TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES

Similar documents
Data users and data producers interaction: the Web-COSI project experience

Lithuania: Pramonė 4.0

Winthrop Primary School

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

DATA COLLECTION AND SOCIAL MEDIA INNOVATION OR CHALLENGE FOR HUMANITARIAN AID? EVENT REPORT. 15 May :00-21:00

Engaging UK Climate Service Providers a series of workshops in November 2014

LSCB Pan-Lancashire LSCB Online Safeguarding Strategy

Contact with the media

POLICY SIMULATION AND E-GOVERNANCE

Image: alexaldo. Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546. In association with:

Our Corporate Strategy Digital

Robert Bond Partner, Commercial/IP/IT

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

Culturally and Linguistically Diverse Young People and Digital Citizenship:

Q&A with Darren Marble

Economic and Social Council

Violent Intent Modeling System

Ethical and social aspects of management information systems

FP9 s ambitious aims for societal impact call for a step change in interdisciplinarity and citizen engagement.

Hamburg, 25 March nd International Science 2.0 Conference Keynote. (does not represent an official point of view of the EC)

Mobilisation and Mutual Learning (MML) Action Plans on Societal Challenges

Media Literacy Policy

WINSTON-SALEM POLICE DEPARTMENT. Remote Lineup Application

Data Science Research Fellow

Social Innovation and new pathways to social changefirst insights from the global mapping

Why Foresight: Staying Alert to Future Opportunities MARSHA RHEA, CAE, PRESIDENT, SIGNATURE I, LLC

2010 World Programme on Population and Housing Censuses Final Report March 2009 to February 2010

ITU Telecom World 2018 SMART ABC

Australian Census 2016 and Privacy Impact Assessment (PIA)

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

Creating a Public Safety Ecosystem

PRIVACY IMPACT ASSESSMENT

Artificial intelligence and judicial systems: The so-called predictive justice

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION

Programme for Promoting Media Literacy in the Republic of Macedonia. Agency for Audio and Audiovisual Media Services

Information Sociology

NORWAY. strengthening public demand for broadband networks and services

Facebook: A Beginner s Guide

General Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY

Impact and Innovation in H2020 Proposals and projects

Enpr EMA. Enpr-EMA. European Network of Paediatric Research at the European Medicines Agency

Enforcement of Intellectual Property Rights Frequently Asked Questions

COMMISSION OF THE EUROPEAN COMMUNITIES

Staffordshire Police

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break

ICT10 - Collective Awareness Platforms for Sustainability and Social Innovation

I ve made a new friend online. But I m worried. What do I do?

Introduction to Foresight

The NGI vision. Silvana Muscella BUSINESS, CAREER & FUNDING OPPORTUNITIES, W HILE DEVELOPING A HUMA N-CENTRIC INTERNET 27 MARCH MILAN, ITALY

The Technology Circus: How to Bring it All Together. Alan Tacy Infrastructure Practice Lead

Photography and Videos at School Policy

DELIVERABLE SEPE Exploitation Plan

Design and technology

As a pioneer in the field of corporate sustainability in Italy, Telecom Italia has established a new

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

School of Informatics Director of Commercialisation and Industry Engagement

UN-GGIM Future Trends in Geospatial Information Management 1

Accenture Technology Vision 2015 Delivering Public Service for the Future Five digital trends: A public service outlook

Beyond the Smart City: Towards an open, equitable, democratic and circular City

A Field Guide to Exploring

HAREWOOD JUNIOR SCHOOL KEY SKILLS

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

Exploring the New Trends of Chinese Tourists in Switzerland

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

Designing measures for behavioural change

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate?

Call for Chapters for RESOLVE Network Edited Volume

MEDIA AND INFORMATION

COMMISSION RECOMMENDATION. of on access to and preservation of scientific information. {SWD(2012) 221 final} {SWD(2012) 222 final}

Years 9 and 10 standard elaborations Australian Curriculum: Digital Technologies

About the Office of the Australian Information Commissioner

HELPING BIOECONOMY RESEARCH PROJECTS RAISE THEIR GAME

Committee on Development and Intellectual Property (CDIP)

A Comprehensive Statewide Study of Gambling Impacts: Implications for Public Health

frogmob [Design Research] Tuesday, April 10, 2012

A tool on Privacy Enhancing Technologies (PETs) knowledge management and maturity assessment

Published as: Griffiths, M.D. (2011). Gaming convergence: Further legal issues and psychosocial impact. Gaming Law Review and Economics, 14,

Researching Digital Drift

28 TH INTERNATIONAL CONFERENCE OF DATA PROTECTION

Communication Major. Major Requirements

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

Getting the evidence: Using research in policy making

Strategic Plan for CREE Oslo Centre for Research on Environmentally friendly Energy

ARAMINTA FREEDOM INITIATIVE

The key element of this exam is a discussion which goes beyond identifying what the contemporary media do, and focuses on why they do what they do.

Circuit Programme Handbook

02.03 Identify control systems having no feedback path and requiring human intervention, and control system using feedback.

WIPO Development Agenda

Coming Out. Making the Virtual Library Visible in Today s World. Dr Grace Saw and Janine Schmidt

OMCL Network of the Council of Europe GENERAL DOCUMENT

Science2Society Boosting innovation efficiency across Europe

British Triathlon Guidelines for the Use of Photographic & Video Images of Children/Young People under the age of 18

THE STATE OF UC ADOPTION

COST FP9 Position Paper

Name Position Telephone First contact. [redacted under

Country Paper : Macao SAR, China

Digital transformation in the Catalan public administrations

Transcription:

TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES Trilateral Research Ltd. Crown House 72 Hammersmith Road W14 8TH, London + 44 (0)20 7559 3550 @Trilateral_UK

TRILATERAL RESEARCH LTD Trilateral Research is a leading London-based multidisciplinary research, consulting and technology development company Small enterprise (SME) 28 staff members Involved 20-25 projects at any given time Almost all research and technical staff have postdoctoral experience ( 90% have PhDs) Extensive publication list and excellent international profile

Funded by the European Commission under the 7 th Framework program Grant agreement no: 607669 May 2014 April 2016 TRACE WEBSITE http://trace-project.eu

Technology Increase knowledge on perpetrators Support countertrafficking efforts Info on responding to the criminal enterprise behind THB TRACE Handbook Current & future trends

WHAT WE DID AND WHY WE DID IT Identified and mapped different types of technologies being used to facilitate, prevent & combat human trafficking Category 1 web-based (internet, applications) Category 2 software & hardware Assessed the use Identified trends (current and future) Provided guidance for the TRACE audience: Civil society organisations Law enforcement agencies Policy makers Methodology to produce: 1 x report, briefing papers, handbook

FACILITATION Technology facilitated trafficking: [ ] the social and technical ecosystem wherein individuals use information and communication technologies to engage in human trafficking and related behaviors. (Latonero et. al) Facilitation of human trafficking for sexual exploitation through: Recruitment Exploitation

FACILITATION Web-based Adult entertainment Social networking sites Advertisements & classifieds Applications (Instagram, skype) Web sites (including dark web) online dating sites online forums Peer to peer networks Hardware & software Cameras, video, images & other recording devices Telephone, mobile & landline Desktop computers, laptops & tablets Scanners, fax machines Television programming services Email

FACILITATION EXAMPLE: X & J X, y & ors. Charged with human trafficking having sexually exploited minors including J. Key technologies facilitated recruitment & exploitation: - Public chat room - Private messenger - Text message - Camera phone: Photographs - Video

FACILITATION EXAMPLE: DARK WEB Name: Nicole Age: 18 years old Ethnic origin: Caucasian Country of Origin: United States Abducted in: Paris Held in: EU Weight: 47kg Measurements: 32A-24-34 No STDs Nicole s starting bid is set at 150,000$. Auction set to 19 July 2015.

FINDINGS Technology solutions facilitate communication and easy travel, all key ingredients in the business of human trafficking for sexual exploitation. Technologies should not be treated in isolation. Rather, it is often a combination of technologies that are used for recruitment and exploitation. Social networking sites and key applications (instagram) that enable two-way communication and the sharing of video and image are instrumental in the recruitment and exploitation of trafficked persons. However, the extent to which SNS are utilised for technology facilitated trafficking in different member states is not yet known Users of SNS disclose a large amount of personal information about themselves and others intentionally & unintentionally, including location tracking. This can disclose the whereabouts of trafficked persons after they have escaped. Paramount that individuals are educated about the dangers of making personal information available online.

COMBATTING After trafficking and exploitation have occurred and requires action/ enforcement Technologies can potentially assist in combatting human trafficking for sexual exploitation: Range from online databases to collaborative tools Combatting human trafficking and assisting victims = mass of data Databases and data analytics information can be stored, organised and analysed in an efficient and useful manner Financial monitoring of business aspects of human trafficking can interrupt flow and disrupt business

COMBATTING Web-based Online forums Crawler tools Online petitions Crowdsourcing Web sites Adult entertainment Social networking sites Hardware & software Case management tools Police computerisation system and databases Financial tracking Geographic information systems I2 software Email

COMBATTING - EXAMPLE UNODC case law database Publicly available repository of summaries & full court cases to support successful convictions 2014 more than 1000 cases from 83 countries People can contribute new cases directly by contacting the UNODC

COMBATTING EXAMPLE: X & J J s mother contacted police. Key technologies used in police investigation and prosecution: examined J s mobile phone wire tapping service intercepted incriminating emails located hard drive 300 photos of minors evidence given via video link for court case

FINDINGS The use of technology by traffickers leaves a digital footprint, which law enforcement officials should follow. In addition, law enforcement agencies should follow the money, and can use technological tools to do this. Social media is a useful tool to combat human trafficking. Traffickers may have accounts on social media. Trafficked persons may know about these accounts, especially if they were initially friends with the trafficker or were recruited via social media. By following the traffickers on social media, law enforcement officials can engage in investigative work. Data analytics and data visualisation tools help process data to provide meaningful insights on elements of human trafficking such, as demographics of victims, hot spots, networks.

PREVENTION Technology-based prevention initiatives target the time period before acts have occurred Aim to lessen the risk for potential trafficked persons Initiatives involve the use of the internet and other web-based technologies to: Provide education and training activities Information and awareness raising campaigns Research Training of officials Potential for technology tools to assist in prevention by: Exposing Monitoring human trafficking

PREVENTION Web-based Adult entertainment Social networking sites Applications (Instagram, skype) Web sites online petitions online forums Hardware & software Computer games Financial tracking Television programming services Email E-learning training programs

PREVENTION EXAMPLE Prevention through social media & awareness raising

PREVENTION EXAMPLE: X & J J & mother + civil society organisation created an online campaign about the dangers of online grooming. Website includes: Informative leaflets Explanatory videos (how to recognise grooming) Online forum

FINDINGS Technology gives communities social empowerment Members of the public are able to become involved in prevention through: Games Forums Websites Petitions However, it is uncertain to what extent trafficked persons are aware of technology-based prevention efforts

POST TRACE RESEARCH TRACE+ TRACE+ VISION Provide a data analytics platform that can be taken to market, and a training package, to improve investigation capabilities and better understand the data, and its value, surrounding the crime of THB. In the long run this will allow the solving of the crime more rapidly, reduce social impact and costs of investigations and enhance the day-to-day work of LEAs in combating human trafficking. Furthermore, TRACE+ will provide recommendations for policy makers on how to harness the benefits of technology in fighting human trafficking. Existing disparities (8 Law Enforcement Agencies interviewed) in the use of technology, including data analytics Few initiatives around web crawling

CAN WE USE CROWD KNOWLEDGE SOURCING TO HELP VICTIMS OF SEXUAL EXPLOITATION? In the on-going search for how to solve missing pieces of a crime puzzle and related to this, recognising their own limits, Europol launched a Crowd Knowledge Sourcing website: https://www.europol.europa.eu/stopchildabuse. Community Policing example

EUROPOL S INITIATIVE

No matter how ideal a technical control system may appear in the abstract under ideal laboratory conditions or successful in the short run, the world of application is often much messier and more complicated than the public relations efforts claim G. Marx privacy and ethical implications unintended consequences requirement for an active public Motivation (?) Momentum (?)

BUT ALWAYS REMEMBER. Technology is neither good nor bad; nor is it neutral. - Melvin Kranzberg. Technology always needs to be justified, controlled and serve a purpose and not be developed for the sake of it. Good to undertake a PIA+ (Privacy Impact Assessment with Social and Ethical considerations)

CONTACT US E-mail: anna.donovan@trilateralresearch.com julia.muraszkiewicz@trilateralresearch.com Website: http://trilateralresearch.com Twitter: @Trilateral_UK Phone: +44 (0)207 559 3550 Address: Crown House 72 Hammersmith Road W14 8TH, London United Kingdom