SlideShare a Scribd company logo
1 of 2
Download to read offline
SPOTLIGHT:
HUMAN TRAFFICKING
INTELLIGENCE AND INSIGHT
CAN ADVANCED COGNITIVE-COMPUTING
BASED ANALYTICS BE USED TO QUICKLY
ORGANIZE AND PROVIDE INTELLIGENCE
WITHIN THE CHAOTIC ONLINE COMMERCIAL
SEX MARKET?
CAN THIS TECHNOLOGY BE SMART
ENOUGH TO REVEAL INFORMATION THAT
IS INTENTIONALLY CONCEALED AND
CONSTANTLY CHANGING?
Spotlight was conceived with these questions in
mind and built to support the investigative efforts
of law enforcement to find child sex trafficking
victims on the Internet.
Spotlight has been
a tremendous asset to
our human trafficking
investigations. Being
able to work a specific
region and search for
a specific name, assisted
me in locating ads for
a 16-year-old runaway
who was being trafficked
across two states.
Those ads have led us
to identify additional
victims and suspects.
DETECTIVE FROM ARIZONA
Spotlight improves the effective-
ness and efficiency of domestic
sex trafficking investigations and
increases the number of victims
who are identified and connected
to services.
Thorn has partnered with Digital
Reasoning, the McCain Institute,
Google to create Spotlight, a
web-application that provides law
enforcement with intelligence and
leads on suspected human traf-
ficking networks to identify and
assist victims. It prioritizes leads
by leveraging machine learn-
ing algorithms and insight from
officers in the field. Spotlight also
connects disparate data sources
to provide deep investigative tools
to aid officers in their understand-
ing of the historical and geograph-
ical reach of a victim’s trafficking
situation.
Spotlight is offered free of charge
to law enforcement and relevant
NGOs (e.g., NCMEC).
SPOTLIGHT TAKES THIS MASSIVE AMOUNT OF DATA AND TURNS IT INTO
AN ASSET FOR LAW ENFORCEMENT.
GAIN ACCESS TO SPOTLIGHT NOW!
Spotlight is currently being made available for free to a human trafficking
investigators across the United States. If you are interested in receiving
access to Spotlight, please contact: spotlight@wearethorn.org. wearethorn.org
THE INTERNET HAS MADE IT EASIER FOR CHILDREN TO
BE BOUGHT AND SOLD ONLINE.
The Internet makes it easier for purchasers to conduct illegal transac-
tions, and for exploiters to profit from the commercial sexual exploita-
tion of children (Source: Thorn Survivor Survey).
3OUT
OF
4OF THE UNDERAGE SEX TRAFFICKING VICTIMS SAID
THEY HAD BEEN ADVERTISED OR SOLD ONLINE.
LAW ENFORCEMENT DOESN’T HAVE ENOUGH TIME TO NAVIGATE THE ONLINE
COMMERCIAL SEX MARKET TO FIND CHILDREN AND IDENTIFY THEIR TRAFFICKERS.
The enormity and complexity of
the online commercial sex market
makes it difficult for law enforce-
ment to find victims and conduct
labor intensive child sex traffick-
ing investigations.
Identifying leads and making
connections between phone
numbers, post IDs and photos
is complex and time-consum-
ing. Moreover, the preservation
of evidence is a challenge when
ads are periodically taken down.
Furthermore, the stated age is an
unreliable determinant as the vast
majority of ads reference ages
from 18-22 with the median age
of 21. Much of the information in
the ads for children is fake. Age
is always listed as 18+, names are
not real, faces may be hidden in
photos, and the photo posted may
be of someone over 18.
THERE ARE OVER 50,000 NEW ADS POSTED EVERY DAY IN
THE ESCORT SERVICES SECTION OF BACKPAGE.COM.

More Related Content

Viewers also liked

Malala yousufzai and kailash satyrathi against human trafficking by anurag dash
Malala yousufzai and kailash satyrathi against human trafficking by anurag dashMalala yousufzai and kailash satyrathi against human trafficking by anurag dash
Malala yousufzai and kailash satyrathi against human trafficking by anurag dashanuragcooolz
 
Presentacion malala
Presentacion malalaPresentacion malala
Presentacion malalaGui Llermo
 
Docudrama: Malala Yousafzai by Class 11th B
Docudrama: Malala Yousafzai by Class 11th BDocudrama: Malala Yousafzai by Class 11th B
Docudrama: Malala Yousafzai by Class 11th BVikas Kumar
 
The #Malala Project
The #Malala ProjectThe #Malala Project
The #Malala Projecthhutchison
 
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth b
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth bDocudrama: Kailash Satyarthi Made by Group 1 of Class XIth b
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth bVikas Kumar
 
Malala yousafzai
Malala yousafzaiMalala yousafzai
Malala yousafzaimswilsonri
 
The story of Malala Yousafzai. (Nikos)
The story of Malala Yousafzai. (Nikos)The story of Malala Yousafzai. (Nikos)
The story of Malala Yousafzai. (Nikos)Nikos
 

Viewers also liked (13)

Malala yousufzai and kailash satyrathi against human trafficking by anurag dash
Malala yousufzai and kailash satyrathi against human trafficking by anurag dashMalala yousufzai and kailash satyrathi against human trafficking by anurag dash
Malala yousufzai and kailash satyrathi against human trafficking by anurag dash
 
Presentacion malala
Presentacion malalaPresentacion malala
Presentacion malala
 
Docudrama: Malala Yousafzai by Class 11th B
Docudrama: Malala Yousafzai by Class 11th BDocudrama: Malala Yousafzai by Class 11th B
Docudrama: Malala Yousafzai by Class 11th B
 
The #Malala Project
The #Malala ProjectThe #Malala Project
The #Malala Project
 
Malala
Malala Malala
Malala
 
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth b
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth bDocudrama: Kailash Satyarthi Made by Group 1 of Class XIth b
Docudrama: Kailash Satyarthi Made by Group 1 of Class XIth b
 
Presentacion malala
Presentacion malalaPresentacion malala
Presentacion malala
 
Malala powerpoint
Malala powerpointMalala powerpoint
Malala powerpoint
 
Malala.
Malala.Malala.
Malala.
 
Malala
MalalaMalala
Malala
 
Malala yousafzai
Malala yousafzaiMalala yousafzai
Malala yousafzai
 
The story of Malala Yousafzai. (Nikos)
The story of Malala Yousafzai. (Nikos)The story of Malala Yousafzai. (Nikos)
The story of Malala Yousafzai. (Nikos)
 
Malala yousafzai
Malala yousafzaiMalala yousafzai
Malala yousafzai
 

Similar to Spotlight Handout Non-LE 2

A View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldA View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldCloudera, Inc.
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
 
Social Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdfSocial Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdfWomen's Rights Group
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Professor Mary Aiken
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationminiaturequery546
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex traffickingStopTrafficking
 
Philanthropy spotlight thorn peter palivos _ philanthropy
Philanthropy spotlight  thorn   peter palivos _ philanthropyPhilanthropy spotlight  thorn   peter palivos _ philanthropy
Philanthropy spotlight thorn peter palivos _ philanthropyPeter Palivos
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingTycoonSuccess
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingTycoonSuccess
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Crj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarCrj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarleonardjonh215
 

Similar to Spotlight Handout Non-LE 2 (19)

A View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldA View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital World
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
 
Social Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdfSocial Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdf
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)Pathways White Paper FINAL (1) (1)
Pathways White Paper FINAL (1) (1)
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
The Data Brokers: Selling your personal information
The Data Brokers: Selling your personal informationThe Data Brokers: Selling your personal information
The Data Brokers: Selling your personal information
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex trafficking
 
Philanthropy spotlight thorn peter palivos _ philanthropy
Philanthropy spotlight  thorn   peter palivos _ philanthropyPhilanthropy spotlight  thorn   peter palivos _ philanthropy
Philanthropy spotlight thorn peter palivos _ philanthropy
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Crj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collarCrj 101 after having reviewed many traditional forms of white collar
Crj 101 after having reviewed many traditional forms of white collar
 

Spotlight Handout Non-LE 2

  • 1. SPOTLIGHT: HUMAN TRAFFICKING INTELLIGENCE AND INSIGHT CAN ADVANCED COGNITIVE-COMPUTING BASED ANALYTICS BE USED TO QUICKLY ORGANIZE AND PROVIDE INTELLIGENCE WITHIN THE CHAOTIC ONLINE COMMERCIAL SEX MARKET? CAN THIS TECHNOLOGY BE SMART ENOUGH TO REVEAL INFORMATION THAT IS INTENTIONALLY CONCEALED AND CONSTANTLY CHANGING? Spotlight was conceived with these questions in mind and built to support the investigative efforts of law enforcement to find child sex trafficking victims on the Internet. Spotlight has been a tremendous asset to our human trafficking investigations. Being able to work a specific region and search for a specific name, assisted me in locating ads for a 16-year-old runaway who was being trafficked across two states. Those ads have led us to identify additional victims and suspects. DETECTIVE FROM ARIZONA
  • 2. Spotlight improves the effective- ness and efficiency of domestic sex trafficking investigations and increases the number of victims who are identified and connected to services. Thorn has partnered with Digital Reasoning, the McCain Institute, Google to create Spotlight, a web-application that provides law enforcement with intelligence and leads on suspected human traf- ficking networks to identify and assist victims. It prioritizes leads by leveraging machine learn- ing algorithms and insight from officers in the field. Spotlight also connects disparate data sources to provide deep investigative tools to aid officers in their understand- ing of the historical and geograph- ical reach of a victim’s trafficking situation. Spotlight is offered free of charge to law enforcement and relevant NGOs (e.g., NCMEC). SPOTLIGHT TAKES THIS MASSIVE AMOUNT OF DATA AND TURNS IT INTO AN ASSET FOR LAW ENFORCEMENT. GAIN ACCESS TO SPOTLIGHT NOW! Spotlight is currently being made available for free to a human trafficking investigators across the United States. If you are interested in receiving access to Spotlight, please contact: spotlight@wearethorn.org. wearethorn.org THE INTERNET HAS MADE IT EASIER FOR CHILDREN TO BE BOUGHT AND SOLD ONLINE. The Internet makes it easier for purchasers to conduct illegal transac- tions, and for exploiters to profit from the commercial sexual exploita- tion of children (Source: Thorn Survivor Survey). 3OUT OF 4OF THE UNDERAGE SEX TRAFFICKING VICTIMS SAID THEY HAD BEEN ADVERTISED OR SOLD ONLINE. LAW ENFORCEMENT DOESN’T HAVE ENOUGH TIME TO NAVIGATE THE ONLINE COMMERCIAL SEX MARKET TO FIND CHILDREN AND IDENTIFY THEIR TRAFFICKERS. The enormity and complexity of the online commercial sex market makes it difficult for law enforce- ment to find victims and conduct labor intensive child sex traffick- ing investigations. Identifying leads and making connections between phone numbers, post IDs and photos is complex and time-consum- ing. Moreover, the preservation of evidence is a challenge when ads are periodically taken down. Furthermore, the stated age is an unreliable determinant as the vast majority of ads reference ages from 18-22 with the median age of 21. Much of the information in the ads for children is fake. Age is always listed as 18+, names are not real, faces may be hidden in photos, and the photo posted may be of someone over 18. THERE ARE OVER 50,000 NEW ADS POSTED EVERY DAY IN THE ESCORT SERVICES SECTION OF BACKPAGE.COM.