SECURITY INSPECTION OF FOOTWEAR. Prog Electromagn Res M. 2020;88:83–9.
- 47.
Zech C, Hülsmann A, Kallfass I, Tessmann A, Zink M, Schlechtweg M, et al. Active millimeter-wave imaging system for material analysis and object detection. In: Krapels KA, Salmon NA, Jacobs E, editors. Prague, Czech Republic; 2011 [cited 2023 Oct 30]. p. 81880D. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.898796.
- 48. Sheen DM, McMakin DL, Hall TE. Three-dimensional millimeter-wave imaging for concealed weapon detection. IEEE Trans Microw Theory Tech. 2001 Sep;49(9):1581–92.
- 49. Zhao Q, Liu J, Wang B, Zhang X, Huang G, Xu W. Rapid screening of explosives in ambient environment by aerodynamic assisted thermo desorption mass spectrometry. J Mass Spectrom. 2017 Jan;52(1):1–6. pmid:27737506
- 50. Mochalski P, Ruzsanyi V, Wiesenhofer H, Mayhew CA. Instrumental sensing of trace volatiles—a new promising tool for detecting the presence of entrapped or hidden people. J Breath Res. 2018 Feb 6;12(2):027107. pmid:29091047
- 51. Harries ME, Bruno TJ. Field demonstration of portable vapor sampling in a simulated cargo container. Forensic Chem. 2019 Dec;16:100182.
- 52. Nguyen CB, Wichert WRA, Carmany DO, McBride EM, Mach PM, Dhummakupt ES, et al. Pressure-Sensitive Adhesive Combined with Paper Spray Mass Spectrometry for Low-Cost Collection and Analysis of Drug Residues. Anal Chem. 2021 Oct 12;93(40):13467–74. pmid:34582178
- 53. Gross JH. Direct analysis in real time—a critical review on DART-MS. Anal Bioanal Chem. 2014 Jan;406(1):63–80. pmid:24036523
- 54. Salmon NA. Indoor Full-Body Security Screening: Radiometric Microwave Imaging Phenomenology and Polarimetric Scene Simulation. IEEE Access. 2020;8:144621–37.
- 55. Edwards HGM, Hunt DE, Sibley MG. FT-Raman spectroscopic study of keratotic materials: horn, hoof and tortoiseshell. Spectrochim Acta A Mol Biomol Spectrosc. 1998 May;54(5):745–57. pmid:9679318
- 56. Diaz AA, Burghard BJ, Skorpik JR, Shepard CL, Samuel TJ, Pappas RA. Noninvasive ultrasonic examination technology in support of counter-terrorism and drug interdiction activities: the acoustic inspection device (AID). In: Doctor SR, Bar-Cohen Y, Aktan AE, editors. San Diego, CA; 2003 [cited 2023 Oct 30]. p. 34–45. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=760344.
- 57. López Y, Lorenzo J. Compressed Sensing Techniques Applied to Ultrasonic Imaging of Cargo Containers. Sensors. 2017 Jan 15;17(12):162. pmid:28098841
- 58. Uotila J, Lehtinen J, Kuusela T, Sinisalo S, Maisons G, Terzi F, et al. Drug precursor vapor phase sensing by cantilever enhanced photoacoustic spectroscopy and quantum cascade laser. In: Zamboni R, Kajzar F, Szep AA, editors. Edinburgh, United Kingdom; 2012 [cited 2023 Oct 30]. p. 85450I. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.974508.
- 59.
Craddock RJ. Sensor fusion for smart containers. In: IEE Seminar on Signal Processing Solutions for Homeland Security [Internet]. London, UK: IEE; 2005 [cited 2023 Oct 30]. p. 5–5. Available from: https://digital-library.theiet.org/content/conferences/10.1049/ic_20050272.
- 60. Moloney G, Chaber AL, Escot L. Preventing and detecting wildlife trafficking on maritime, aerial and postal/courier transport chains: An analysis of innovative solutions with the potential to support law enforcement and compliance efforts. 2023; Available from: https://www.wwf.fr/sites/default/files/doc-2023-07/WWF%20%282023%29%20PREVENTING%20AND%20DETECTING%20WILDLIFE%20TRAFFICKING%20ON%20TRANSPORT%20CHAINS_HD.pdf.
- 61. Liu Y, Sowerby BD, Tickner JR. Comparison of neutron and high-energy X-ray dual-beam radiography for air cargo inspection. Appl Radiat Isot. 2008 Apr;66(4):463–73. pmid:18054493
- 62. Armistead RA. Advanced x-ray systems for nondestructive inspection and contraband detection. In: Doty FP, editor. Denver, CO; 1999 [cited 2023 Oct 30]. p. 98–105. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=996622.
- 63.
Arodzero A, Boucher S, Burstein P, Kutsaev SV, Lanza RC, Palermo V. Security X-ray Screening with Modulated-Energy Pulses. In: 2019 IEEE International Symposium on Technologies for Homeland Security (HST) [Internet]. Woburn, MA, USA: IEEE; 2019 [cited 2023 Oct 30]. p. 1–6. Available from: https://ieeexplore.ieee.org/document/9032928/.
- 64.
Kolkoori S, Wrobel N, Hohendorf S, Ewert U. High energy X-ray imaging technology for the detection of dangerous materials in air freight containers. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST) [Internet]. Waltham, MA, USA: IEEE; 2015 [cited 2023 Oct 30]. p. 1–6. Available from: http://ieeexplore.ieee.org/document/7225328/.
- 65.
Kwak Sung-Woo, Kwang Hyun Kim Gyuseong Cho, Kim Insu, Yi Yun, Han Bumsoo, et al. Solid-state detector design for mobile cargo container inspection system using medium energy X-ray. In: 2002 IEEE Nuclear Science Symposium Conference Record [Internet]. Norfolk, VA, USA: IEEE; 2003 [cited 2023 Oct 30]. p. 475–9. Available from: http://ieeexplore.ieee.org/document/1239358/.
- 66. Van Liew S, Bertozzi W, D’Olympia N, Franklin WA, Korbly SE, Ledoux RJ, et al. Identification and Imaging of Special Nuclear Materials and Contraband using Active x-ray Interrogation. Phys Procedia. 2017;90:313–22.
- 67. Bogowicz J, Chabera M, Dziewiecki W, Kaźmierczak K, Klimaszewski J, Kosiński T, et al. Development of X-ray scanning system Sowa. Nukleonika. 2020 Dec 1;65(4):229–32.
- 68.
Chang CL, He M, Nguyen MH. Computational model for automatic cargo container inspection systems. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST) [Internet]. Waltham, MA, USA: IEEE; 2010 [cited 2023 Oct 30]. p. 556–61. Available from: http://ieeexplore.ieee.org/document/5654985/.
- 69. Lim CH, Lee J, Choi Y, Park JW, Kim HK. Advanced container inspection system based on dual-angle X-ray imaging method. J Instrum. 2021 Aug 1;16(08):P08037.
- 70. Drakos I, Kenny P, Fearn T, Speller R. Multivariate analysis of energy dispersive X-ray diffraction data for the detection of illicit drugs in border control. Crime Sci. 2017 Dec;6(1):1.
- 71.
Koutalonis M, Cook EJ, Griffiths JA, Horrocks JA, Gent C, Pani S, et al. Designing an in-field system for illicit drug detection using X-ray diffraction. In: 2009 IEEE Nuclear Science Symposium Conference Record (NSS/MIC) [Internet]. Orlando, FL: IEEE; 2009 [cited 2023 Oct 30]. p. 862–7. Available from: http://ieeexplore.ieee.org/document/5402460/.
- 72.
Arodzero A, Alreja V, Boucher S, Burstein P, Kulinich P, Lanza RC, et al. X-ray Backscatter Security Inspection with Enhanced Depth of Effective Detection and Material Discrimination. In: 2021 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC) [Internet]. Piscataway, NJ, USA: IEEE; 2021 [cited 2023 Oct 30]. p. 1–4. Available from: https://ieeexplore.ieee.org/document/9875935/.
- 73. Dinca DC, Schubert JR, Callerame J. X-ray backscatter imaging. In: Halvorson CS, Lehrfeld D, Saito TT, editors. Orlando, FL; 2008 [cited 2023 Oct 30]. p. 694516. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.773334.
- 74.
Xu J, Wang X, Mu B, Zhan Q, Xie Q, Li Y, et al. A novel biometric X-ray backscatter inspection of dangerous materials based on a lobster-eye objective. In: Burgess D, Owen G, Bouma H, Carlysle-Davies F, Stokes RJ, Yitzhaky Y, editors. Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII [Internet]. Edinburgh, United Kingdom: SPIE; 2016 [cited 2023 Oct 30]. p. 6. Available from: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/9995/2241970/A-novel-biometric-X-ray-backscatter-inspection-of-dangerous-materials/10.1117/12.2241970.full.
- 75.
Arunachalam K, Udpa L, Udpa SS. MEMS Based Computed Tomographic Scanner for Border Security. In: 2005 IEEE International Conference on Electro Information Technology [Internet]. Lincoln, NE, USA: IEEE; 2005 [cited 2023 Oct 30]. p. 1–5. Available from: http://ieeexplore.ieee.org/document/1626968/.
- 76.
Bendahan J, Garms W. Megavolt Computed Tomography for Air Cargo Container Inspection. In: 2008 IEEE Conference on Technologies for Homeland Security [Internet]. Waltham, MA, USA: IEEE; 2008 [cited 2023 Oct 30]. p. 7–11. Available from: http://ieeexplore.ieee.org/document/4534414/.
- 77. Grabherr S, Ross S, Regenscheit P, Werner B, Oesterhelweg L, Bolliger S, et al. Detection of Smuggled Cocaine in Cargo Using MDCT. Am J Roentgenol. 2008 May;190(5):1390–5. pmid:18430860
- 78.
Alamaniotis M, Young J, Perry J, Xiao S, Agarwal V, Forsberg P, et al. Engineering Solution to Nuclear Material Detection at Ports: Introducing the Novel iMASS Paradigm. In: 2009 21st IEEE International Conference on Tools with Artificial Intelligence [Internet]. Newark, New Jersey, USA: IEEE; 2009 [cited 2023 Oct 30]. p. 679–82. Available from: http://ieeexplore.ieee.org/document/5365162/.
- 79. Lang RJ, Ward LF, Cunningham JW. Close-range high-resolution W-band radiometric imaging system for security screening applications. In: Smith RM, Appleby R, editors. Orlando, FL; 2000 [cited 2023 Oct 30]. p. 34–9. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=903530.
- 80.
Li Xun, Li Shiyong, Zhao Guoqiang, Sun Houjun. Multi-polarized millimeter-wave imaging for concealed weapon detection. In: 2016 IEEE International Conference on Microwave and Millimeter Wave Technology (ICMMT) [Internet]. Beijing, China: IEEE; 2016 [cited 2023 Oct 30]. p. 892–4. Available from: http://ieeexplore.ieee.org/document/7762477/.
- 81.
Liang P, Zhang C, Qi X, Yan Z, Song T, Wang W, et al. Millimeter-wave near-field holographic imaging based on VNA. In: IET PhD Candidates Academic Seminar (China) on Vacuum Electronics (PhASe-VE 2021) [Internet]. Online Conference, Beijing, China: Institution of Engineering and Technology; 2021 [cited 2023 Oct 30]. p. 7–9. Available from: https://digital-library.theiet.org/content/conferences/10.1049/icp.2022.0986.
- 82. Sheen DM, Collins HD, Gribble RP, McMakin DL. Comparison of active millimeter-wave and acoustic imaging for weapon detection. In: DePersia AT, Yeager S, Ortiz SM, editors. Boston, MA; 1997 [cited 2023 Oct 30]. p. 120–8. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1025956.
- 83.
Suryana J, Siregar APP. Design of human body scanner based on 4–11 GHz ultrawideband technique for airport security applications. In: 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA) [Internet]. Denpasar, Indonesia: IEEE; 2011 [cited 2023 Oct 30]. p. 1–5. Available from: http://ieeexplore.ieee.org/document/6095449/.
- 84.
Hiromoto N, Mori K, Sato J. Study on material-classification of objects detected by the THz passive body scanner for security screening. In: 2016 41st International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz) [Internet]. Copenhagen, Denmark: IEEE; 2016 [cited 2023 Oct 30]. p. 1–2. Available from: http://ieeexplore.ieee.org/document/7758766/.
- 85. Kawase K, Ogawa Y, Watanabe Y, Inoue H. Non-destructive terahertz imaging of illicit drugs using spectral fingerprints. Opt Express. 2003 Oct 6;11(20):2549. pmid:19471367
- 86. Kowalski M, Kastek M, Polakowski H, Palka N, Piszczek M, Szustakowski M. Multispectral concealed weapon detection in visible, infrared, and terahertz. In: Anwar MF, Crowe TW, Manzur T, editors. Baltimore, Maryland, USA; 2014 [cited 2023 Oct 30]. p. 91020T. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.2049692.
- 87. Lu M, Shen J, Li N, Zhang Y, Zhang C, Liang L, et al. Detection and identification of illicit drugs using terahertz imaging. J Appl Phys. 2006 Nov 15;100(10):103104.
- 88. Jacobs E, Driggers RG, Krapels KA, De Lucia FC, Petkie DT. Terahertz imaging performance model for concealed weapon identification. In: Appleby R, Chamberlain JM, Krapels KA, editors. London, United Kingdom; 2004 [cited 2023 Oct 30]. p. 98. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.579768.
- 89.
Sasaki Y, Hoshina H, Yamashita M, Okazaki G, Otani C, Kawase K. Detection and inspection device of illicit drugs in sealed envelopes using THz waves. In: 2007 Joint 32nd International Conference on Infrared and Millimeter Waves and the 15th International Conference on Terahertz Electronics [Internet]. Cardiff: IEEE; 2007 [cited 2023 Oct 30]. p. 271–2. Available from: http://ieeexplore.ieee.org/document/4516493/.
- 90. Shchepetilnikov AV, Gusikhin PA, Muravev VM, Tsydynzhapov GE, Nefyodov YuA, Dremin AA, et al. New Ultra-Fast Sub-Terahertz Linear Scanner for Postal Security Screening. J Infrared Millim Terahertz Waves. 2020 Jun;41(6):655–64.
- 91.
Shen Jingling, Sun Jinhai, Li Ning, Liang Laishun, Xu Xiaoyu, Liu Haibo, et al. Investigation on THz Fingerprint Spectrum of Illicit Drugs. In: 2005 Joint 30th International Conference on Infrared and Millimeter Waves and 13th International Conference on Terahertz Electronics [Internet]. Williamsburg, VA, USA: IEEE; 2005 [cited 2023 Oct 30]. p. 321–2. Available from: http://ieeexplore.ieee.org/document/1572538/.
- 92.
Whiffen J. Acoustic signal processing techniques for container security. In: IEE Seminar on Signal Processing Solutions for Homeland Security [Internet]. London, UK: IEE; 2005 [cited 2023 Oct 30]. p. 7–7. Available from: https://digital-library.theiet.org/content/conferences/10.1049/ic_20050273.
- 93.
Yamzaki R, Kato M, Murate K, Imayama K, Kawase K. Non-destructive inspection of chemicals in mail envelopes using an injection-seeded terahertz-wave parametric generator. In: 2015 40th International Conference on Infrared, Millimeter, and Terahertz waves (IRMMW-THz) [Internet]. Hong Kong, China: IEEE; 2015 [cited 2023 Oct 30]. p. 1–2. Available from: http://ieeexplore.ieee.org/document/7327537/.
- 94.
Cho Siu-Yeung, Tin Nanda-Pwint. Using infrared imaging technology for concealed weapons detection and visualization. In: TENCON 2010–2010 IEEE Region 10 Conference [Internet]. Fukuoka: IEEE; 2010 [cited 2023 Oct 30]. p. 228–33. Available from: http://ieeexplore.ieee.org/document/5685995/.
- 95.
Nelson MP, Tazik SK, Treado PJ. Achieving autonomy and SWaP reduction in real-time molecular chemical imaging platforms and applications. In: Islam MS, George T, editors. Micro- and Nanotechnology Sensors, Systems, and Applications XII [Internet]. Online Only, United States: SPIE; 2020 [cited 2023 Oct 30]. p. 92. Available from: https://www.spiedigitallibrary.org/conference-proceedings-of-spie/11389/2557523/Achieving-autonomy-and-SWaP-reduction-in-real-time-molecular-chemical/10.1117/12.2557523.full.
- 96. To KC, Ben-Jaber S, Parkin IP. Recent Developments in the Field of Explosive Trace Detection. ACS Nano. 2020 Sep 22;14(9):10804–33. pmid:32790331
- 97. The Guardian. Saving the pangolin: giant rats trained to sniff out world’s most trafficked mammal [Internet]. 2016. Available from: https://www.theguardian.com/environment/2016/nov/21/saving-the-pangolin-giant-rats-trained-to-sniff-out-worlds-most-trafficked-mammal.
- 98.
Hendrick Humaira, Yondri S, Afdhal H, Rahmatullah D. Dry Cannabis Detection by Using Portable Electronic Nose. In: 2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) [Internet]. Yogyakarta, Indonesia: IEEE; 2022 [cited 2023 Oct 30]. p. 378–82. Available from: https://ieeexplore.ieee.org/document/10053031/.
- 99. Holland PM, Mustacich RV, Everson JF, Foreman W, Leone M, Sanders AH, et al. Correlated column micro gas chromatography instrumentation for the vapor detection of contraband drugs in cargo containers. In: Lawrence AH, editor. San Diego, CA; 1994 [cited 2023 Oct 30]. p. 79–86. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=972117.
- 100. Mochalski P, Wiesenhofer H, Allers M, Zimmermann S, Güntner AT, Pineau NJ, et al. Monitoring of selected skin- and breath-borne volatile organic compounds emitted from the human body using gas chromatography ion mobility spectrometry (GC-IMS). J Chromatogr B. 2018 Feb;1076:29–34. pmid:29396365
- 101. Neudorfl P, Hupe M, Pilon P, Lawrence AH, Drolet G, Su CW, et al. Detection of cocaine in cargo containers by high-volume vapor sampling: field test at Port of Miami. In: Pilon P, Burmeister S, editors. Boston, MA; 1997 [cited 2023 Oct 30]. p. 26–34. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1025990.
- 102.
Rudzinski C, Masters D, Buck A, Wall M, Tremblay D, Wack E. Screening maritime shipping containers for weapons of mass destruction. In: 2010 International WaterSide Security Conference [Internet]. Carrara, Italy: IEEE; 2010 [cited 2023 Oct 30]. p. 1–7. Available from: http://ieeexplore.ieee.org/document/5730279/.
- 103. Ewing R. A critical review of ion mobility spectrometry for the detection of explosives and explosive related compounds. Talanta. 2001 May 10;54(3):515–29. pmid:18968275
- 104. Steele PT, Farquar GR, Martin AN, Coffee KR, Riot VJ, Martin SI, et al. Autonomous, Broad-Spectrum Detection of Hazardous Aerosols in Seconds. Anal Chem. 2008 Jun 1;80(12):4583–9. pmid:18491923
- 105. Perr JM, Furton KG, Almirall JR. Application of a SPME-IMS detection system for explosives detection. In: Carapezza EM, editor. Orlando, Florida, USA; 2005 [cited 2023 Oct 30]. p. 667. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.605869.
- 106. Ewing RG, Nims MK, Morrison KA, Hart GL, Avalos NM, Denis EH. Vapor detection and vapor pressure measurements of fentanyl and fentanyl hydrochloride salt at ambient temperatures. The Analyst. 2022;147(21):4888–94. pmid:36168915
- 107. Shivaprakash KN, Sen S, Paul S, Kiesecker JM, Bawa KS. Mammals, wildlife trade, and the next global pandemic. Curr Biol. 2021 Aug;31(16):3671–3677.e3. pmid:34237267
- 108. Gallo-Cajiao E, Lieberman S, Dolšak N, Prakash A, Labonté R, Biggs D, et al. Global governance for pandemic prevention and the wildlife trade. Lancet Planet Health. 2023 Apr;7(4):e336–45. pmid:37019574
- 109. INTERPOL. Illicit goods trafficking via port and airport facilities in Africa [Internet]. 2020. Available from: https://www.interpol.int/content/download/15458/file/2020%2006%2029%20FINAL%20PUBLIC%20AIRPORTS-ports%20threat%20assessment.pdf.
- 110. Khan SU, Khan IU, Ullah I, Saif N, Ullah I. A review of airport dual energy X-ray baggage inspection techniques: Image enhancement and noise reduction. J X-Ray Sci Technol. 2020 Jun 9;28(3):481–505. pmid:32390647
- 111. Abidi BR, Zheng Y, Gribok AV, Abidi MA. Improving Weapon Detection in Single Energy X-Ray Images Through Pseudocoloring. IEEE Trans Syst Man Cybern Part C Appl Rev. 2006 Nov;36(6):784–96.
- 112. Haworth J. 109 live animals found in women’s luggage in massive airport wildlife trafficking bust. 2022; Available from: https://abcnews.go.com/International/109-live-animals-found-womens-luggage-massive-airport/story?id=85921598.
- 113. Haines D. Using artificial intelligence for good. 2022; Available from: https://www.microsoft.com/en-us/industry/blog/government/gov-ai/2022/01/31/project-seeker-using-artificial-intelligence-for-good/.
- 114. United for Wildlife. Transport Taskforce [Internet]. 2023. Available from: https://unitedforwildlife.org/taskforces/transport-taskforce/.
- 115. ABC News. Man Smuggled 25 Bird Eggs Across the Globe—In His Underwear [Internet]. 2013. Available from: https://abcnews.go.com/Travel/man-smuggled-25-bird-eggs-globe-underwear/story?id=20600210.
- 116. Dalton J. Live vultures and endangered bird eggs found in man’s bag at Heathrow [Internet]. 2018. Available from: ttps://www.independent.co.uk/climate-change/news/vulture-endangered-eggs-heathrow-bag-smuggle-national-crime-agency-south-africa-a8424486.htm.
- 117. The Associated Press. Man smuggles 16 wild-bird eggs in his pants through Australian airport [Internet]. 2014. Available from: https://www.oregonlive.com/today/2014/05/man_smuggles_16_wild-bird_eggs.html.
- 118. Zhu W, Zhao Y, Deng C, Zhang C, Zhang Y, Zhang J. Image fusion based on millimeter-wave for concealed weapon detection. In: Zhang C, Zhang XC, Siegel PH, He L, Shi SC, editors. Beijing, China; 2010 [cited 2023 Oct 30]. p. 785414. Available from: http://proceedings.spiedigitallibrary.org/proceeding.aspx?doi=10.1117/12.869725.
- 119. Zavagli M. Red flag indicators for wildlife and timber trafficking in containerized sea cargo. 2021.
- 120. Furton K. The scientific foundation and efficacy of the use of canines as chemical detectors for explosives. Talanta. 2001 May 10;54(3):487–500. pmid:18968273
- 121. Braun B. Wildlife detector dogs—A guideline on the training of dogs to detect wildlife in trade. 2013; Available from: https://www.traffic.org/site/assets/files/2272/wwf-wildlife-detector-dogs-guidelines.pdf.
- 122. Conservation South Luangwa. K9 detection dog unit. 2022; Available from: https://cslzambia.org/detection-dog-unit.
- 123. International Fund for Animal Welfare. Dogs can sniff out wildlife [Internet]. 2021. Available from: https://www.ifaw.org/international/projects/detection-dogs-benin#:~:text=We%20developed%20a%20wildlife%20crime,disrupting%20the%20illegal%20wildlife%20trade.
- 124. Scent Imprint Conservation Dogs. Scent Imprint Conservation Dogs [Internet]. 2023. Available from: https://www.scentimprintconservationdogs.com/our-aim/.
- 125. TRAFFIC. Adding teeth to law enforcement: 13 dog squads commence wildlife detection training [Internet]. 2017. Available from: https://www.traffic.org/news/adding-teeth-to-law-enforcement-13-dog-squads-commence-wildlife-detection-training/.
- 126.
Wickens B. Remote Air Sampling for Canine Olfaction. In: Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat No01CH37186) [Internet]. London, UK: IEEE; 2001 [cited 2023 Oct 30]. p. 100–2. Available from: https://ieeexplore.ieee.org/document/962819.
- 127. Gazit I, Terkel J. Explosives detection by sniffer dogs following strenuous physical activity. Appl Anim Behav Sci. 2003 Apr;81(2):149–61.
- 128. World Wildlife Fund. New sniffer dog method used in Africa for ivory trafficking [Internet]. 2018. Available from: https://www.wwf.org.uk/updates/new-sniffer-dog-method-used-africa-ivory-trafficking.
- 129. Staples EJ, Viswanathan S. Detection of Contrabands in Cargo Containers Using a High-Speed Gas Chromatograph with Surface Acoustic Wave Sensor. Ind Eng Chem Res. 2008 Nov 5;47(21):8361–7.
- 130. Brown AO, Frankham GJ, Stuart BH, Ueland M. Reptile volatilome profiling optimisation: A pathway towards forensic applications. Forensic Sci Int Anim Environ. 2021 Nov;1:100024.
- 131. Stringham OC, García‐Díaz P, Toomes A, Mitchell L, Ross JV, Cassey P. Live reptile smuggling is predicted by trends in the legal exotic pet trade. Conserv Lett. 2021 Nov;14(6):e12833.
- 132. Meneguzzi J. Bound, gagged, posted: investigating Australia’s cruel and corrupt illegal wildlife trade [Internet]. 2021. Available from: https://www.australiangeographic.com.au/topics/wildlife/2021/12/australias-illegal-wildlife-trade/.
- 133. Nielsen TP, Jackson G, Bull CM. A nose for lizards; can a detection dog locate the endangered pygmy bluetongue lizard (Tiliqua adelaidensis)? Trans R Soc S Aust. 2016 Jul 2;140(2):234–43.
- 134. Browne CM, Stafford KJ, Fordham RA. The detection and identification of tuatara and gecko scents by dogs. J Vet Behav. 2015 Nov;10(6):496–503.
- 135. Australian Government. Sending or ordering goods online from outside Australia [Internet]. 2023. Available from: https://www.agriculture.gov.au/biosecurity-trade/travelling/bringing-mailing-goods/mail.