SlideShare a Scribd company logo
1 of 8
+
ICT-Enabled Human
Trafficking for Ransom
Selam Kidane
April 2016
+
Tracing the emergence of ICT-
Enabled Human Trafficking for
Ransom
Reisen, van, M., Gerrima,
Z.,Ghilazghy, S.; Kidane, N.; Rijken,
C.; Stam, van, G.,
+
Trafficking for Ransom
 A new form of Human Trafficking for Ransom emerged in 2009
facilitated by ICT features that enabled the commoditisation of
human beings.
 It has been as ‘Sinai trafficking’ in reference to the location where
it was first observed (Reisen & Rijken 2015)
 The objective of the traffickers to benefit and profit from ransom
payments
 The extortion is achieved by forcing human beings held in captivity
to contact relatives, family and friends by mobile phone and
demand their support to pay ransoms for the release. The
pressure on relatives, family and friends is exacerbated by torture.
 The potential threat of the selling of organs for the commercial
organ market has compounded the psychological torture and is
generally believed by the victims (even if no proof of such direct
link is available to date)
+
 Many reports identified that in all cases torture was an element of
the modus operandi of human trafficking (ARDC, 2011;
Weldehaimot, S. 2011; Humphris, R., 2013; Amnesty International,
2013; Jacobsen, K., Robinson, S., Lijnders, L., 2013; Human
Rights Watch, 2014).
 Torture was executed for prolonged period of time (often longer
than one month and sometimes for over a year) and included
electrocutation, beating, hanging, burning, chaining, prolonged
exposure to the sun, cruel acts, severe sexual violence, forced
drug use, malnutrition, water deprivation, sleep deprivation, light
deprivation and threat of killing
 Between 25.000 and 30.000 people passed through the Sinai as
victims of human trafficking in the period 2009 – 2013 and it is
estimated that 20%-33% of the people held captive died as a
result of the trafficking (Reisen et. al. 2013)
 The studies report consecutive selling in a series of transactions
and consecutive amounts of ransoms demanded by different
groups of human traffickers (Reisen, et al., 2012, 2013, Human
Rights Watch 2013). It is estimated that US$ 600 million in
ransoms was collected in the period 2009 – 2013
+
Involvement of authorities
 The literature refers to involvement of authorities. Reisen et al
(2012, 2013) refer to the involvement of authorities in Eritrea
 There is also evidence that suggests facilitation by some
members of the authorities in Sudan and Egypt
 The involvement of the Eritrean authorities in human trafficking
has been described by het UN Monitoring Report on Eritrea
and Somalia (2011)
+
How ICT is enabling Human
Trafficking
1. Intelligence gathering
 Information on law enforcing authorities (police, security agents etc) and their
plans and activities are being monitored by the Human Traffickers and
smugglers and their collaborators and accomplices and information is
exchanged within and among the networks using these technologies.
 locating, monitoring and tracking refugees being smuggled or trafficked by
others
2. Ransom demands and collections
 The torture is almost exclusively orchestrated for the objective of extortion with
the telephone carrying the pain and humiliation right to the very villages and the
homes
 ITCs are also used to coordinate the fund raising, collection and transfers of
ransoms demanded by the Human traffickers and smugglers. Without the ICTs,
there is no way the families and friends of the victims could raise the money
demanded by the captors
 Availability of mobile money
+
Boundary defying challenges
 Vulnerable people outside supporting communities and home
countries
 Nation – state – based governance systems have been
rendered ineffective
1. In monitoring and evaluation
2. In control and intervention
 Fits international and inter continental mafia
1. Mobile money
2. Network of criminals
3. Defying rule of law
+
Looking forward
 We really need to understand the ‘dark side’ of ICT and data
use more
 The discourse regarding migration needs to take the whole
context into account
 The use of ICT to promote community resilience is an
opportunity that

More Related Content

What's hot

EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCY
EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCYEFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCY
EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCYApewalen Samuel MBA, PFSO
 
Power of partnership conference: Poster: Security on the move
Power of partnership conference: Poster: Security on the movePower of partnership conference: Poster: Security on the move
Power of partnership conference: Poster: Security on the moveThe Impact Initiative
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
 
Anti-corruption course, Bishkek Academy, 2018
Anti-corruption course, Bishkek Academy, 2018Anti-corruption course, Bishkek Academy, 2018
Anti-corruption course, Bishkek Academy, 2018Murod Khusanov
 
Human Trafficking: Hawaii, Canada, and Ukraine
Human Trafficking: Hawaii, Canada, and UkraineHuman Trafficking: Hawaii, Canada, and Ukraine
Human Trafficking: Hawaii, Canada, and UkraineAlysha Gurr
 
The Context of Violent Extremism in Kenya2
The Context of Violent Extremism in Kenya2The Context of Violent Extremism in Kenya2
The Context of Violent Extremism in Kenya2tonyjimmy mahanga
 
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...Workshop 2 trafficking in persons and smuggling of migrants successes and cha...
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...Dr Lendy Spires
 
Refugee Protection, Migration and Human Rights in Europe
Refugee Protection, Migration and Human Rights in EuropeRefugee Protection, Migration and Human Rights in Europe
Refugee Protection, Migration and Human Rights in EuropeMiqui Mel
 
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...antiAtlas of Borders
 
Corruption and economic crime news letter issue 6 aug 2013
Corruption and economic crime   news letter issue 6 aug 2013Corruption and economic crime   news letter issue 6 aug 2013
Corruption and economic crime news letter issue 6 aug 2013Dr Lendy Spires
 
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMAR
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMARINTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMAR
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMARMYO AUNG Myanmar
 
The Publishing Scramble for Africa
The Publishing Scramble for AfricaThe Publishing Scramble for Africa
The Publishing Scramble for AfricaMarkCILN
 
Combating transnational organized crime through better international cooperation
Combating transnational organized crime through better international cooperationCombating transnational organized crime through better international cooperation
Combating transnational organized crime through better international cooperationDr Lendy Spires
 
James Stricker -- Immigration in the Netherlands
James Stricker -- Immigration in the NetherlandsJames Stricker -- Immigration in the Netherlands
James Stricker -- Immigration in the NetherlandsJames Stricker
 
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...OECD Governance
 
Migration law in Eastern EU neighbourhood
Migration law in Eastern EU neighbourhoodMigration law in Eastern EU neighbourhood
Migration law in Eastern EU neighbourhoodMigrationPolicyCentre
 

What's hot (20)

EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCY
EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCYEFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCY
EFFECTIVE APPROACHES TO PROTECTING CRITICAL INFRASTRUCTURE AGAINSST INSURGENCY
 
Power of partnership conference: Poster: Security on the move
Power of partnership conference: Poster: Security on the movePower of partnership conference: Poster: Security on the move
Power of partnership conference: Poster: Security on the move
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
 
Anti-corruption course, Bishkek Academy, 2018
Anti-corruption course, Bishkek Academy, 2018Anti-corruption course, Bishkek Academy, 2018
Anti-corruption course, Bishkek Academy, 2018
 
Human Trafficking: Hawaii, Canada, and Ukraine
Human Trafficking: Hawaii, Canada, and UkraineHuman Trafficking: Hawaii, Canada, and Ukraine
Human Trafficking: Hawaii, Canada, and Ukraine
 
Public Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day SlaveryPublic Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day Slavery
 
The Context of Violent Extremism in Kenya2
The Context of Violent Extremism in Kenya2The Context of Violent Extremism in Kenya2
The Context of Violent Extremism in Kenya2
 
How to stop human trafficking
How to stop human trafficking How to stop human trafficking
How to stop human trafficking
 
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...Workshop 2 trafficking in persons and smuggling of migrants successes and cha...
Workshop 2 trafficking in persons and smuggling of migrants successes and cha...
 
Refugee Protection, Migration and Human Rights in Europe
Refugee Protection, Migration and Human Rights in EuropeRefugee Protection, Migration and Human Rights in Europe
Refugee Protection, Migration and Human Rights in Europe
 
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...
Ruben Hernandez-Léon_The Migration industry : Charting the relations of facil...
 
Corruption and economic crime news letter issue 6 aug 2013
Corruption and economic crime   news letter issue 6 aug 2013Corruption and economic crime   news letter issue 6 aug 2013
Corruption and economic crime news letter issue 6 aug 2013
 
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMAR
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMARINTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMAR
INTERNATIONAL IMPARTIAL AND INDEPENDENT MECHANISM FOR MYANMAR
 
The Publishing Scramble for Africa
The Publishing Scramble for AfricaThe Publishing Scramble for Africa
The Publishing Scramble for Africa
 
Combating transnational organized crime through better international cooperation
Combating transnational organized crime through better international cooperationCombating transnational organized crime through better international cooperation
Combating transnational organized crime through better international cooperation
 
James Stricker -- Immigration in the Netherlands
James Stricker -- Immigration in the NetherlandsJames Stricker -- Immigration in the Netherlands
James Stricker -- Immigration in the Netherlands
 
Batista laís
Batista laís Batista laís
Batista laís
 
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
Keeping Pace: Whistleblowing and the Response of Government, Mark Worth, Inte...
 
Migration law in Eastern EU neighbourhood
Migration law in Eastern EU neighbourhoodMigration law in Eastern EU neighbourhood
Migration law in Eastern EU neighbourhood
 
Fct intro
Fct introFct intro
Fct intro
 

Similar to Kidane Selam

Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...Amy Cernava
 
The refugee crisis: why we need to speak about corruption?
The refugee crisis: why we need to speak about corruption?The refugee crisis: why we need to speak about corruption?
The refugee crisis: why we need to speak about corruption?MYO AUNG Myanmar
 
Human Trafficking Training for Engage Now Africa-12th November 2015
Human Trafficking Training for Engage Now Africa-12th November 2015Human Trafficking Training for Engage Now Africa-12th November 2015
Human Trafficking Training for Engage Now Africa-12th November 2015David Kofi Awusi
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determiningAlexander Decker
 
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docxRunning head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docxtodd581
 
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...Gerd Tarand
 
Assessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traAssessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traJohnGacinya
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlJohnGacinya
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlJohnGacinya
 
A STUDY OF HUMAN TRAFFICKING IN INDIA AN OVERVIEW
A STUDY OF HUMAN TRAFFICKING IN INDIA  AN OVERVIEWA STUDY OF HUMAN TRAFFICKING IN INDIA  AN OVERVIEW
A STUDY OF HUMAN TRAFFICKING IN INDIA AN OVERVIEWJim Jimenez
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian modelM S Siddiqui
 

Similar to Kidane Selam (20)

Punzo_3300_L8-RP
Punzo_3300_L8-RPPunzo_3300_L8-RP
Punzo_3300_L8-RP
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
 
The refugee crisis: why we need to speak about corruption?
The refugee crisis: why we need to speak about corruption?The refugee crisis: why we need to speak about corruption?
The refugee crisis: why we need to speak about corruption?
 
Human Trafficking Training for Engage Now Africa-12th November 2015
Human Trafficking Training for Engage Now Africa-12th November 2015Human Trafficking Training for Engage Now Africa-12th November 2015
Human Trafficking Training for Engage Now Africa-12th November 2015
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determining
 
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docxRunning head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
 
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...
Trafficking in Human Beings by Anna Ekstedt (CBSS Task Force against Traffick...
 
Assessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_traAssessing the impact_of_globalization_on_human_tra
Assessing the impact_of_globalization_on_human_tra
 
Sij 03-00167
Sij 03-00167Sij 03-00167
Sij 03-00167
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and control
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
 
Globalisation
GlobalisationGlobalisation
Globalisation
 
A STUDY OF HUMAN TRAFFICKING IN INDIA AN OVERVIEW
A STUDY OF HUMAN TRAFFICKING IN INDIA  AN OVERVIEWA STUDY OF HUMAN TRAFFICKING IN INDIA  AN OVERVIEW
A STUDY OF HUMAN TRAFFICKING IN INDIA AN OVERVIEW
 
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian model
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
F0312010140044
F0312010140044F0312010140044
F0312010140044
 

More from TRACE Project

The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children TRACE Project
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking TRACE Project
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking TRACE Project
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceTRACE Project
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickersTRACE Project
 
Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015TRACE Project
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...TRACE Project
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalTRACE Project
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies TRACE Project
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopTRACE Project
 

More from TRACE Project (15)

Rijken Conny
Rijken ConnyRijken Conny
Rijken Conny
 
Muraszkiewicz
MuraszkiewiczMuraszkiewicz
Muraszkiewicz
 
FRA presentation
FRA presentation FRA presentation
FRA presentation
 
key note
key notekey note
key note
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-trace
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickers
 
Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removal
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus Workshop
 

Recently uploaded

Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 

Recently uploaded (20)

Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 

Kidane Selam

  • 1. + ICT-Enabled Human Trafficking for Ransom Selam Kidane April 2016
  • 2. + Tracing the emergence of ICT- Enabled Human Trafficking for Ransom Reisen, van, M., Gerrima, Z.,Ghilazghy, S.; Kidane, N.; Rijken, C.; Stam, van, G.,
  • 3. + Trafficking for Ransom  A new form of Human Trafficking for Ransom emerged in 2009 facilitated by ICT features that enabled the commoditisation of human beings.  It has been as ‘Sinai trafficking’ in reference to the location where it was first observed (Reisen & Rijken 2015)  The objective of the traffickers to benefit and profit from ransom payments  The extortion is achieved by forcing human beings held in captivity to contact relatives, family and friends by mobile phone and demand their support to pay ransoms for the release. The pressure on relatives, family and friends is exacerbated by torture.  The potential threat of the selling of organs for the commercial organ market has compounded the psychological torture and is generally believed by the victims (even if no proof of such direct link is available to date)
  • 4. +  Many reports identified that in all cases torture was an element of the modus operandi of human trafficking (ARDC, 2011; Weldehaimot, S. 2011; Humphris, R., 2013; Amnesty International, 2013; Jacobsen, K., Robinson, S., Lijnders, L., 2013; Human Rights Watch, 2014).  Torture was executed for prolonged period of time (often longer than one month and sometimes for over a year) and included electrocutation, beating, hanging, burning, chaining, prolonged exposure to the sun, cruel acts, severe sexual violence, forced drug use, malnutrition, water deprivation, sleep deprivation, light deprivation and threat of killing  Between 25.000 and 30.000 people passed through the Sinai as victims of human trafficking in the period 2009 – 2013 and it is estimated that 20%-33% of the people held captive died as a result of the trafficking (Reisen et. al. 2013)  The studies report consecutive selling in a series of transactions and consecutive amounts of ransoms demanded by different groups of human traffickers (Reisen, et al., 2012, 2013, Human Rights Watch 2013). It is estimated that US$ 600 million in ransoms was collected in the period 2009 – 2013
  • 5. + Involvement of authorities  The literature refers to involvement of authorities. Reisen et al (2012, 2013) refer to the involvement of authorities in Eritrea  There is also evidence that suggests facilitation by some members of the authorities in Sudan and Egypt  The involvement of the Eritrean authorities in human trafficking has been described by het UN Monitoring Report on Eritrea and Somalia (2011)
  • 6. + How ICT is enabling Human Trafficking 1. Intelligence gathering  Information on law enforcing authorities (police, security agents etc) and their plans and activities are being monitored by the Human Traffickers and smugglers and their collaborators and accomplices and information is exchanged within and among the networks using these technologies.  locating, monitoring and tracking refugees being smuggled or trafficked by others 2. Ransom demands and collections  The torture is almost exclusively orchestrated for the objective of extortion with the telephone carrying the pain and humiliation right to the very villages and the homes  ITCs are also used to coordinate the fund raising, collection and transfers of ransoms demanded by the Human traffickers and smugglers. Without the ICTs, there is no way the families and friends of the victims could raise the money demanded by the captors  Availability of mobile money
  • 7. + Boundary defying challenges  Vulnerable people outside supporting communities and home countries  Nation – state – based governance systems have been rendered ineffective 1. In monitoring and evaluation 2. In control and intervention  Fits international and inter continental mafia 1. Mobile money 2. Network of criminals 3. Defying rule of law
  • 8. + Looking forward  We really need to understand the ‘dark side’ of ICT and data use more  The discourse regarding migration needs to take the whole context into account  The use of ICT to promote community resilience is an opportunity that