SlideShare a Scribd company logo
1 of 8
Download to read offline
ASSJ, Vol.3: 01 (2018) 1095 – 1102
Contents lists available at: www.innovativejournal.in
ACADEMY OF SOCIAL SCIENCE JOURNAL
Journal homepage: http://innovativejournal.in/assj/index.php/assj ISSN: 2456-2394
1095 Academy of Social Science Journal, vol. 03 Issue 01, January, 2018
Research Article
Analyzing the influence of Information and communication Technology on the scourge
of human trafficking in Rwanda
Gacinya John
MSc-Criminology-PhD Research Scholar -Mount Kenya University
ARTICLE INFO ABSTRACT
Corresponding Author:
Gacinya John
Keywords : Human trafficking,
Information communication
technology, Globalization
Rwanda‟s Information Communication and Technology (ICT) sector is among the
fastest growing ICT sectors in Africa. Mobile phone penetration had risen to 65%
and internet spread was above 20% in 2013. ICT is double edged and has had
positive and negative effects to the Rwandan society. It is hoped that Information
communication technology is likely to reduce unemployment and transform the
country into a competitive, knowledge based economy. On other hand, ICT has
facilitated human trafficking and trafficked people have had physical and
psychological suffering due to labor and sexual exploitation. Human trafficking is
prevalent despite government effort to eradicate it. The main objective of the
study is to analyze the role of Information Communication technology in
facilitating human trafficking in Rwanda. Qualitative research design and
documentary technique were applied for the study. The findings of study indicate
that human trafficking crimes are clandestine in nature.ICT in terms of internet
and mobile phones is used in the processes of human trafficking that include;
recruitment,transfer,transportation and exploitation of the victim. Online sex
trafficking and recruitment of human trafficking victims is done using social
media and mobile phones. Law enforcement officials have made significant
progress in mobile phone tracking during victim rescue, there has been installation
of the cybercrime facility to detect cyber-crimes, also Interpol communication
system-the I-24/7 has been installed at most parts of the Rwandan border of entry
to track and rescue trafficked individuals. There has been provision of mobile
phones to the rural women to relay information related to human trafficking to the
police. Other than that all subscribers of mobile cellular services are registered in
the country as well as legislation on punishment for applying ICT to commit
human trafficking crimes. Thus, recommendations are that; The Rwandan
population should endeavor to cooperate with the government bodies to provide
information for those ICT to traffic people; the public should be educated on the
good and bad use of information communication technology. There should as well
be inter sectoral linages in the fight against human trafficking facilitated by ICT.
Regional and international cooperation related to the combat of human trafficking
related to ICT is key, and international law against use of ICT to traffic people
should be in place.
©2018, ASSJ, All Right Reserved
1. Introduction
According to Isiaka et al (2015), Information communication
technology was developed by the United states depart of
defense in 1969.The first technological invention was the
telephone that was invented in the 19th
century and this
shortened time of communication. Radio and wireless
communication was the second technological invention. In the
current period information communication technology is
applied in the form of internet and this has facilitated
information flow in real time. It is in this respect that human
traffickers are using information communication technology to
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1096 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
speed their operations with least difficulty as internet is
borderless, (Rodas, 2014).
Globalization has facilitated the expansion of information and
communication technology and information is more available
and this has helped to transform peoples‟ life, especially for
those doing legal businesses, (UNGIFT, 2008).In the current
period the number of internet users has risen to 1.8 billion
worldwide and this is growth on internet by 400%, (Rachel,
2011). Financial proceeds from Internet pornography industry
alone generated 2.8 billion USD in 2006.
Information communication technology accesses information
to people by the use of a computer and internet application
services such as ;web sites, Search engines, Pornographic
spams, chat rooms, file transfer protocol, File swapping
programs and peer to peer networks. It is with these internet
application services that human trafficking can be carried out,
(Chawki &Wahab, 2004).
Different methods are used to commit the crime of human
trafficking. The offender and the victim can meet on the
facebook and express love and admiration to each other.
Location can be set for the meeting and then an air ticket sent
to the victim. The other method applied by traffickers to trap
the victim is to advertise that an employment waits for these in
need of the job, and then the unsuspecting victim accepts job
offers and travels to locations suggested by traffickers. The
end of it all is that the trafficker begins to deny any kind of
communication to the victim, (Herbert, 2013).Sex trafficking
in most cases occurs where facebook friends (predator and
victim) get used to one another until confidence builds,
(Oduor, 2017).
Combat Human trafficking crime has had challenges as
information communication technology does not respect
national borders as is the case with the law enforcement
agencies. Traffickers take advantage of communication
infrastructure provided by the governments to recruit victims
of human trafficking, yet many governments do not have the
means to detect and prevent trafficking of human beings by
use of Information communication technology, (Linda &
Baker, 2013).
Human trafficking crime combat has had another challenge of
lack of cooperation among anti-trafficking organizations lack.
Organizations compete rather than complement each other in
the exercise of human trafficking combat.Anti trafficking
organizations have competing values, missions, and funding.
Organizations are reluctant to share information and there is
often mistrust, privacy, public safety and gaps in terms of
technology, (Latonero, 2011).
Information communication technology has been used for
sexual and labor exploitation. US based corporations have
obtained cheap labor for exploitation from India and the
Philippines. Western Europe and North America have had
regular supply of sex workers from the developing world by
use of information communication
technology.Generally,worldwide expansion and use of
internet has speeded up sexual exploitation greatly, (Rahman,
2011).
Rare opportunities to human trafficking combat rests with
organizations such as; the Interpol, the G8 Sub-group on
High-Tech Crime, the Virtual Global Taskforce, Internet
Watch Foundation (IWF) and The Virtual Global Taskforce
(VGT).The afore mentioned organizations collaborate with the
international law enforcement agencies to use technology and
share intelligence, information and resources in the fight
against human trafficking. Virtual Global Task force
collaborates with law enforcement agencies to protect children
from exploitation. They identify location, and help children at
risk. Virtual Global Technology creates websites with images
of child abuse and this is done to attract traffickers to the
website. It is with these websites law enforcement officials
monitor to establish wrong elements wanting to abuse
children, (Rachel, 2011).
There is also the G8 Sub-group on High-Tech Crime which
comprise of; Canada, France, Germany, Italy, Japan, Russia,
the United States, and the United Kingdom. The group of
eight countries established the G8 “Sub-group” on High
Technology to Prevent, investigate, and prosecute cybercrimes
that involved computers, (Rachel, 2011).
There is also the Council of Europe‟s Convention on
Cybercrime which provides procedures and investigative tools
for law enforcement worldwide in order to prevent and combat
all types of internet crime, including trafficking in
persons,(Linda & Baker, 2013).
Private technology giants have also joined the fight against
human trafficking. Google, Palantir Technologies, Microsoft
Digital Crimes Unit, Microsoft Research, LexisNexis and
NGO Thorn have joined the fight against human trafficking
and do provide funds and technical knowhow in identifying
human traffickers,( Herbert ,2013).
Information communication technology has been used to
detect and apprehend traffickers by developing platforms that
can capture calls from the trafficking reporting hotlines of
various organizations and distributes those phone calls via text
or email among those organizations, (Latonero, 2011).
Further, human trafficking can be prevented by use of Short
Message Service (SMS) technologies to inform the public of
the possibility of human traffickers presence and their plans to
manipulate and recruit people. More so, mobile devices and
SMS technologies have enabled victims of human trafficking
to contact service providers for support. Again, Social media
platforms have also been used to raise awareness of human
trafficking globally, (The US state department, 2013).
In a similar manner, law enforcement officials have been able
to identify victims by use of facial recognition software and do
locate minors who are being exploited on line. Law
enforcement officials are also able to trace text messages from
phones and computers. The same applies to voice mails and
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1097 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
web browsing history to produce evidence for prosecution
purposes, (US state department, 2013).
Cybercrime is on the rise on the continent of Africa.
Computers and servers are not protected and crimes such as
human trafficking and financial fraud do take place. Fighting
human trafficking by use of technology requires a coordinated
effort. In East Africa a task force from different stakeholders
that include the governments, industry and civil society has
been formed in order to fight human trafficking and other
crimes that emanate from use of a computer. This implies that
legal, policy and regulation matters will be harmonized
(Quartie & Odoom, 2012).
Rwanda is vulnerable to human trafficking as conditions that
breed human trafficking are conducive. In the first case
Rwanda is a Country with the fastest broadband Internet speed
in Africa. There are about mobile money subscribers were 2.5
million in 2013, Mobile phone penetration is rapidly
increasing and is now estimated at 65%. Internet Penetration is
currently at 20% and it is envisaged to reach 95% in the next
five years, (Rwanda National youth policy, 2015). More than
50 per cent of the adult Rwandan population own and use
mobile phones for communication. Electronic media are
available and the public is encouraged to use ICT as a modern
technique to exercise their right of access to information.
Cyber cafés and Tele-centres are also available in different
districts of the country while an ICT bus travels to some
remote rural areas, which are not yet connected to internet, to
allow them to have access to modern tools of information and
communication, (Rwanda Human rights council 2010).
Coupled with the availability of Information communication
technology, the Rwandan population that has youths who are
unemployed and underemployed. There are about 7000
children living and working on the streets of Rwanda. Most
street children are boys and many have never been to school.
About 352,550 children aged between 5-17 years of age were
active in the labor force and over 83% were engaged in
agriculture alone and over 11% in domestic work by
2002.About 21 % of the Rwandan children have lost one or
both parents due to conflict past and HIV/AIDS pandemic.In
2010 about 101,000 children were house hold heads of 42 000
families, This leaves the youth potentially vulnerable to
human trafficking, (Rwanda strategic plan for child‟s rights,
2011).
There is also evidence of internal and cross-border trafficking
of girls and women, as well as cross-border movement of
children for commercial sexual exploitation. Human
trafficking in all its forms (Internal and international) is
present. Police statistics reveal 153 cases of human trafficking
registered between 2009 and 2013, with the majority of the
victims being young females below the age of 35.The number
of cases could be higher than the afore mentioned number but
the covert nature of human trafficking undermines
quantification,( Rwanda National youth policy 2015).
2. Problem statement
While the rapid use of digital technologies worldwide like
mobile phones, social networking sites and the Internet has
provided significant benefits to society, more new channels
and potential opportunities for exploitation have also
emerged. Increasingly, the business of trafficking in persons is
taking place online and over mobile phones. The positive side
is that the same technologies that are being used for trafficking
in persons can become a powerful tool to combat the same
threat. The key role that digital technologies play in human
trafficking still remains unclear, however, a closer
examination of the phenomenon is vital to identify and
respond to new threats and opportunities. Rwanda has the
fastest growing information communication technology sector
in Africa. About 50% of the adult population in Rwanda own
mobile telephones. Mobile phone penetration is thought to
have reached 65% in the current period and internet
penetration is at 20%. Electronic media are available in
Rwanda and the public is encouraged to use ICT as a modern
technique to exercise their right of access to information.
Rwandan government has campaigned against human
trafficking through public awareness, regional cooperation,
law enforcement, improved border security and legislation, but
cases of human trafficking seem to keep rising as more than
153 cases have been recorded since 2009 which number could
even be greater as of today. Use of ICT has become a major
platform on which trafficking in persons is practiced in
Rwanda. But the same technology can be used to combat the
menace .This is so urgent that president Paul Kagame calls for
regional cooperation in terms of sharing information and using
latest technologies in combating human trafficking( Rwanda
National police magazine 2016).From this background ,there
is every need for a study to be conducted on how ICT
enhances human trafficking and how it can be used to prevent
and combat the very threat in Rwanda.
3. Research Objective
The main objective of this study is to analyze the role of
Information Communication technology in facilitating human
trafficking in Rwanda. Specifically,
(1) To analyze the influence of technology in facilitating
human trafficking in Rwanda.
(2) To analyze the extent to which Rwanda has been able to
combat human trafficking using technology.
4. Literature review
Asiimwe, (2014) notes that Rwanda is a developing country
and lacks economic opportunities and as such people have to
look for these opportunities elsewhere. One of the means and
ways used is the internet and social media .The Internet and
social media, thus influence the unsuspecting people to go out
and rush for the supposed opportunities and in the process are
trafficked. In this sense the researcher concurs with the author,
access to social media and the internet have penetrated
Rwanda and this provides the platform for traffickers to
exploit victims easily.
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1098 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
Leva Pundina (2013) shares the view that information
communication technology has brought benefits and has
weaknesses in the current period. Law enforcement officials
are able to track human traffickers‟ cell phones and do
understand their criminal activities more and better. However,
information communication technology has also facilitated
criminals to create online platforms to recruit vulnerable
people they identify as targets. One difficulty obtaining is that
electronic information available is often fragmented and is
subject to privacy rules. In the case of Rwanda, Cyber-crime
detection is already in place to track human trafficking
suspects. However; Cyber-crime detection has not covered the
whole country.
United Nations global initiative to fight trafficking (2008)
Indicates that traffickers have used Information
communication technology to communicate with potential
victims via the internet and websites during recruitment
processes. Likewise information communication technology is
used to transfer funds obtained from human trafficking from
one country to the other by use of ICT in a way that looks
lawful. Other than recruitment of victims and transfer of
funds, ICT bears pornographic websites advertising women
for sexual exploitation. These women are forced to perform
live sex for sale and may not know that they appear on the
websites. In Rwanda criminals communicate with victims by
use of ICT.However, there has not been any evidence of live
pornographic material produced and distributed for sale.
Elliott & McCartan (2013) assert that there is a growing
concern that sex trafficking is facilitated by the internet and
online sex trafficking respects no national borders.I CT by use
of internet has given opportunities for human traffickers to
advertise victims they hold. Online networking sites such as
Craigslist, MySpace and Facebook are being used for
trafficking. In the case of Rwanda, traces of Facebook and
whatsapp have been found to transmit sex trafficking affairs.
Channing (2017) indicates that human traffickers have in
recent times improved their mode of operations. They have
expanded their recruitment, transportation, control and
exploitation of victims perfectly as a result of use of internet,
social media and have used deceptive online advertisements to
recruit individuals for both sex and labor trafficking. In line
with the author, Rwanda faces a similar situation of online
recruitment supported by rapid spread of the internet in the
country.
Chibba (2013) underscores the importance of protecting
women and children who are exploited via internet sex
trafficking. Internet sex trafficking involves human traffickers
who lure young girls and women into internet dens and forced
to have sex with men while operating computers and cameras.
In Philippines, women and girls come into the den after job
opportunities are promised. They are forced to have sex and
pictures produced are for sale. Rwanda organic law N°
01/2012/OL of 02/05/2012 strongly prohibits criminals who
distribute any pornographic material and currently no cases of
pornographic pictures produced for sale to the public.
Latonero (2011) states that ICT is the greatest facilitator of
commercial sex trade in all countries. In the case of the United
States of America Google search has identified more than
5000 websites that facilitate sex trafficking and sex tourism. In
the case of labor trafficking, victims are mostly recruited the
developing world and this mostly done by word of mouth. The
same case for Rwanda, ICT has become a meeting point for
traffickers and victims to carryout transactions for sex and
labor trafficking.
Kunze (2010) observes that there are no limitations to the
operations of human traffickers because no international law
that exists to prohibit trafficking via ICT.All countries have
domestic law which is restricted to the borders. Traffickers
can carry on human trafficking operations without crossing the
borders because of ICT.This is again because information
communication technology makes it possible for traffickers to
recruit, advertise and even sell victims as they share
information by means of information communication
technology. Borders have no limitations to the flow of
information required by criminals. They are able to commit
cases of human trafficking away from their location. Besides,
traffickers can use information communication to arrange for
sex tours. ICT applications such as chat rooms, message
boards, peer to peer file sharing servers, news groups, and
websites are used by criminals to obtain information about
sexual tourism destinations. In Rwanda, human traffickers use
mobile phones and social media to make contacts to the
victims. Laws are also restricted to the borders. However;
interstate cooperation which exists among East African
member countries has helped to mitigate trans boundary cases.
According to Kate (2004), finds that Europe is mostly the final
destination of many trafficked women for sexual purposes
around the world. Most of the trafficked women are mostly
used in brothels, bars, nightclubs, cafés, the streets and
massage parlours, saunas, escort agencies, hotels and even
private homes. In the Netherlands, pimps use Internet to
contact young women for sexual exploitation. In the Rwanda
situation ICT facilitates sex trafficking among the girls and
destinations are mostly regional countries.
Mendel & Sharapov (2014) are of the view that the Internet
and online networks have facilitated human trafficking in the
recent years. Internet has enabled traffickers to operate with
increased ease and efficiency. Social networking, online
classifieds and dating websites are used to recruit and
advertise sex trafficking and labor. The researcher concurs
with the author, however no websites that advertise labor and
sex trafficking.
Kabance (2014) advances that International trafficking
networks have thrived due to technological advancements in
the age of globalization. Media has been instrumental in the
rapid spread of information transnationally. Trafficking
networks have also used cell phones and the Internet to carry
on international operations to recruit and transport human
beings for sexual exploitation. However, Kabance,(2014) also
argues that ICT is capable of fighting against human
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1099 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
trafficking. Governments, organizations and law enforcement
use ICT to detect, track, and shut down criminals operations.
Help hotlines have been used to assist victims in rescue
operations. This kind of situation applies to Rwanda where
specific mobile phone numbers are widely distributed in all
police stations being coordinated by “Isange one stop center”.
Latonero, (2012) finds that anti-Trafficking digital
communication technology is being used in the fight against
human trafficking and the public is concerned and taking part
in online anti-trafficking interventions. The public
involvement in making online petitions against human
trafficking. Crowd sourcing, Facebook and twitter have
informed the public of the presence of traffickers. As an
example, Digital activists against human trafficking like
change.org which petitioned craigslist to shut down the
websites known as „adult services‟ in 2010. Latonero, (2012)
also states that Facebook and twitter are used to fight human
trafficking. NGOS that fight human trafficking have used
Facebook to reach a very large audience. For example an
NGO, ECPAT UK has more than 29,000 members and with
Facebook facility they inform the public more about human
trafficking. Twitter serves as a hub for human trafficking
activism. With Twitter individuals and organizations share
information about human trafficking, raises the awareness,
mobilizes support and puts pressure on individuals and
organizations fight against human trafficking.
Quarshie, (2014) argues that ICT technology has been used to
commit human trafficking crimes such as child pornography.
Africa needs to take advantage of modern technology by use
of CCTV technology, tracking technology, social media and
mobile phone to combat human trafficking.Quarshie
commends that African leaders need to embrace the use of
technology to meet future demands in investigations and
prosecution. In the case of Rwanda, distributing mobile
phones to the civilian population by the national Police of
Rwanda is meant to provide information regarding human
trafficking that can be used in investigation and prosecution of
human trafficking cases.
Longe et al, (2009) point out that information communication
technology has widely spread in Africa and has at the same
time influenced human trafficking in the process. Child
trafficking, prostitution and pornography are on the
rise.Webiste sexual content has remained of interest to the
youth and scholars have found out there is a positive
relationship between website sexual content such as
pornography and sexual beliefs, attitudes and behavior in
Nigeria.Longel et al (2009), continuous to state that Nigeria
has used web filtering programs to remove sex related material
from the internet. Child Trafficking prevails in Africa and
children are trafficked to the western world and have ended up
on the streets, brothels and massage parlors. Internet and
mobile phones have also facilitated prostitution in the sub
Saharan Africa .Tourists who seek travel locations are
misdirected into webs that advertise sex tours offering travel
incentives such as pornography and escorts mail order brides.
The majority of the Rwandan Youth have access to webs that
advertise sex related issues and these drive them to develop
behavior towards sex.Such kind of sex behavior have led to
sex trafficking in Rwanda. Cyber-crime center take care by
tracking for criminals involved in human trafficking.
5. Methodology and Material
In this study documentary research was applied. Documentary
research method refers to the analysis of documents that
contain data about the phenomenon under study. Previous
studies were used to collect data and there was much reliance
on description and interpretation of data rather than collecting
raw data in accordance with Glenn, (2009). The documentary
research method was used in investigating and categorizing
physical sources, most commonly written and non-written
documents, whether in the private or public domain as stated
by Harelimana, (2015). The data inclusion criteria depended
on; authenticity, credibility, representativeness and meaning
attached to evidence, (Ahmed, 2010).Most of the obtained
data was from; books, brochures and minutes of meetings,
electronic journals, press releases, diaries, background papers,
event programs, letters and memoranda, newspaper articles,
press release, program proposals, radio and television
program, institutional reports and public records.
6. Results and Discussion
According to position paper for the Economic and Social
Council, (2014) Rwanda is a developing country and
vulnerable to human trafficking owing to her location in a
conflict zone and the political past. Rwanda hopes to eliminate
transnational organized crimes that include human trafficking
by use of technology. Rwanda has vulnerable people of
different categories; thus there are refugees from other
countries such as DR Congo, Burundi and returnees from
Tanzania. Over 95,000 refugees came from Burundi and there
are about six refugee camps of refugees from DR Congo.
These are vulnerable people enough to be trafficked. The rapid
increase in the use of ICT has hasted human trafficking as the
number of vulnerable refugees keeps rising.
The Council working Group on children online protection in
Rwanda, (2016) indicates that, since 2000, the Government of
Rwanda implemented National Information Communication
Infrastructure (NICI) programs that helped to distribute more
computers to young students. The increase of the mobile
devices and smart devices also triggered the use of ICT in the
country. Equally, the tele-centers that have been constructed in
the country played a big role in Internet usage. These
technologies and ICT penetration have introduced new types
of threats such as online sex trafficking. The internet and
mobile phones have spread to low segments of the Rwandan
community that includes the poor and the young.
Opportunities of exploiting the youth for traffickers exist in an
environment of vulnerability, access to information and good
communication. Online transactions include advertising and
recruiting .This has made it so difficult for the security system
to combat human trafficking.
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1100 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
In 2014 the parliament and other high institutions in Rwanda
found out that girls were the ones involved in human
trafficking online. Cases are there where young girls are
enticed to go outside the country to seek opportunities that
exist there and this is mostly done by use of mobile phones. It
is unfortunate the young girls accept traffickers blindly due to
ignorance about sex traffickers, (New times reporter, 2015).
Such cases have increased steadily as they are facilitated by
quick access to internet and possession of more mobile phones
than they had in 2014.This meets an increased number of
unemployed girl population who are desperate for jobs to meet
their life desires.
To protect the child online, Rwanda ICT regulator, (RURA)
took the initiative to ensure that all subscribers of mobile
cellular services are registered in the Republic of Rwanda.
This exercise was intended to address several issues, related to
security and social problems. Rwanda ICT regulator further
developed guidelines governing the Operations of Internet
cafés in Rwanda that protect children from harmful Internet
content. It sounds like some online services are not protected
fully to counteract some online transactions between
traffickers and potential victims. This has contributed to a
steady increase in human trafficking cases facilitated by ICT
despite government efforts to combat the vice.
The Government of Rwanda has enacted the Organic Law N°
01/2012/OL of 02/05/2012 instituting the penal code that
penalizes any person, who displays, sells, rents, disseminates
or distributes pornographic pictures, objects, movies, photos,
slides and other pornographic materials involving children.
Having such strong legislation yet human trafficking cases are
consistently on a rise indicates that there is a big gap between
strong laws and effective implementation as of today.
According to the Rwanda prosecutor general (2017), Human
trafficking is a new crime, and is occurring in Rwanda. The
Rwanda prosecution department handled 10 cases in
2012/2013, 51cases in 2013/2014, 41 cases in 2014/2015 and
32 cases in 2015/2016 of human trafficking where 10 cases of
human trafficking had no supporting evidence. Victims of
human trafficking are recruited through social media.
Rwanda National Police (2015) observes that Interpol
communication system I-24/7 has been used to track and
rescue trafficked individuals. This has been done through
information exchange. Interpol communication system in
Kigali was able to rescue two Rwandans including a girl
student who had been trafficked to Zambia. A Ugandan girl
was also intercepted at Kigali international airport as she was
being trafficked to Asia. All the afore mentioned operations
were enabled by use of I-24/7 technology. Law enforce
officers are now able to track mobile phone print outs to locate
trafficked girls through Interpol operations. As an example a
Rwandan girl from Kimisagara suburb of Kigali city was
rescued from Kampala where she had been trafficked. It came
to be understood that the trafficked girl had been enticed to go
with a friend to Kampala who promised her to obtain a job in a
supermarket. The trafficked girl was rescued after her
telephone and the telephone of the trafficker were tracked by
Interpol, (Kwizera, 2015).
This suggests that if well utilized by increasing cybercrime
centers that track phone messages of suspects of human
trafficking, ICT can be a strong tool in combating human
trafficking in Rwanda. This will meet the recent development
in Rwanda National police is the installation of the cybercrime
facility to detect crimes that use information communication
technology. This will enable Rwanda national police to
combat internet and mobile phone based crimes, (Rwanda
National Police magazine, 2016).In addition to this remedy,
there is a need to increase data protection so as to deny
traffickers quick access to ICT services.
Sandys, (2005) hints that United Nations entities have worked
to ensure access to and use of ICT by rural women in many
different countries, Rwanda inclusive. The UNDP/Japan
Women in Development Fund has supported programs in
Rwanda to increase rural women‟s access to ICT, but internet
has speeded the exploitation of women and girls by spreading
sexual manners in real time. In a similar move Rwanda
National police has provided mobile phones to the rural people
in order to contact the police in case of security bleach
including human trafficking, Rwanda National police
Magazine, (2014). This has empowered the women
development in the country however, not giving prior training
to the users has facilitated a rapid misuse of the would be
opportunity (ICT). This lack of sufficient knowledge in ICT
usage has provided a platform to traffickers.
Conclusion
Information communication technology is on the increase in
Rwanda. Internet is available in most government institutions
and has even penetrated into the rural areas and access to
information in real time is possible. Mobile phone penetration
is significantly so high, where 50 % of the population of
Rwanda own mobile phones. Electronic media is available and
the public is encouraged to use information communication
technology and this has proved to provide a platform for
traffickers to exploit the potential victims who are already
vulnerable due to other circumstances including
unemployment, influx of refugees and poverty. Law
enforcement officials are handicapped in the face of
information and communication technology that operates un
detected.
On the other hand there is evidence that human trafficking has
been stamped out by use of technology. In Rwanda, traffickers
are tracked until they are apprehended. Cyber technology is
being used to track human traffickers and the I-24/7 Interpol
communication is used to share information on suspected
human traffickers and rescuing the victims through the
information exchange mechanism. This has played a key role
in combating human trafficking in Rwanda.
It is imperative to note that there has been a remarkable
progress in combating human trafficking in Rwanda using ICT
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1101 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
although there is still a gap between good policies in place and
their implementation.
Recommendations
The Rwandan population should endeavor to cooperate with
the government bodies most especially the National police by
providing information in time concerning human trafficking
due to ICT and any suspects in their communities.
Increasing awareness on the proper usage of information and
communication technologies especially the social media can
of a great help in the prevention of human trafficking. This
can be done through community policing and mass
communication to empower a good number of Rwandans
about the role of ICT in human trafficking.
There should be an enhanced multi-disciplinary approach
where the ministry of ICT, National police of Rwanda,
bilateral organizations and Telecommunication companies can
work together to prevent and combat human trafficking in
Rwanda caused by ICT.
Regional and international cooperation related to the combat
of human trafficking related to ICT should be strengthened
and international law to address human trafficking must also
apply on the use of information and communication
technology that facilitates human trafficking crimes. Therefore
harmonization of ICT activities and shading off matters of
privacy, mistrust and reduction of gaps amongst states will
enhance human trafficking combat operations.
References
Ahmed, J.U. (2010).Documentary research Methods: New
Dimensions. Indus Journal of Management & Social Sciences,
4(1), 2010, p.3. http://www.academia.edu/4900830/
Documentary_Research_Method_New_Dimensions
Asiimwe, F. (2014). Factors pre- disposing women and girls to
human trafficking in Rwanda: A baseline survey and needs
assessment report, Kigali, Pp.19-36 www.faasirw.org/.../
BASELINE%20%20SURVEY%20AND%20NEEDS%2...
Bishumba,N.(2017, Sept 12). GBV: Prosecutor calls for
tougher punishment.The Newtimes,p.1, http://www.newtimes.
co.rw/ section/read/208169
Channing,M. (2017). Transnational Crime and the Developing
World.USA,(Washington DC): Global financial
integrity,P.12.www.gfintegrity.org/wp-content/uploads/
2017/03/Transnational_Crime-final.pdf
Chibba, M. (2013). Human Trafficking and Migration:
Concepts, Linkages and New Frontiers. Global Policy,
Economics Research (UNU-WIDER):Helsinki,p.6
.www.globalpolicyjournal.com/.../Chibba%20-
%20Human%20Trafficking%20and%2.
Denge, B. (2017 Jun 16). Use digital technology to fight cross-
border trafficking in South Asia.Hindustantimes, India: New
Delhi. http://www.hindustantimes.com/opinion/use-digital-
technology-to-fight-cross-border-trafficking-in-south-
asia/story2gQmiYmtgty1xNiYooy7vI.html
Donovan, M. (2017). Technology in the fight against
trafficking: Tracking criminals and helping victims.
Washington DC: National Consumers League, P.1,
http://www.nclnet.org/trafficking_tech
European Commission. (2016). Report on the progress made
in the fight against trafficking in human beings. European
Union: Brussels, p.9. https://ec.europa.eu/...human-
trafficking/trafficking...human.../commission_report_on.
Elliott, J. & McCartan, K. (2013). The reality of trafficked
peoples access to technology. Journal of Criminal Law, 77
(3). Bristol: University of Western England pp. 255-273.ISSN
0022-0183 Available from: http://eprints.uwe.ac.uk/20992
Glenn, B.(2009). Document analysis as a qualitative research
method. Qualitative research journal , vol. 9, no. 2, 2009.
USA: Western Carolina University, p.2
http://www.academia.edu/8434566/document_analysis_as_a_
qualitative_research_method
Herbert, B.D. (2013). Human Trafficking and the
Internet.Judges’Journal-American Bar Association, Vol. 52
No. 1, USA: Washington D.C, https://www.americanbar.org/
publications/judges_journal/2013/winter/human_trafficking_a
nd_internet_and_other_technologies_too.html
Isiaka,A.A.et al.(2015). The Growth and Impact of
Information and Communication Technologies in Africa.
International Journal of Electronics and Electrical
Engineering. 3(1), 2015, Akule: School of Engineering and
Engineering Technology, p.1. www.ijeee.net/uploadfile/
2014/0324/20140324021146366.pdf
Kabance, K. (2014). The Globalization of Sex Trafficking.
P.8-
36.https://ucollege.wustl.edu/files/ucollege/imce/iap.kabance.d
rp_.pdfz
Kate,C. (2015). Combat Trafficking in Human Beings:
Literature Review and Industry Context.University of west
London, Pp.10-18. https://www.brookes.ac.uk/Documents/
Microsites/Combat-THB-Literature-Review
Kunze,I.E.(2010). Sex trafficking via the internet: How
international agreements address the problem and fail to go far
enough. Journal of high technology law.Vol.10 (2). Suffolk
University,https://www.suffolk.edu/documents/jhtl_publicatio
ns/kunze.pdf
Kwizera, E. (2015, September 13). Girls trafficked from
Rwanda, sexually abused in Uganda.Imirasire, p.3,
http://eng.imirasire.com/news/all-around/in-rwanda/article/
girls-trafficked-from-rwanda
Latonero, M.et al,. (2011). Human Trafficking Online: The
Role of Social Networking Sites and Online Classifieds.
Annenberg (University of South California): School of
Communication Leadership and Policy.Pp, 8-31.
Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human
trafficking in Rwanda
1102 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018
https://technologyandtrafficking.usc.edu/files/2011/09/Human
Trafficking_FINAL.pd
Latonero, M.(2012).Technology & Human trafficking: Digital
Activism in Anti-Trafficking Efforts.Los Angeles: Center on
Communication, leadership and policy,Pp.1-3.
https://technologyandtrafficking.usc.edu/digital-activism-in-
anti-trafficking-efforts/
Leva Pundina.(2013). Technology and Human Trafficking:
Friends or Foes? USA: McCain Institute for International
Leadership.http://wiisglobal.org/2013/07/16/technology-and-
human-trafficking-friends-or-foes/
Linda Baker & Marcie Campbell, (2013). Information
Communication Technologies and Trafficking in Persons.
Learning Network, Centre for Research and Education on
Violence against Women and Children page.
Longe, O.et al. Criminal Uses of Information &
Communication Technologies in Sub-Saharan Africa: Trends,
Concerns and Perspectives. Journal of Information
Technology Impact .9(3), 2009, Lousiana: Southern University
and A&M College,Pp.155-172.www.jiti.com/v09/jiti.v9n3
.155-172.pdf
Mendel, J. & Sharapov, K.(2014). Human trafficking & online
networks: Policy Briefing. Budapest: Centre for Policy
Studies, Central European University, Pp.3-13.
pasos.org/.../cps-policy-brief-upkat-human-trafficking-and-
online-networks-2014.pdf
New times reporter,(2015 Jan 21).The ordeal of human
trafficking victim.The new times,p.1,
http://www.newtimes.co.rw/section/read/185155/
Oduor, C. (2017, September 6). Alarm in Kisumu as women
fall victims to Facebook criminals. Standard Media, P.2, Read
more at:
https://www.standardmedia.co.ke/business/article/2001253708
/facebook-date-rape-hits-rocky-village-hill
Quarshie,H.O.(2014). Using ICT to Fight Crime - A Case of
Africa. Journal of Emerging Trends in Computing and
Information Sciences. Accra: University College of science &
technology, Pp.1-4. https://www.researchgate.net/.../
publication/...Journal...Information...ICT...Africa/.../J...
Quarshie, H. O & Odom. A. M. (2011). Collaboration and the
use of Technology in anti- Human trafficking efforts.
University of Colorado, Boulder, USA, Pp.2-10.
scholar.colorado.edu/cgi/viewcontent.cgi?article=1862&conte
xt=honr_theses
Rahman, A.M. (2011). Human Trafficking in the era of
Globalization: The case
of Trafficking in the Global Market Economy. Transcience
Journal Vol 2, No 1 (2011). https://www2.hu-
berlin.de/transcience/Vol2_Issue1_2011_54_71_Glossary.pdf
Rodas, E. (2014). The Multi-Facets of Cyber-Sex Trafficking.
A Call for Action and Reform from Society. The Multi-Facets
of Cyber-Sex Trafficking. A Call for Action and Reform from
Society. Munich: GRIN Verlag, P.1, http://www.grin.com/en/
e-book/ 274893/the-multi-facets-of-cyber-sex-trafficking-a-
call-for-action-and-reform
Rwanda Child‟s rights policy. (2011). Strategic Plan for the
Integrated Child Rights. Kigali: Ministry of gender and Family
promotion, P.14-26. https://www.unicef.org/rwanda/RWA_
resources_icrpstratplan.pdf
Rwanda Human rights council. (2010). The framework of the
universal periodic review. Kigali, P.7, www.undp.org/.../
rwanda/.../RW_UPR%20Report%20submitted%20by%20the
%20G...
Rwanda National Police. (2014).Police Review: Anti-Gender
based violence and child abuse. Kigali: Police Head office,p1.
http://www.police.gov.rw/uploads/tx_download/Rwanda_Nati
onal_Police_at_a_glance_2014_4_pages_HiRes.pdf
Rwanda National police strengthens fight against human
trafficking.(2015 Jan 8).Rwanda National police news,p.1,
http://www.police.gov.rw/news-
detail/?tx_ttnews%5Btt_news%5D=3364&cHash=b13a47abf0
4a0816357ab18b5c6c9d78
Rwanda National youth policy. (2015).Towards a happy
generation.Kigali:NYC,PP.14-18.
www.nyc.gov.rw/fileadmin/templates/template_new/.../Nation
al_Youth_Policy.pdf
Rwanda Police magazine. (2016).President Kagame: Let‟s not
be easy targets for Fraudsters. Kigali: Rwanda National
Police,p.5,https://www.police.gov.rw/uploads/tx_download/P
OLICE_MAGAZINE_No_15.pd
Sandys, E. (2005).Gender equality and empowerment of
women through ICT.United nations: Division of social and
economic affairs, p.14. www.un.org/womenwatch/daw/public/
w2000-09.05-ict-e.pdf
US state Department.(2013).Trafficking in Persons: Topics of
special interest. US State department: Office to monitor and
combat Human traffickinghttps://www.state.gov/j/tip/rls/tiprpt
/2013/210544.htm
UN.GIFT. (2008).The Vienna forum to fight human
trafficking: Human trafficking and Technology, Vienna: Anti-
human trafficking Unit.Pp,2-25. https://www.unodc.org/
documents/humantrafficking/2008/BP017TechnologyandHum
anTrafficking.pdf
UN.GIFT. (2008).The Vienna Forum to fight Human
Trafficking. Workshop: Technology and Human Trafficking.
Austria Center Vienna. Page 1-28

More Related Content

What's hot

Mobile phones, human rights and social justice in africa
Mobile phones, human rights and social justice in africaMobile phones, human rights and social justice in africa
Mobile phones, human rights and social justice in africaDr Lendy Spires
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
 
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...
Analysing the role_of (2) Relation Sandro Suzart  SUZART    GOOGLE INC    Uni...Analysing the role_of (2) Relation Sandro Suzart  SUZART    GOOGLE INC    Uni...
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
 
Understanding digital trends
Understanding digital trendsUnderstanding digital trends
Understanding digital trendshluecke
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to InformationDavid Lewis
 
Global Mobile Data Traffic Till 2015
Global Mobile Data Traffic Till 2015Global Mobile Data Traffic Till 2015
Global Mobile Data Traffic Till 2015Saumen Ray
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
 
Brazil and The Fog of (Cyber) War
Brazil and The Fog of (Cyber) WarBrazil and The Fog of (Cyber) War
Brazil and The Fog of (Cyber) WarLex Pit
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determiningAlexander Decker
 

What's hot (15)

Mobile phones, human rights and social justice in africa
Mobile phones, human rights and social justice in africaMobile phones, human rights and social justice in africa
Mobile phones, human rights and social justice in africa
 
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...
 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
 
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...
Analysing the role_of (2) Relation Sandro Suzart  SUZART    GOOGLE INC    Uni...Analysing the role_of (2) Relation Sandro Suzart  SUZART    GOOGLE INC    Uni...
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...
 
Understanding digital trends
Understanding digital trendsUnderstanding digital trends
Understanding digital trends
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to Information
 
Global Mobile Data Traffic Till 2015
Global Mobile Data Traffic Till 2015Global Mobile Data Traffic Till 2015
Global Mobile Data Traffic Till 2015
 
Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom
 
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
Using Technologies in Crime Prevention and Detection in Nigeria: Legal Issues...
 
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...
 
Brazil and The Fog of (Cyber) War
Brazil and The Fog of (Cyber) WarBrazil and The Fog of (Cyber) War
Brazil and The Fog of (Cyber) War
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determining
 

Similar to Analyzing the influence of information and communication technology on the scourge of human trafficking in rwanda

Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlJohnGacinya
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlJohnGacinya
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA
 IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA  IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA
IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA Dr Lendy Spires
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyerMercy Ndegwa
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 

Similar to Analyzing the influence of information and communication technology on the scourge of human trafficking in rwanda (20)

Punzo_3300_L8-RP
Punzo_3300_L8-RPPunzo_3300_L8-RP
Punzo_3300_L8-RP
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and control
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 
Kidane Selam
Kidane SelamKidane Selam
Kidane Selam
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Freedom on the net 2018
Freedom on the net 2018Freedom on the net 2018
Freedom on the net 2018
 
IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA
 IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA  IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA
IT BELONGS TO YOU: PUBLIC INFORMATION IN THE MIDDLE EAST AND NORTH AFRICA
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Mobile Alliance flyer
Mobile Alliance flyerMobile Alliance flyer
Mobile Alliance flyer
 
Bf4103355361
Bf4103355361Bf4103355361
Bf4103355361
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 

More from JohnGacinya

Poverty as a factor in human trafficking in rwanda
Poverty as a factor in human trafficking in rwandaPoverty as a factor in human trafficking in rwanda
Poverty as a factor in human trafficking in rwandaJohnGacinya
 
Human trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plHuman trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plJohnGacinya
 
Gender inequality as_the_determinant_of_human_traf
Gender inequality as_the_determinant_of_human_trafGender inequality as_the_determinant_of_human_traf
Gender inequality as_the_determinant_of_human_trafJohnGacinya
 
Assessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traAssessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traJohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Poverty as a_factor_in_human_trafficking_in_rwanda
Poverty as a_factor_in_human_trafficking_in_rwandaPoverty as a_factor_in_human_trafficking_in_rwanda
Poverty as a_factor_in_human_trafficking_in_rwandaJohnGacinya
 
Human trafficking prevalence_in_rwanda_the_role_pl (1)
Human trafficking prevalence_in_rwanda_the_role_pl (1)Human trafficking prevalence_in_rwanda_the_role_pl (1)
Human trafficking prevalence_in_rwanda_the_role_pl (1)JohnGacinya
 
Human trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plHuman trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plJohnGacinya
 

More from JohnGacinya (9)

Poverty as a factor in human trafficking in rwanda
Poverty as a factor in human trafficking in rwandaPoverty as a factor in human trafficking in rwanda
Poverty as a factor in human trafficking in rwanda
 
Human trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plHuman trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_pl
 
Gender inequality as_the_determinant_of_human_traf
Gender inequality as_the_determinant_of_human_trafGender inequality as_the_determinant_of_human_traf
Gender inequality as_the_determinant_of_human_traf
 
Assessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traAssessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_tra
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Poverty as a_factor_in_human_trafficking_in_rwanda
Poverty as a_factor_in_human_trafficking_in_rwandaPoverty as a_factor_in_human_trafficking_in_rwanda
Poverty as a_factor_in_human_trafficking_in_rwanda
 
Sij 03-00167
Sij 03-00167Sij 03-00167
Sij 03-00167
 
Human trafficking prevalence_in_rwanda_the_role_pl (1)
Human trafficking prevalence_in_rwanda_the_role_pl (1)Human trafficking prevalence_in_rwanda_the_role_pl (1)
Human trafficking prevalence_in_rwanda_the_role_pl (1)
 
Human trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_plHuman trafficking prevalence_in_rwanda_the_role_pl
Human trafficking prevalence_in_rwanda_the_role_pl
 

Recently uploaded

Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.k64182334
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Jshifa
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravitySubhadipsau21168
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 

Recently uploaded (20)

Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.Genomic DNA And Complementary DNA Libraries construction.
Genomic DNA And Complementary DNA Libraries construction.
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified Gravity
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 

Analyzing the influence of information and communication technology on the scourge of human trafficking in rwanda

  • 1. ASSJ, Vol.3: 01 (2018) 1095 – 1102 Contents lists available at: www.innovativejournal.in ACADEMY OF SOCIAL SCIENCE JOURNAL Journal homepage: http://innovativejournal.in/assj/index.php/assj ISSN: 2456-2394 1095 Academy of Social Science Journal, vol. 03 Issue 01, January, 2018 Research Article Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda Gacinya John MSc-Criminology-PhD Research Scholar -Mount Kenya University ARTICLE INFO ABSTRACT Corresponding Author: Gacinya John Keywords : Human trafficking, Information communication technology, Globalization Rwanda‟s Information Communication and Technology (ICT) sector is among the fastest growing ICT sectors in Africa. Mobile phone penetration had risen to 65% and internet spread was above 20% in 2013. ICT is double edged and has had positive and negative effects to the Rwandan society. It is hoped that Information communication technology is likely to reduce unemployment and transform the country into a competitive, knowledge based economy. On other hand, ICT has facilitated human trafficking and trafficked people have had physical and psychological suffering due to labor and sexual exploitation. Human trafficking is prevalent despite government effort to eradicate it. The main objective of the study is to analyze the role of Information Communication technology in facilitating human trafficking in Rwanda. Qualitative research design and documentary technique were applied for the study. The findings of study indicate that human trafficking crimes are clandestine in nature.ICT in terms of internet and mobile phones is used in the processes of human trafficking that include; recruitment,transfer,transportation and exploitation of the victim. Online sex trafficking and recruitment of human trafficking victims is done using social media and mobile phones. Law enforcement officials have made significant progress in mobile phone tracking during victim rescue, there has been installation of the cybercrime facility to detect cyber-crimes, also Interpol communication system-the I-24/7 has been installed at most parts of the Rwandan border of entry to track and rescue trafficked individuals. There has been provision of mobile phones to the rural women to relay information related to human trafficking to the police. Other than that all subscribers of mobile cellular services are registered in the country as well as legislation on punishment for applying ICT to commit human trafficking crimes. Thus, recommendations are that; The Rwandan population should endeavor to cooperate with the government bodies to provide information for those ICT to traffic people; the public should be educated on the good and bad use of information communication technology. There should as well be inter sectoral linages in the fight against human trafficking facilitated by ICT. Regional and international cooperation related to the combat of human trafficking related to ICT is key, and international law against use of ICT to traffic people should be in place. ©2018, ASSJ, All Right Reserved 1. Introduction According to Isiaka et al (2015), Information communication technology was developed by the United states depart of defense in 1969.The first technological invention was the telephone that was invented in the 19th century and this shortened time of communication. Radio and wireless communication was the second technological invention. In the current period information communication technology is applied in the form of internet and this has facilitated information flow in real time. It is in this respect that human traffickers are using information communication technology to
  • 2. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1096 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 speed their operations with least difficulty as internet is borderless, (Rodas, 2014). Globalization has facilitated the expansion of information and communication technology and information is more available and this has helped to transform peoples‟ life, especially for those doing legal businesses, (UNGIFT, 2008).In the current period the number of internet users has risen to 1.8 billion worldwide and this is growth on internet by 400%, (Rachel, 2011). Financial proceeds from Internet pornography industry alone generated 2.8 billion USD in 2006. Information communication technology accesses information to people by the use of a computer and internet application services such as ;web sites, Search engines, Pornographic spams, chat rooms, file transfer protocol, File swapping programs and peer to peer networks. It is with these internet application services that human trafficking can be carried out, (Chawki &Wahab, 2004). Different methods are used to commit the crime of human trafficking. The offender and the victim can meet on the facebook and express love and admiration to each other. Location can be set for the meeting and then an air ticket sent to the victim. The other method applied by traffickers to trap the victim is to advertise that an employment waits for these in need of the job, and then the unsuspecting victim accepts job offers and travels to locations suggested by traffickers. The end of it all is that the trafficker begins to deny any kind of communication to the victim, (Herbert, 2013).Sex trafficking in most cases occurs where facebook friends (predator and victim) get used to one another until confidence builds, (Oduor, 2017). Combat Human trafficking crime has had challenges as information communication technology does not respect national borders as is the case with the law enforcement agencies. Traffickers take advantage of communication infrastructure provided by the governments to recruit victims of human trafficking, yet many governments do not have the means to detect and prevent trafficking of human beings by use of Information communication technology, (Linda & Baker, 2013). Human trafficking crime combat has had another challenge of lack of cooperation among anti-trafficking organizations lack. Organizations compete rather than complement each other in the exercise of human trafficking combat.Anti trafficking organizations have competing values, missions, and funding. Organizations are reluctant to share information and there is often mistrust, privacy, public safety and gaps in terms of technology, (Latonero, 2011). Information communication technology has been used for sexual and labor exploitation. US based corporations have obtained cheap labor for exploitation from India and the Philippines. Western Europe and North America have had regular supply of sex workers from the developing world by use of information communication technology.Generally,worldwide expansion and use of internet has speeded up sexual exploitation greatly, (Rahman, 2011). Rare opportunities to human trafficking combat rests with organizations such as; the Interpol, the G8 Sub-group on High-Tech Crime, the Virtual Global Taskforce, Internet Watch Foundation (IWF) and The Virtual Global Taskforce (VGT).The afore mentioned organizations collaborate with the international law enforcement agencies to use technology and share intelligence, information and resources in the fight against human trafficking. Virtual Global Task force collaborates with law enforcement agencies to protect children from exploitation. They identify location, and help children at risk. Virtual Global Technology creates websites with images of child abuse and this is done to attract traffickers to the website. It is with these websites law enforcement officials monitor to establish wrong elements wanting to abuse children, (Rachel, 2011). There is also the G8 Sub-group on High-Tech Crime which comprise of; Canada, France, Germany, Italy, Japan, Russia, the United States, and the United Kingdom. The group of eight countries established the G8 “Sub-group” on High Technology to Prevent, investigate, and prosecute cybercrimes that involved computers, (Rachel, 2011). There is also the Council of Europe‟s Convention on Cybercrime which provides procedures and investigative tools for law enforcement worldwide in order to prevent and combat all types of internet crime, including trafficking in persons,(Linda & Baker, 2013). Private technology giants have also joined the fight against human trafficking. Google, Palantir Technologies, Microsoft Digital Crimes Unit, Microsoft Research, LexisNexis and NGO Thorn have joined the fight against human trafficking and do provide funds and technical knowhow in identifying human traffickers,( Herbert ,2013). Information communication technology has been used to detect and apprehend traffickers by developing platforms that can capture calls from the trafficking reporting hotlines of various organizations and distributes those phone calls via text or email among those organizations, (Latonero, 2011). Further, human trafficking can be prevented by use of Short Message Service (SMS) technologies to inform the public of the possibility of human traffickers presence and their plans to manipulate and recruit people. More so, mobile devices and SMS technologies have enabled victims of human trafficking to contact service providers for support. Again, Social media platforms have also been used to raise awareness of human trafficking globally, (The US state department, 2013). In a similar manner, law enforcement officials have been able to identify victims by use of facial recognition software and do locate minors who are being exploited on line. Law enforcement officials are also able to trace text messages from phones and computers. The same applies to voice mails and
  • 3. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1097 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 web browsing history to produce evidence for prosecution purposes, (US state department, 2013). Cybercrime is on the rise on the continent of Africa. Computers and servers are not protected and crimes such as human trafficking and financial fraud do take place. Fighting human trafficking by use of technology requires a coordinated effort. In East Africa a task force from different stakeholders that include the governments, industry and civil society has been formed in order to fight human trafficking and other crimes that emanate from use of a computer. This implies that legal, policy and regulation matters will be harmonized (Quartie & Odoom, 2012). Rwanda is vulnerable to human trafficking as conditions that breed human trafficking are conducive. In the first case Rwanda is a Country with the fastest broadband Internet speed in Africa. There are about mobile money subscribers were 2.5 million in 2013, Mobile phone penetration is rapidly increasing and is now estimated at 65%. Internet Penetration is currently at 20% and it is envisaged to reach 95% in the next five years, (Rwanda National youth policy, 2015). More than 50 per cent of the adult Rwandan population own and use mobile phones for communication. Electronic media are available and the public is encouraged to use ICT as a modern technique to exercise their right of access to information. Cyber cafés and Tele-centres are also available in different districts of the country while an ICT bus travels to some remote rural areas, which are not yet connected to internet, to allow them to have access to modern tools of information and communication, (Rwanda Human rights council 2010). Coupled with the availability of Information communication technology, the Rwandan population that has youths who are unemployed and underemployed. There are about 7000 children living and working on the streets of Rwanda. Most street children are boys and many have never been to school. About 352,550 children aged between 5-17 years of age were active in the labor force and over 83% were engaged in agriculture alone and over 11% in domestic work by 2002.About 21 % of the Rwandan children have lost one or both parents due to conflict past and HIV/AIDS pandemic.In 2010 about 101,000 children were house hold heads of 42 000 families, This leaves the youth potentially vulnerable to human trafficking, (Rwanda strategic plan for child‟s rights, 2011). There is also evidence of internal and cross-border trafficking of girls and women, as well as cross-border movement of children for commercial sexual exploitation. Human trafficking in all its forms (Internal and international) is present. Police statistics reveal 153 cases of human trafficking registered between 2009 and 2013, with the majority of the victims being young females below the age of 35.The number of cases could be higher than the afore mentioned number but the covert nature of human trafficking undermines quantification,( Rwanda National youth policy 2015). 2. Problem statement While the rapid use of digital technologies worldwide like mobile phones, social networking sites and the Internet has provided significant benefits to society, more new channels and potential opportunities for exploitation have also emerged. Increasingly, the business of trafficking in persons is taking place online and over mobile phones. The positive side is that the same technologies that are being used for trafficking in persons can become a powerful tool to combat the same threat. The key role that digital technologies play in human trafficking still remains unclear, however, a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities. Rwanda has the fastest growing information communication technology sector in Africa. About 50% of the adult population in Rwanda own mobile telephones. Mobile phone penetration is thought to have reached 65% in the current period and internet penetration is at 20%. Electronic media are available in Rwanda and the public is encouraged to use ICT as a modern technique to exercise their right of access to information. Rwandan government has campaigned against human trafficking through public awareness, regional cooperation, law enforcement, improved border security and legislation, but cases of human trafficking seem to keep rising as more than 153 cases have been recorded since 2009 which number could even be greater as of today. Use of ICT has become a major platform on which trafficking in persons is practiced in Rwanda. But the same technology can be used to combat the menace .This is so urgent that president Paul Kagame calls for regional cooperation in terms of sharing information and using latest technologies in combating human trafficking( Rwanda National police magazine 2016).From this background ,there is every need for a study to be conducted on how ICT enhances human trafficking and how it can be used to prevent and combat the very threat in Rwanda. 3. Research Objective The main objective of this study is to analyze the role of Information Communication technology in facilitating human trafficking in Rwanda. Specifically, (1) To analyze the influence of technology in facilitating human trafficking in Rwanda. (2) To analyze the extent to which Rwanda has been able to combat human trafficking using technology. 4. Literature review Asiimwe, (2014) notes that Rwanda is a developing country and lacks economic opportunities and as such people have to look for these opportunities elsewhere. One of the means and ways used is the internet and social media .The Internet and social media, thus influence the unsuspecting people to go out and rush for the supposed opportunities and in the process are trafficked. In this sense the researcher concurs with the author, access to social media and the internet have penetrated Rwanda and this provides the platform for traffickers to exploit victims easily.
  • 4. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1098 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 Leva Pundina (2013) shares the view that information communication technology has brought benefits and has weaknesses in the current period. Law enforcement officials are able to track human traffickers‟ cell phones and do understand their criminal activities more and better. However, information communication technology has also facilitated criminals to create online platforms to recruit vulnerable people they identify as targets. One difficulty obtaining is that electronic information available is often fragmented and is subject to privacy rules. In the case of Rwanda, Cyber-crime detection is already in place to track human trafficking suspects. However; Cyber-crime detection has not covered the whole country. United Nations global initiative to fight trafficking (2008) Indicates that traffickers have used Information communication technology to communicate with potential victims via the internet and websites during recruitment processes. Likewise information communication technology is used to transfer funds obtained from human trafficking from one country to the other by use of ICT in a way that looks lawful. Other than recruitment of victims and transfer of funds, ICT bears pornographic websites advertising women for sexual exploitation. These women are forced to perform live sex for sale and may not know that they appear on the websites. In Rwanda criminals communicate with victims by use of ICT.However, there has not been any evidence of live pornographic material produced and distributed for sale. Elliott & McCartan (2013) assert that there is a growing concern that sex trafficking is facilitated by the internet and online sex trafficking respects no national borders.I CT by use of internet has given opportunities for human traffickers to advertise victims they hold. Online networking sites such as Craigslist, MySpace and Facebook are being used for trafficking. In the case of Rwanda, traces of Facebook and whatsapp have been found to transmit sex trafficking affairs. Channing (2017) indicates that human traffickers have in recent times improved their mode of operations. They have expanded their recruitment, transportation, control and exploitation of victims perfectly as a result of use of internet, social media and have used deceptive online advertisements to recruit individuals for both sex and labor trafficking. In line with the author, Rwanda faces a similar situation of online recruitment supported by rapid spread of the internet in the country. Chibba (2013) underscores the importance of protecting women and children who are exploited via internet sex trafficking. Internet sex trafficking involves human traffickers who lure young girls and women into internet dens and forced to have sex with men while operating computers and cameras. In Philippines, women and girls come into the den after job opportunities are promised. They are forced to have sex and pictures produced are for sale. Rwanda organic law N° 01/2012/OL of 02/05/2012 strongly prohibits criminals who distribute any pornographic material and currently no cases of pornographic pictures produced for sale to the public. Latonero (2011) states that ICT is the greatest facilitator of commercial sex trade in all countries. In the case of the United States of America Google search has identified more than 5000 websites that facilitate sex trafficking and sex tourism. In the case of labor trafficking, victims are mostly recruited the developing world and this mostly done by word of mouth. The same case for Rwanda, ICT has become a meeting point for traffickers and victims to carryout transactions for sex and labor trafficking. Kunze (2010) observes that there are no limitations to the operations of human traffickers because no international law that exists to prohibit trafficking via ICT.All countries have domestic law which is restricted to the borders. Traffickers can carry on human trafficking operations without crossing the borders because of ICT.This is again because information communication technology makes it possible for traffickers to recruit, advertise and even sell victims as they share information by means of information communication technology. Borders have no limitations to the flow of information required by criminals. They are able to commit cases of human trafficking away from their location. Besides, traffickers can use information communication to arrange for sex tours. ICT applications such as chat rooms, message boards, peer to peer file sharing servers, news groups, and websites are used by criminals to obtain information about sexual tourism destinations. In Rwanda, human traffickers use mobile phones and social media to make contacts to the victims. Laws are also restricted to the borders. However; interstate cooperation which exists among East African member countries has helped to mitigate trans boundary cases. According to Kate (2004), finds that Europe is mostly the final destination of many trafficked women for sexual purposes around the world. Most of the trafficked women are mostly used in brothels, bars, nightclubs, cafés, the streets and massage parlours, saunas, escort agencies, hotels and even private homes. In the Netherlands, pimps use Internet to contact young women for sexual exploitation. In the Rwanda situation ICT facilitates sex trafficking among the girls and destinations are mostly regional countries. Mendel & Sharapov (2014) are of the view that the Internet and online networks have facilitated human trafficking in the recent years. Internet has enabled traffickers to operate with increased ease and efficiency. Social networking, online classifieds and dating websites are used to recruit and advertise sex trafficking and labor. The researcher concurs with the author, however no websites that advertise labor and sex trafficking. Kabance (2014) advances that International trafficking networks have thrived due to technological advancements in the age of globalization. Media has been instrumental in the rapid spread of information transnationally. Trafficking networks have also used cell phones and the Internet to carry on international operations to recruit and transport human beings for sexual exploitation. However, Kabance,(2014) also argues that ICT is capable of fighting against human
  • 5. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1099 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 trafficking. Governments, organizations and law enforcement use ICT to detect, track, and shut down criminals operations. Help hotlines have been used to assist victims in rescue operations. This kind of situation applies to Rwanda where specific mobile phone numbers are widely distributed in all police stations being coordinated by “Isange one stop center”. Latonero, (2012) finds that anti-Trafficking digital communication technology is being used in the fight against human trafficking and the public is concerned and taking part in online anti-trafficking interventions. The public involvement in making online petitions against human trafficking. Crowd sourcing, Facebook and twitter have informed the public of the presence of traffickers. As an example, Digital activists against human trafficking like change.org which petitioned craigslist to shut down the websites known as „adult services‟ in 2010. Latonero, (2012) also states that Facebook and twitter are used to fight human trafficking. NGOS that fight human trafficking have used Facebook to reach a very large audience. For example an NGO, ECPAT UK has more than 29,000 members and with Facebook facility they inform the public more about human trafficking. Twitter serves as a hub for human trafficking activism. With Twitter individuals and organizations share information about human trafficking, raises the awareness, mobilizes support and puts pressure on individuals and organizations fight against human trafficking. Quarshie, (2014) argues that ICT technology has been used to commit human trafficking crimes such as child pornography. Africa needs to take advantage of modern technology by use of CCTV technology, tracking technology, social media and mobile phone to combat human trafficking.Quarshie commends that African leaders need to embrace the use of technology to meet future demands in investigations and prosecution. In the case of Rwanda, distributing mobile phones to the civilian population by the national Police of Rwanda is meant to provide information regarding human trafficking that can be used in investigation and prosecution of human trafficking cases. Longe et al, (2009) point out that information communication technology has widely spread in Africa and has at the same time influenced human trafficking in the process. Child trafficking, prostitution and pornography are on the rise.Webiste sexual content has remained of interest to the youth and scholars have found out there is a positive relationship between website sexual content such as pornography and sexual beliefs, attitudes and behavior in Nigeria.Longel et al (2009), continuous to state that Nigeria has used web filtering programs to remove sex related material from the internet. Child Trafficking prevails in Africa and children are trafficked to the western world and have ended up on the streets, brothels and massage parlors. Internet and mobile phones have also facilitated prostitution in the sub Saharan Africa .Tourists who seek travel locations are misdirected into webs that advertise sex tours offering travel incentives such as pornography and escorts mail order brides. The majority of the Rwandan Youth have access to webs that advertise sex related issues and these drive them to develop behavior towards sex.Such kind of sex behavior have led to sex trafficking in Rwanda. Cyber-crime center take care by tracking for criminals involved in human trafficking. 5. Methodology and Material In this study documentary research was applied. Documentary research method refers to the analysis of documents that contain data about the phenomenon under study. Previous studies were used to collect data and there was much reliance on description and interpretation of data rather than collecting raw data in accordance with Glenn, (2009). The documentary research method was used in investigating and categorizing physical sources, most commonly written and non-written documents, whether in the private or public domain as stated by Harelimana, (2015). The data inclusion criteria depended on; authenticity, credibility, representativeness and meaning attached to evidence, (Ahmed, 2010).Most of the obtained data was from; books, brochures and minutes of meetings, electronic journals, press releases, diaries, background papers, event programs, letters and memoranda, newspaper articles, press release, program proposals, radio and television program, institutional reports and public records. 6. Results and Discussion According to position paper for the Economic and Social Council, (2014) Rwanda is a developing country and vulnerable to human trafficking owing to her location in a conflict zone and the political past. Rwanda hopes to eliminate transnational organized crimes that include human trafficking by use of technology. Rwanda has vulnerable people of different categories; thus there are refugees from other countries such as DR Congo, Burundi and returnees from Tanzania. Over 95,000 refugees came from Burundi and there are about six refugee camps of refugees from DR Congo. These are vulnerable people enough to be trafficked. The rapid increase in the use of ICT has hasted human trafficking as the number of vulnerable refugees keeps rising. The Council working Group on children online protection in Rwanda, (2016) indicates that, since 2000, the Government of Rwanda implemented National Information Communication Infrastructure (NICI) programs that helped to distribute more computers to young students. The increase of the mobile devices and smart devices also triggered the use of ICT in the country. Equally, the tele-centers that have been constructed in the country played a big role in Internet usage. These technologies and ICT penetration have introduced new types of threats such as online sex trafficking. The internet and mobile phones have spread to low segments of the Rwandan community that includes the poor and the young. Opportunities of exploiting the youth for traffickers exist in an environment of vulnerability, access to information and good communication. Online transactions include advertising and recruiting .This has made it so difficult for the security system to combat human trafficking.
  • 6. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1100 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 In 2014 the parliament and other high institutions in Rwanda found out that girls were the ones involved in human trafficking online. Cases are there where young girls are enticed to go outside the country to seek opportunities that exist there and this is mostly done by use of mobile phones. It is unfortunate the young girls accept traffickers blindly due to ignorance about sex traffickers, (New times reporter, 2015). Such cases have increased steadily as they are facilitated by quick access to internet and possession of more mobile phones than they had in 2014.This meets an increased number of unemployed girl population who are desperate for jobs to meet their life desires. To protect the child online, Rwanda ICT regulator, (RURA) took the initiative to ensure that all subscribers of mobile cellular services are registered in the Republic of Rwanda. This exercise was intended to address several issues, related to security and social problems. Rwanda ICT regulator further developed guidelines governing the Operations of Internet cafés in Rwanda that protect children from harmful Internet content. It sounds like some online services are not protected fully to counteract some online transactions between traffickers and potential victims. This has contributed to a steady increase in human trafficking cases facilitated by ICT despite government efforts to combat the vice. The Government of Rwanda has enacted the Organic Law N° 01/2012/OL of 02/05/2012 instituting the penal code that penalizes any person, who displays, sells, rents, disseminates or distributes pornographic pictures, objects, movies, photos, slides and other pornographic materials involving children. Having such strong legislation yet human trafficking cases are consistently on a rise indicates that there is a big gap between strong laws and effective implementation as of today. According to the Rwanda prosecutor general (2017), Human trafficking is a new crime, and is occurring in Rwanda. The Rwanda prosecution department handled 10 cases in 2012/2013, 51cases in 2013/2014, 41 cases in 2014/2015 and 32 cases in 2015/2016 of human trafficking where 10 cases of human trafficking had no supporting evidence. Victims of human trafficking are recruited through social media. Rwanda National Police (2015) observes that Interpol communication system I-24/7 has been used to track and rescue trafficked individuals. This has been done through information exchange. Interpol communication system in Kigali was able to rescue two Rwandans including a girl student who had been trafficked to Zambia. A Ugandan girl was also intercepted at Kigali international airport as she was being trafficked to Asia. All the afore mentioned operations were enabled by use of I-24/7 technology. Law enforce officers are now able to track mobile phone print outs to locate trafficked girls through Interpol operations. As an example a Rwandan girl from Kimisagara suburb of Kigali city was rescued from Kampala where she had been trafficked. It came to be understood that the trafficked girl had been enticed to go with a friend to Kampala who promised her to obtain a job in a supermarket. The trafficked girl was rescued after her telephone and the telephone of the trafficker were tracked by Interpol, (Kwizera, 2015). This suggests that if well utilized by increasing cybercrime centers that track phone messages of suspects of human trafficking, ICT can be a strong tool in combating human trafficking in Rwanda. This will meet the recent development in Rwanda National police is the installation of the cybercrime facility to detect crimes that use information communication technology. This will enable Rwanda national police to combat internet and mobile phone based crimes, (Rwanda National Police magazine, 2016).In addition to this remedy, there is a need to increase data protection so as to deny traffickers quick access to ICT services. Sandys, (2005) hints that United Nations entities have worked to ensure access to and use of ICT by rural women in many different countries, Rwanda inclusive. The UNDP/Japan Women in Development Fund has supported programs in Rwanda to increase rural women‟s access to ICT, but internet has speeded the exploitation of women and girls by spreading sexual manners in real time. In a similar move Rwanda National police has provided mobile phones to the rural people in order to contact the police in case of security bleach including human trafficking, Rwanda National police Magazine, (2014). This has empowered the women development in the country however, not giving prior training to the users has facilitated a rapid misuse of the would be opportunity (ICT). This lack of sufficient knowledge in ICT usage has provided a platform to traffickers. Conclusion Information communication technology is on the increase in Rwanda. Internet is available in most government institutions and has even penetrated into the rural areas and access to information in real time is possible. Mobile phone penetration is significantly so high, where 50 % of the population of Rwanda own mobile phones. Electronic media is available and the public is encouraged to use information communication technology and this has proved to provide a platform for traffickers to exploit the potential victims who are already vulnerable due to other circumstances including unemployment, influx of refugees and poverty. Law enforcement officials are handicapped in the face of information and communication technology that operates un detected. On the other hand there is evidence that human trafficking has been stamped out by use of technology. In Rwanda, traffickers are tracked until they are apprehended. Cyber technology is being used to track human traffickers and the I-24/7 Interpol communication is used to share information on suspected human traffickers and rescuing the victims through the information exchange mechanism. This has played a key role in combating human trafficking in Rwanda. It is imperative to note that there has been a remarkable progress in combating human trafficking in Rwanda using ICT
  • 7. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1101 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 although there is still a gap between good policies in place and their implementation. Recommendations The Rwandan population should endeavor to cooperate with the government bodies most especially the National police by providing information in time concerning human trafficking due to ICT and any suspects in their communities. Increasing awareness on the proper usage of information and communication technologies especially the social media can of a great help in the prevention of human trafficking. This can be done through community policing and mass communication to empower a good number of Rwandans about the role of ICT in human trafficking. There should be an enhanced multi-disciplinary approach where the ministry of ICT, National police of Rwanda, bilateral organizations and Telecommunication companies can work together to prevent and combat human trafficking in Rwanda caused by ICT. Regional and international cooperation related to the combat of human trafficking related to ICT should be strengthened and international law to address human trafficking must also apply on the use of information and communication technology that facilitates human trafficking crimes. Therefore harmonization of ICT activities and shading off matters of privacy, mistrust and reduction of gaps amongst states will enhance human trafficking combat operations. References Ahmed, J.U. (2010).Documentary research Methods: New Dimensions. Indus Journal of Management & Social Sciences, 4(1), 2010, p.3. http://www.academia.edu/4900830/ Documentary_Research_Method_New_Dimensions Asiimwe, F. (2014). Factors pre- disposing women and girls to human trafficking in Rwanda: A baseline survey and needs assessment report, Kigali, Pp.19-36 www.faasirw.org/.../ BASELINE%20%20SURVEY%20AND%20NEEDS%2... Bishumba,N.(2017, Sept 12). GBV: Prosecutor calls for tougher punishment.The Newtimes,p.1, http://www.newtimes. co.rw/ section/read/208169 Channing,M. (2017). Transnational Crime and the Developing World.USA,(Washington DC): Global financial integrity,P.12.www.gfintegrity.org/wp-content/uploads/ 2017/03/Transnational_Crime-final.pdf Chibba, M. (2013). Human Trafficking and Migration: Concepts, Linkages and New Frontiers. Global Policy, Economics Research (UNU-WIDER):Helsinki,p.6 .www.globalpolicyjournal.com/.../Chibba%20- %20Human%20Trafficking%20and%2. Denge, B. (2017 Jun 16). Use digital technology to fight cross- border trafficking in South Asia.Hindustantimes, India: New Delhi. http://www.hindustantimes.com/opinion/use-digital- technology-to-fight-cross-border-trafficking-in-south- asia/story2gQmiYmtgty1xNiYooy7vI.html Donovan, M. (2017). Technology in the fight against trafficking: Tracking criminals and helping victims. Washington DC: National Consumers League, P.1, http://www.nclnet.org/trafficking_tech European Commission. (2016). Report on the progress made in the fight against trafficking in human beings. European Union: Brussels, p.9. https://ec.europa.eu/...human- trafficking/trafficking...human.../commission_report_on. Elliott, J. & McCartan, K. (2013). The reality of trafficked peoples access to technology. Journal of Criminal Law, 77 (3). Bristol: University of Western England pp. 255-273.ISSN 0022-0183 Available from: http://eprints.uwe.ac.uk/20992 Glenn, B.(2009). Document analysis as a qualitative research method. Qualitative research journal , vol. 9, no. 2, 2009. USA: Western Carolina University, p.2 http://www.academia.edu/8434566/document_analysis_as_a_ qualitative_research_method Herbert, B.D. (2013). Human Trafficking and the Internet.Judges’Journal-American Bar Association, Vol. 52 No. 1, USA: Washington D.C, https://www.americanbar.org/ publications/judges_journal/2013/winter/human_trafficking_a nd_internet_and_other_technologies_too.html Isiaka,A.A.et al.(2015). The Growth and Impact of Information and Communication Technologies in Africa. International Journal of Electronics and Electrical Engineering. 3(1), 2015, Akule: School of Engineering and Engineering Technology, p.1. www.ijeee.net/uploadfile/ 2014/0324/20140324021146366.pdf Kabance, K. (2014). The Globalization of Sex Trafficking. P.8- 36.https://ucollege.wustl.edu/files/ucollege/imce/iap.kabance.d rp_.pdfz Kate,C. (2015). Combat Trafficking in Human Beings: Literature Review and Industry Context.University of west London, Pp.10-18. https://www.brookes.ac.uk/Documents/ Microsites/Combat-THB-Literature-Review Kunze,I.E.(2010). Sex trafficking via the internet: How international agreements address the problem and fail to go far enough. Journal of high technology law.Vol.10 (2). Suffolk University,https://www.suffolk.edu/documents/jhtl_publicatio ns/kunze.pdf Kwizera, E. (2015, September 13). Girls trafficked from Rwanda, sexually abused in Uganda.Imirasire, p.3, http://eng.imirasire.com/news/all-around/in-rwanda/article/ girls-trafficked-from-rwanda Latonero, M.et al,. (2011). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. Annenberg (University of South California): School of Communication Leadership and Policy.Pp, 8-31.
  • 8. Gacinya John/ Analyzing the influence of Information and communication Technology on the scourge of human trafficking in Rwanda 1102 Academy of Social Science Journal, , vol. 03 Issue 01, January, 2018 https://technologyandtrafficking.usc.edu/files/2011/09/Human Trafficking_FINAL.pd Latonero, M.(2012).Technology & Human trafficking: Digital Activism in Anti-Trafficking Efforts.Los Angeles: Center on Communication, leadership and policy,Pp.1-3. https://technologyandtrafficking.usc.edu/digital-activism-in- anti-trafficking-efforts/ Leva Pundina.(2013). Technology and Human Trafficking: Friends or Foes? USA: McCain Institute for International Leadership.http://wiisglobal.org/2013/07/16/technology-and- human-trafficking-friends-or-foes/ Linda Baker & Marcie Campbell, (2013). Information Communication Technologies and Trafficking in Persons. Learning Network, Centre for Research and Education on Violence against Women and Children page. Longe, O.et al. Criminal Uses of Information & Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives. Journal of Information Technology Impact .9(3), 2009, Lousiana: Southern University and A&M College,Pp.155-172.www.jiti.com/v09/jiti.v9n3 .155-172.pdf Mendel, J. & Sharapov, K.(2014). Human trafficking & online networks: Policy Briefing. Budapest: Centre for Policy Studies, Central European University, Pp.3-13. pasos.org/.../cps-policy-brief-upkat-human-trafficking-and- online-networks-2014.pdf New times reporter,(2015 Jan 21).The ordeal of human trafficking victim.The new times,p.1, http://www.newtimes.co.rw/section/read/185155/ Oduor, C. (2017, September 6). Alarm in Kisumu as women fall victims to Facebook criminals. Standard Media, P.2, Read more at: https://www.standardmedia.co.ke/business/article/2001253708 /facebook-date-rape-hits-rocky-village-hill Quarshie,H.O.(2014). Using ICT to Fight Crime - A Case of Africa. Journal of Emerging Trends in Computing and Information Sciences. Accra: University College of science & technology, Pp.1-4. https://www.researchgate.net/.../ publication/...Journal...Information...ICT...Africa/.../J... Quarshie, H. O & Odom. A. M. (2011). Collaboration and the use of Technology in anti- Human trafficking efforts. University of Colorado, Boulder, USA, Pp.2-10. scholar.colorado.edu/cgi/viewcontent.cgi?article=1862&conte xt=honr_theses Rahman, A.M. (2011). Human Trafficking in the era of Globalization: The case of Trafficking in the Global Market Economy. Transcience Journal Vol 2, No 1 (2011). https://www2.hu- berlin.de/transcience/Vol2_Issue1_2011_54_71_Glossary.pdf Rodas, E. (2014). The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society. The Multi-Facets of Cyber-Sex Trafficking. A Call for Action and Reform from Society. Munich: GRIN Verlag, P.1, http://www.grin.com/en/ e-book/ 274893/the-multi-facets-of-cyber-sex-trafficking-a- call-for-action-and-reform Rwanda Child‟s rights policy. (2011). Strategic Plan for the Integrated Child Rights. Kigali: Ministry of gender and Family promotion, P.14-26. https://www.unicef.org/rwanda/RWA_ resources_icrpstratplan.pdf Rwanda Human rights council. (2010). The framework of the universal periodic review. Kigali, P.7, www.undp.org/.../ rwanda/.../RW_UPR%20Report%20submitted%20by%20the %20G... Rwanda National Police. (2014).Police Review: Anti-Gender based violence and child abuse. Kigali: Police Head office,p1. http://www.police.gov.rw/uploads/tx_download/Rwanda_Nati onal_Police_at_a_glance_2014_4_pages_HiRes.pdf Rwanda National police strengthens fight against human trafficking.(2015 Jan 8).Rwanda National police news,p.1, http://www.police.gov.rw/news- detail/?tx_ttnews%5Btt_news%5D=3364&cHash=b13a47abf0 4a0816357ab18b5c6c9d78 Rwanda National youth policy. (2015).Towards a happy generation.Kigali:NYC,PP.14-18. www.nyc.gov.rw/fileadmin/templates/template_new/.../Nation al_Youth_Policy.pdf Rwanda Police magazine. (2016).President Kagame: Let‟s not be easy targets for Fraudsters. Kigali: Rwanda National Police,p.5,https://www.police.gov.rw/uploads/tx_download/P OLICE_MAGAZINE_No_15.pd Sandys, E. (2005).Gender equality and empowerment of women through ICT.United nations: Division of social and economic affairs, p.14. www.un.org/womenwatch/daw/public/ w2000-09.05-ict-e.pdf US state Department.(2013).Trafficking in Persons: Topics of special interest. US State department: Office to monitor and combat Human traffickinghttps://www.state.gov/j/tip/rls/tiprpt /2013/210544.htm UN.GIFT. (2008).The Vienna forum to fight human trafficking: Human trafficking and Technology, Vienna: Anti- human trafficking Unit.Pp,2-25. https://www.unodc.org/ documents/humantrafficking/2008/BP017TechnologyandHum anTrafficking.pdf UN.GIFT. (2008).The Vienna Forum to fight Human Trafficking. Workshop: Technology and Human Trafficking. Austria Center Vienna. Page 1-28