Handbook of Research on Counterfeiting and Illicit Trade
Show Less

Handbook of Research on Counterfeiting and Illicit Trade

Edited by Peggy E. Chaudhry

This unique Handbook provides multiple perspectives on the growth of illicit trade, primarily exploring counterfeits and internet piracy. It includes expert opinion on a wide range of topics including the evaluation of key global enforcement issues, government and private-sector agency initiatives to stifle illicit trade, and the evolution of piracy on the internet. The authors also assess the efficacy of anti-counterfeiting strategies such as targeted consumer campaigns, working with intermediaries in the supply chain, authentication technology, and online brand protection.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 3: Key global enforcement issues on illicit trade in goods

Stefano Betti


The chapter highlights some challenges and constraints that the law enforcement community faces when addressing illicit trade as a distinctive phenomenon, framing the discussion within the paradigm of organized crime today and current perceptions of illicit trade among practitioners. Notably, the discussion centers on advocating a change in cultural attitudes as a pre-requisite for effective law enforcement action. In addition, a detailed overview of the four major paths that could be followed to create useful deterrents against illicit trade is provided. Those paths include: legislative reform, notably to ensure that appropriate penalties are applied; the use of organized crime legislation in illicit trade related investigations; systematic resort to criminal justice treaties as global legal tools to facilitate the international exchange of evidence, in particular the UN Convention against Transnational Organized Crime; and using more resources on intelligence-driven investigations and preventive criminal proceedings for the purpose of disrupting illicit trade operations “in the making”. Each path is considered as an integral part of a coordinated policy and law enforcement based strategy.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.