SlideShare a Scribd company logo
Human Sex Trafficking: A Perspective from General Business, Organizational Leadership with a
focus on Information Technology
Michael Punzo
Texas Tech University
INTS 3300 - D01
Human Trafficking 1
Abstract
The interdisciplinary problem is human sex trafficking. The sources that I chose are
directly tied to my disciplines, information technology [cyber security], and general business.
Today’s criminals are using information technology to advance their gain in the underworld of
cybercrime. There are various forms of cybercrime such as cyber bullying, hacking, theft
(identity), and even sex trafficking. Information technology encompasses social media platforms
such as Facebook, Twitter, MySpace, SnapChat, and various others. Each of these platforms can
be and are being used by the criminal element to seek out their victims. Although bigger cities
like Las Vegas, Los Angeles, Miami, Houston, and New York are still losing young boys and
girls to prostitution, human trafficking is picking up ground and many of the hustlers and pimps
are turning to the Internet and technology to make their financial gains. They are selling these
young girls and boys over the Internet like a commodity. The police are behind in technical
means and are trying to learn this technology that the criminal element (cyber criminal) has built
and been using to stay one step ahead. The bottom line is that in order for us to be able to prevent
crimes like this from happening we must be more aware, educate our police, and build stronger
and more efficient databases using data mining.
This would allow a process to review large amounts of data that would seek out consistent
patterns and systematic relationships between variables.
Human Trafficking 2
STEP 1: Stating the Focus Question
Everyday thousands of women and children are being forced into human trafficking in all
parts of the world (Keomanivong, 2008). The mere thought of slavery, to many, seems like a
thing of the past, but the harsh reality is slavery has reared its ugly head once again. Modern day
slavery is something that robs the children of their innocence and youth. The criminal elements
that are active in this heinous crime force their victims [slaves] into participating in a sex act or
merely hold them as slaves (Kanics, 2003). Several victims of this crime that the trafficker
decides to keep and not traffic, have been beaten repeatedly, tortured by their captor, and then
handed off to another trafficker or just someone within the ranks. The complex problem is
human trafficking and it has no borders - the problem is global. Human trafficking comes in two
similar but distinct forms - labor and sex. The United Nations classifies Human Trafficking “as
the recruitment, transportation, transfer, harboring, or receipt of persons by improper means
(including force, abduction, fraud, or coercion) for an improper purpose including forced labor or
sexual exploitation”)(United Nations). Human trafficking crimes, for the most part, get
overlooked, unnoticed, or ignored simply from insufficient information made available to the
public. The fact of the matter is this “overlooked” or “unnoticed” crime grosses over $7 billion
dollars in revenue and traffics over 4 million people worldwide (Kanics, 2003). Delving into the
reasoning [what leads people to this] behind this crime is broad. For instance, poverty and
insufficient direct involvement from governments leads people down this dark and dangerous
path. Without government intervention the criminal element grows and so does numbers of
victims. When, there are multiple backgrounds that come together the community can form a
committee to discuss this problem. Members of such a committee can then begin to concentrate
Human Trafficking 3
on certain groups to gather information among from local law enforcement, state and federal,
legal, medical, community members, mental health professionals, and political groups. So, is
human sex trafficking a social issue that affects everyone or just those involved in the activity?
Could a discipline in Information Technology help in reducing, curtailing, or solving the
problem?
STEP 2: Justify Using an Interdisciplinary Approach
In 2014 the National Human Trafficking Resource Center (NHTRC) reported there
upwards and over 3,500 sex trafficking cases reported in the United States. (National Human
Trafficking Resource Center, "Human Trafficking"). The difference between sex trafficking and
labor trafficking is the venue or settings. Sex traffickers sell or place their victims in brothels,
escort services, fake massage parlors, strip clubs and even prostitution. Labor traffickers place,
or sell their victims to farmers or factories willing to participate in illegal activities. There are
20.9 million victims of human trafficking worldwide. Only about 0.4% of those victims are
identified worldwide, and less than 0.4% get the help or support they need (Pauw, Ponsaers,
Vijver, Bruggerman, Deelman 2011).
Under the United States federal law, anyone under 18 years of age induced into
commercial sex is a victim of sex trafficking -- regardless of whether the trafficker uses force,
fraud, or coercion (Coorlim, 2015)(Ford, 2015). According to the U.S. State Department,
600,000 to 800,000 people are trafficked across international borders yearly, of which 80% are
female and half are children. In addition to that, approximately 80% of trafficking involves
sexual exploitation, and only 19% has to do with labor exploitation. The United Nations
Human Trafficking 4
estimated that the human trafficking was a $31.6 billion dollar industry. (Farrell, A. & Fahy, S.,
2009)
Human trafficking encompasses a large framework. It is a global issue that affects
everyone from the poor to the elite rich. In the state of Texas alone there were 433 human
trafficking cases reported in 2015. Out of 433 of those reported cases, 337 were sex trafficking
and 368 of the victims were female (National Human Trafficking Resource Center Texas, 2016).
Specifically, human trafficking victims are mainly women and children. Because of the attention
placed on this issue, the U.S. stepped up and passed The Victims of Trafficking and Violence
Protection Act (TVPA) as early as the year 2000 (Current Federal Laws, 2015).
STEP 3 and 4: Identify Relevant Disciplines and Conduct a Literature Search
As early as the Clinton administration, people began to understand the seriousness, as
well as the criminal and economic aspect of this problem. In a report by the United Nations,
released in 1998, the International Labor Organization (ILO), called for the sex industry to be
recognized as a gainful economic role that contributed to the overall gross domestic product
(GDP) in parts of Southeast Asia (Raymond, 1999). Since prostitution was now recognized as an
official labor, prostitution fell under labor trafficking. Now the focus was split between sex
(forced sex) trafficking and labor (working) trafficking. Janice G. Raymond, well-known author
and feminist activist (fighting against sexual exploitation and violence against women and the
medical abuse of women as well) has testified internationally and nationally (the European
Parliament of the European Union 2004 and the United States Congress in 2003) opposing the
move to make the sex industry a legitimate form of business. She is involved in stating the case
to the various governments to not desensitize and decriminalize this criminal act. She has been
Human Trafficking 5
campaigning to find alternatives for women involved in the prostitution industry, asking the
governments to create alternatives for those caught in the nightmare of sexual exploitation.
In modern society criminals are using information technology to advance their gain in the
underworld of cybercrime (Holt, 2016). There are various forms of cybercrime such as cyber
bullying, hacking, theft (identity), and even sex trafficking. Information technology encompasses
social media platforms such as Facebook, Tinder, Twitter, MySpace, SnapChat, and various
others (Holt & Bossler, 2016)(Latonero 2011). According to Repko
Each one of these platforms can be and are being used by the criminal element to seek
out their victims. Although bigger cities like Las Vegas, Los Angeles, Miami, Houston, and New
York are still losing young boys and girls to prostitution, human trafficking is picking up ground
and many of the hustlers and pimps are turning to the Internet and technology to make their
financial gains (New York Business Journal, 2015). They are selling these young girls and boys
over the Internet like a commodity.
STEP 5: Develop Adequacy in Each Relevant Discipline
Cyber security in the 21st century has brought to the forefront the importance of security
[online] and joint efforts between individuals and the businesses they operate. Adam Palmer, a
senior expert in cybercrime and emerging crimes at UNODC (UN Office on Drugs and Crime),
said, “smartphones are the new phenomenon”. The police have to play catch-up to learn this new
technology in order to stay up with today’s cyber criminal. “Police are having to learn new
techniques to keep up with the criminals using smartphones for sex and labor trafficking. A
couple of years ago the majority of crimes were being committed on desktop computers”
(Wescott, 2013). In today’s society just about every crime committed, there seems to be a phone
Human Trafficking 6
tied to it (Wescott, 2013). The widespread growth of the Internet and mobile technologies,
combined with the ever rising threat to the personal and business world has become a major
concern for any and every person, organization /business that operates online. We must be more
aware of the role technology is playing in human trafficking. We must strive to keep pace and
educate ourselves with the ongoing and ever evolving [growing] pieces, parts, devices, programs,
applications and trends in the technology sector. Mobile technology will have to take a more
central role in responding to the complex problem. Bottom line is that in order for us to be able
to prevent crimes like this from happening we must be more aware, educate our police, build
stronger and more efficient databases using data mining. This would allow a process to review
large amounts of data that would seek out consistent patterns and systematic relationships
between variables. This addresses Repko’s step to developing adequacy in the relevant
discipline. Repko states, “By adequacy interdisciplinarians mean knowing enough about the
discipline to have a basic understanding of how it approaches, as well as illuminates and
characterizes, the problem” (Repko, 2012, p.102).
STEP 6: Analyze the Problem and Evaluate Each Theory
“Analyzing the problem requires viewing it through the lens of each disciplinary
perspective primarily in terms of its insights and theories” (Repko, 2012, p.226). Justifying an
interdisciplinary approach would allow one to weave multiple disciplines in answering this
complex problem. Sex trafficking affects the 1.) General Business, 2.) Organizational
Leadership, and even the world of 3.) Information Technology. Statistics show that social issues
affect everyone. Meaningful questions that would arise from the social issue would be:
Human Trafficking 7
● How can a market-driven criminal industry be controlled or curtailed to lessen
widespread sex trafficking?
● Who is the most vulnerable candidate for exploitation?
● What type of policy can be implemented to control or eradicate this business?
● What charities or organizations help with this issue?
● According to labor groups, how can we track known offenders/profiteers in the
human trafficking business?
● How to provide assistance to those who had been a victim?
● How can basic forensic techniques (old fashioned detective work) can be used in
catching these criminals over the internet?
● Why not create a master database with known criminal businesses (illegal
massage parlors, brothels, black market websites, prostitution rings, pimps, etc.)?
● How can we create a database with illegal human organ harvesting/trafficking
(who is the buyer, seller, and recipient)?
Looking at this from an information technology discipline (IT), you see that the answer is
complex and it comes from several facets. There is much more than can be with a database than
simply adding names and numbers - like gift registry. Using the Business Intelligence model you
can breakdown the database to a more detailed view of human trafficking. If a supermarket can
track Visa purchases between the hours of five and six, from those purchases identify customers
with the last two digits being 88 on their Visa card, and from that group of people find the ones
who purchased milk, then you should be able to create a database to track human trafficking
(people, places and things). Another, avenue to explore from the same discipline is the security
aspect of IT. Find a way to track the criminal element through the dark web. Each computer
Human Trafficking 8
(laptop, desktop, mobile phone) has its own unique identifier that is almost like a calling card.
Using this unique identifier the criminal element can be traced and brought to justice. The
technology and the know-how is there, but political opposition impedes progress.
Certainly one can see that Organizational Leadership of such a vast varied group would
take developed skills in such a discipline. An Organizational Manager is needed to oversee such
a huge task. For every background there are multiple different personalities and thoughts on how
to eliminate this problem. Being able to use an interdisciplinary approach results in a team of
like-minded individuals.
Providing research training and development of a Domestic Minor Sex Trafficking
(DMST) program is one of the necessary tools needed. An Organizational Manager can keep and
direct the focus of each of the team members in order to gather such information necessary for
said program. Another tool needed is providing education for the various backgrounds working
on the team (local law enforcement, state and federal, legal, medical, community members,
mental health professionals, and political groups). In my previous studies I have learned how to
develop a plan that will take a team from early development to a completed project. It certainly
comes with bumps in the road but a focused project manager can usually finish the task. An
Organizational Leader [Manager] in this case is not just a boss, but a liaison between the various
members. In this situation the Organizational Leader [Manager] can direct the focus for the
various research and training needed to develop an overall program.
Maintaining the program and even expanding the program would be necessary for
attempting to eliminate sex trafficking among minors. This certainly would fall in my area of
expertise in Information Technology (IT). Whether we like it or not, technology (Internet, social
Human Trafficking 9
media, smart phone, tablets and mobile applications) is in every facet of our lives. We must use
our intelligence hand-in-hand with technology to encompass the global initiative.
STEP 7: Identify Conflicts Between Insights/ Theories and their Sources
Amongst my three disciplines, there are no conflicts of literature. In other words, most of
what I have read, studied, and cited throughout my disciplines, all come together under the
umbrella of cyber-warfare regarding human trafficking. That is not to say there is not conflict
from other disciplines standpoint on this issue. Various disciplines could be used to better
explain human trafficking; some of them include political science, general business, psychology,
sociology, religion, economics, organizational leadership, criminal justice, international law,
anthropology, information technology and mathematics. Whether it be political science,
psychology, sociology, or any of the aforementioned, I am using my disciplines [information
technology, general business, organizational leadership] to integrate a solution to the complex
problem.
Looking at this from the sociology discipline one can see that sociology not only presents
the numbers and facts that lie behind human trafficking, but also the demographics and raw data
needed to better understand it. Sociology also helps explain the pace of social change, and will
allow for human trafficking to be observed by using historical analysis (Rose, 1974). Sociology
helps those in the IT sector working to combat human trafficking with the data needed to track,
locate, and apprehend the criminals behind the crime.
From the political science discipline, we see how the world handles human trafficking,
and how there tends to be an absence of governmental intervention. Information technology and
general business can help cross the political barrier. With proper leaders and officials, and
Human Trafficking 10
governments that are more proactive like the United States, then the possibility of seeing a
change becomes greater. Organizational leadership is a way to teach and guide local, state and
federal officials in an effort to have them on equal footing with the traffickers using technology
for their gain.
Another conflict outside of my disciplines would be financial. I am approaching human
sex trafficking from a digital perspective, the complex problem in the cyber-world, but there is
another whole other side that some would argue is more important than the cyber element and
that would be the economic factor. Since there is insufficient wealth and an abundance of
poverty in certain developing countries, it is important to use economics to make sense of why
this shortage exists in the countries where human trafficking is most prominent. In countries like
Vietnam, many of the young to older women that are part of the human trafficking ring (sex or
labor) use it as a way to earn a living. Poverty is more of a complex issue causing parents to even
sell their children in order to make just enough money to survive (Penh, 2007).
As six blind men described an elephant from their own perspective, each of the men was
right in their own way, but to get the total picture of the elephant all six of their perspectives
were needed to conclude what is an elephant. Therefore, we need a perspective from different
disciplines to solve a complex problem. Having only one perspective, then we see the elephant
[human trafficking] as just a fan [social issue] (as one blind man felt of the ear of the elephant);
instead of seeing him as a whole [information technology as a solution for human trafficking].
STEP 8: Create Common Ground between Concepts
Being able to use my skills to combat this growing problem is a way of turning
something that is being used for illegal activity and using it for the global good of mankind.
Human Trafficking 11
Information Technology is not limited to one facet, but rather multiple facets of this problem.
William Newell gives us four different techniques to create common ground: redefinition,
extension, organization, and transformation (Newell, 2010). In the IT world one can collaborate
with the different fields of expertise. We can improve this collaboration by identifying those who
prey upon the weak. This gives us an edge to combat sex trafficking using multiple platforms.
The enormous volume of data that is available to predators must be harnessed [collected] in a
database that is made available to the global first responder network [Interpol]. After the data is
collected the first responder network (Polaris, state, federal, and global police agencies) can then
sift through the information, analyze the important and immediate needs and take action. Being
able to red flag certain information can notify authorities when necessary. With information
technologies sex trafficking can be monitored possibly eradicated.
According to a project conducted by Center on Communication Leadership & Policy at
the University of Southern California “Technology-facilitated trafficking is far more diverse than
initially thought, it has spread across multiple online sites and digital platforms. Mobile devices
and networks play an increasingly important role that can potentially transform the trafficking
landscape” (Center on Communication Leadership & Policy).
STEP 9: Construct a More Comprehensive Understanding
Technology is rapidly growing and technology in its most innocent form is good, but it
can be used for evil. What happens when the weapon (technology) used for the elimination of
crime is the same weapon used against people’s safety? Something developed (built) for good is
often exploited which can result in depraved actions. The Internet has become both the hunting
ground and the marketplace for human sex trafficking and has become a resource of means for
Human Trafficking 12
traffickers [sex] with the ability to mask who they really are. We have to find ways to combat
these abusers and sex traffickers of children and others that are hiding behind encrypted
networks. It is key that cyber security and social media work together in finding a solution.
The nature of no supervision on the Internet, allows pimps, sex traffickers to use this
outlet to purchase trafficked women and children for criminal intent without the risk of
prosecution. Due to the fact that using the Internet holds such a small risk of prosecution, the
Internet has become the vehicle of choice amongst sex traffickers. Its audience is global through
the World Wide Web. The ease and availability of the Internet seems to decriminalize the act of
exploiting women and children, as they are being bought and sold like a piece of equipment.
There needs to be an international recognition and establishment of some type of strict human
rights law that would carry an explicit prosecution for using the Internet for sex trafficking.
Currently the statistics show “forced sexual exploitation “ is a multi-billion dollar
business. In the US alone, it is estimated to amount to over 27 billion dollars per year. This is the
amount that is estimated by the standard fees of a prostitute, assuming each forced sex worker
had 3 or 4 engagements per day. Yet, most sex trafficking goes unreported because it is a
criminal activity. According to the International Labor Organization (ILO) as of 2006 a more
accurate estimate was over $73 billion (USD) dollars globally.
Tied into the Technology Internet commerce, brought on by sex trafficking, is the
commercial sex industry. Many believe the development of high-tech software; video streaming
capabilities, and advanced search results (much of what we get from Google) is credited to the
sex industry. Craigslist.org was estimated at producing $80 million (USD) dollar in a year for the
various posting of sexual nature (Walberg 2009).
Human Trafficking 13
In modern times the term cybercrime is an umbrella term for heinous crimes or actions
done through and over the Internet. Sex trafficking knows no boundaries and the Internet has
made it easier for traffickers to hide and do business anonymously. BitCoin is the new online
currency and is virtually untraceable (Bitcoin, 2009). This makes sex trafficking through the use
of the Internet much more readily available. Smartphones are the new phenomenon and the
police are having to play catch-up and learn this new technology in order to stay up with today’s
cyber criminal. A few years ago the majority of crimes were being committed via desktop
computers. However, in today’s society just about every crime committed, there is a cellphone
tied to the crime. The rapid advancement of technology seems to be the logical answer for
combating the criminal element that uses technology for sex trafficking.
Presently there is not enough research that looks into what role technology plays in
human sex trafficking. In order to address the role technology is playing in human sex trafficking
more research is needed on the different aspects of human sex trafficking (Boyd, D., Casteel, H.,
Thakor, M., & Johnson, R., 2011).
Netscape first transmitted information on the World Wide Web in 1994. This was the
early years of the Internet as we know it today. Around the same time the first Internet
prostitution website made its debut. One school of thought from Donna Hughes, an investigator
for The Coalition Against Trafficking in Women and professor of Women’s Studies at the
University of Rhode Island, implies, that the sex industry has been the basis for “the
technological innovation and business model” (Hughes, 2000). The sex industry is considered
the father of online credit card payments, first through email then later through the development
of e-commerce software specifically built for secure transactions. As early as 1995, the sex
industry was offering live video streaming. Along with the offer of live video streaming, the
Human Trafficking 14
search engine was developed and promoted by those profiteers in the sex industry. Another
major impact was the development of the early version of database management (Hughes, 2000).
Technology is often used to advertise and coordinate the sale of victims. Technology
changes the advertising/selling process from the street corner to the digital domain, therefore
changing the risks that are involved in this series of actions. The risk [physical and legal] that
many of the victims will face online are unlike anything else they have seen before. New issues
like child pornography and money laundering and money exchange emerge and create new
challenges for law enforcement. Sharing information amongst the anti-trafficking players is time
sensitive and must be shared as soon as possible in order to help in the preventive process.
Cyber security in the 21st century has brought to the forefront the importance of security
[online] and joint efforts between individuals and the businesses they operate. If you can fight
fire with fire, then you can fight sex trafficking through the Internet with the Internet. How safe
and secure are we on the Internet or on your smartphone/tablet? The widespread growth of the
internet combined with the ever-rising threat to the personal and business worlds has become a
major concern for any and every person, organization /business that operates online.
Kostopoulos suggests some strong guidelines for measuring and assessing vulnerabilities
the end-user might have while online. Kostopoulos lays out a plan on how to avoid some of these
vulnerabilities. He also addresses the role of the U.S. Department of Homeland Security in cyber
preparedness (Kostopoulos, 2016).
To provide a better understanding of human sex trafficking, one must see the end result
of the interdisciplinary research that I have previously stated. By blending my disciplines of
Information Technology, Organizational Leadership and General Business I believe I made a
Human Trafficking 15
clear way to find a solution to human trafficking. Typically one might not have selected these
three disciplines for this problem, but I feel they are related to the goal of eradicating human
trafficking.
STEP 10: Reflect on, Test, and Communicate the Understanding
Researchers at USC (University of Southern California) Annenberg Center on
Communication Leadership & Policy released a report showing that human traffickers have
adapted to the 21st century technological landscape relatively fast. Although the quick spread of
the digital technologies such as the Internet, social networking sites, and mobile phones provide
some level of benefit to modern society, so have opportunities to exploit these new technologies
come about as well (Latonero 2012). Technology is growing at a rapid rate, with new
applications, software and hardware being developed; it opens the door, on a global scale, for the
sharing of information and communication. The only problem is this new technology also allows
criminals to gather and become more structured globally as well as use it to victimize
unsuspecting women and children, all the while hiding behind a computer, which enables this
behavior. Technology knows no boundaries and when it comes to the flow of information there
are no borders. With new technology comes greater accessibility to all, even sex traffickers. No
longer is this limited to just a local level, but it is global on the World Wide Web. This same
technology that allows these sex traffickers to reach out to victimize women and children, also
allows privacy and anonymity for their despicable crimes. Typically, the criminal element taking
part in this activity is not in the place where their behavior or actions take place. Internet sex
crimes are no longer bound by location, as the Internet allows accessibility anywhere (Kunzie,
2010). However, just like a forest firefighter fights fire with fire, we too can use technology that
is being used for trafficking to combat it.
Human Trafficking 16
In their report they showed that mobile devices and various types of networks have
become a major focus point to the role of sex trafficking of minors in the United States.
Although, the social networking sites and classifieds (craigslist, online dating, etc.) are still ripe
for exploitation, the finding from their research indicates that technology-facilitated trafficking is
even broader and more flexible than thought. Human [sex] traffickers and criminal enterprises
are taking advantage of technology (which is easily accessible and obtainable) to reach broader
markets and to do illegal business quicker and more efficiently across greater divides (Latonero,
M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K., 2012).
CONCLUSION AND FUTURE STUDY
We started with the focus question, “Is human sex trafficking a social issue that affects
everyone or just those involved in the activity? Could a discipline in Information Technology
help in reducing, curtailing, or solving the problem?” Looking into the future we have to strive to
play catch-up both financially and technologically. A comprehensive solution to stemming
online sex trafficking is to form an international agreement that explicitly prohibits such activity.
The agreement could specify it is the type of conduct conducted over the Internet–and not
inhibiting the freedom of speech conducted there–that constitutes criminal human trafficking
violations. Members of the international community work together on adopting Internet-specific
anti-trafficking provisions simply because they have already expressed their commitment to
prohibiting trafficking activity under the Protocol to Prevent, Suppress and Punish Trafficking in
Persons, Especially Women and Children (United Nations Office on Drugs and Crime, 2000).
Human Trafficking 17
Boyd, D., Casteel, H., Thakor, M., & Johnson, R. (n.d.). Human Trafficking and Technology. A
framework for understanding the role of technology in the commercial sexual
exploitation of children in the U.S. - Together Against Trafficking in Human Beings -
European Commission. (Discipline - Information Technology, Phenomenon: Role of
technology in sex trafficking, Research Methods: qualitative & quantitative)
Presently there is little research that looks into the what role technology plays in
human sex trafficking. Policies, procedures and interventions based speculation and
forming an opinion or making estimations or assumptions about this from little
known facts or various incidents. In order to address the role technology is playing
in human sex trafficking more research is needed on the different aspects of human
sex trafficking.
Technology is often used to advertise and coordinate the sale of victims.
Technology changes the advertising/selling process from the street corner to the digital
domain, therefore changing the risks that are involved in this series of actions. The risk
[physical and legal] that many of the victims will face online are unlike anything else
they have seen before. New issues like child pornography and money laundering and
money exchange emerge and create new challenges for law enforcement. Sharing
information amongst the anti-trafficking players is time sensitive and must shared as
soon as possible in order to help in the preventive process.
“Cyberspace and Cybersecurity” (Kostopoulos, 2016): Kostopoulos, G. K.
Kostopoulos, G. K. (2013). Cyberspace and Cybersecurity. Boca Raton, FL: Taylor &
Francis Group. (Discipline: Information Technology & Business, Phenomenon: How safe
are we in the cyberworld?, Research Method: qualitative & quantitative)
Cyber security in the 21st century has brought to the forefront the importance of
security [online] and joint efforts between individuals and the businesses they operate.
If you can fight fire with fire, then you can fight sex trafficking through the internet
with the internet. How safe and secure are we on the internet or on your
smartphone/tablet? The widespread growth of the internet combined with the ever
rising threat to the personal and business worlds has become a major concern for any
and every person, organization /business that operates online.
Kostopoulos lays out some very strong guidelines for measuring and assessing
vulnerabilities the end-user might have while online. Kostopoulos lays out a plan on
how to avoid some of these vulnerabilities. He also addresses the role of the U.S.
Department of Homeland Security in cyber preparedness.
Human Trafficking 18
Dixon, H. B., Jr. (2013). Human Trafficking and the Internet* (*and Other Technologies, too).
The Judges' Journal, 52(1). (Discipline: Judicial Law & Information Technology,
Phenomenon: Strategies to combat human trafficking, Research Method: qualitative &
quantitative)
The use of the Internet is widespread and accessible to almost everyone in almost
every location in the world. Human trafficking is a very large problem that has certainly
made its debut on the Internet. Whether it is a public social outlet such as Facebook, or
a more private hidden chat room, both are used to entice some of the millions of human
trafficking victims. It may appear as an “innocent “ chat with an unknown, a posting of
a job recruitment, or even trying to meet that special someone on a matchmaking site,
but as some victims will come to realize, it was a ruse. There lure of something better is
always out there, even on the Internet.
The contrasting side of the lure on the Internet is being able to combat human
trafficking through the use of the Internet. Posting ads warning people of such tactics
helps to curb this activity. The Internet is even being used by certain anti-trafficking
groups that aid the law enforcement and investigators to interrupt such activity on the
Internet. Furthermore, the advanced technologies can be used to even track the
consumers of such sex trafficking.
Educating the public will produce a major effort to curb/stop sex trafficking
through use of the Internet. Using this technology makes good common sense. After all,
if the criminal makes use of what is available, then it should be used by law
enforcement, investigators and anti-trafficking groups. Getting private industry(big
money) and the private individuals involved will help further the effort of using the
Internet to end sex trafficking.
Farrell, A. & Fahy, S. (2009). The problem of human trafficking in the U.S.: Public frames and
policy responses. Journal of Criminal Justice, 37, 517-526.(Discipline: Criminal Justice,
Research Method: qualitative and quantitative, Phenomenon: combating sex trafficking
through the use of the Internet)
Human trafficking encompasses a large framework. It is a global issue that affects
everyone from the poor to the elite rich. Specifically, human trafficking victims are
mainly women and children. Because of the attention placed on this issue, the U.S.
stepped up and passed The Victims of Trafficking and Violence Protection Act (TVPA)
as early as the year 2000.
The authors of this article strived to present the information as a human rights
issue. As early as the Clinton administration, people began to understand the
seriousness and the criminal aspect of this problem. Since prostitution was now
Human Trafficking 19
recognized as an official labor, prostitution fell under labor trafficking. Now the focus
was split between sex (forced sex) trafficking and labor (working) trafficking.
The media played a role in setting the tone to read “trafficking “ meant persons
from outside the U.S. coming to our country to work or be held against their will to
perform sex. This implied “outsiders” were the issue and not the trafficking; when in
fact, persons from the U.S. were being trafficked on this country’s soil as well as
outside our borders. Then came the outcry for funding to combat the problem.
However, as with anything political or profitable, people manipulated the data to gain
power or money for their own.
Latonero, M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K. (2012).The rise
of mobile and the diffusion of technology-facilitated trafficking. Los Angeles, CA:
University of Southern California, Center on Communication Leadership & Policy.
(Disciplines: Business, Communications, Information Technology, Political Science,
Journalism, Law, Phenomenon: Using technology to combat human trafficking, Research
Method: qualitative & quantitative)
Researchers at USC (University of Southern California) Annenberg Center on
Communication Leadership & Policy released a report showing that human traffickers
have adapted to the 21st century technological landscape relatively fast. Although the
quick spread of the digital technologies such as the Internet, social networking sites,
and mobile phones provide some level of benefit to modern society, so have
opportunities to exploit these new technologies come about as well. However, just like
a forest firefighter fights fire with fire, we too can use technology that is being used for
trafficking to combat it.
In their report they showed that mobile devices and various types of networks have
become a major focus point to the role of sex trafficking of minors in the United States.
Although, the social networking sites and classifieds (craigslist, online dating, etc.) are
still ripe for exploitation, the findings from their research indicates that technology-
facilitated trafficking is even broader and more flexible than thought. Human [sex]
traffickers and criminal enterprises are taking advantage of technology (which is easily
accessible and obtainable) to reach broader markets and to do illegal business quicker
and more efficiently across greater divides.
Human Trafficking 20
Walker-Rodriguez, A., & Hill, R. (2011, March). Human Sex Trafficking. (Disciplines:
Organizational Leadership, Law, Information Technology, Phenomenon: Human sex
trafficking a problem at home as well as abroad, Research Method: qualitative &
quantitative)
Human sex trafficking is a form of modern day slavery and it is a very lucrative
business as well. It is considered to be the third-largest criminal enterprise in the world
and one of the fastest-growing businesses of organized crime. The business itself has
become more organized and violent. According to Walker-Rodriguez and Hill many of
the victims (women and young girls) that are kidnapped, are sold to other traffickers,
who in turn lock them (the victims) up in brothels for long periods of time, they drug
them, rape them repeatedly and use various scare tactics to terrorize them.
They [the traffickers] can sometimes create a bond with their younger victims by
promising marriage or even a lifestyle the child did not have in a previous life or with
their family. Often the traffickers use words such as “love” or “need” to coerce the
victim into doing what they want and that any sex acts they are required to do is for
their future. Where there is a positive male role model absent in the victim’s family life
it leaves opportunity for the predator to take advantage.
ICE (U.S. Immigration Customs Enforcement) along with INTERPOL or ICPO
(The International Criminal Police Organization) forcefully pursues their targets in the
global criminal enterprise of human sex trafficking, which includes people (anyone
from a simple street thug to a wealthy oil tycoon or politician), currency, and the
various items [materials - computers, servers (local and remote)] that support the
human sex trafficking networks. Creating a database with all relevant information
would enable the FBI, ICE or INTERPOL to have easy access to a card catalog with
pertinent information regarding victims, predators, popular networks, and other players
in the game.
Human Trafficking 21
References
Armerding, T. (2015, June 23). Cybercrime: Much more organized. Retrieved February 26,
2016, from http://goo.gl/TvKRA0
Bitcoin - Open source P2P money. (2009). Retrieved July 08, 2016, from https://bitcoin.org/en/
Boyd, D., Casteel, H., Thakor, M., & Johnson, R. (n.d.). Human Trafficking and Technology. A
framework for understanding the role of technology in the commercial sexual
exploitation of children in the U.S. - European Commission. Retrieved July 12, 2016,
from https://ec.europa.eu/anti-trafficking/publications/human-trafficking-and-technology-
framework-understanding-role-technology-commercial_en
Current Federal Laws. (2015). Retrieved July 09, 2016, from http://polarisproject.org/current-
federal-laws
Dixon, H. B., Jr. (2013). Human Trafficking and the Internet* (*and Other Technologies, too).
The Judges' Journal, 52(1).
Facebook partners with N.Y. attorney general on plan to fight human trafficking. (2015). New
York Business Journal. Retrieved February 25, 2016, from http://goo.gl/tFYY9B
Farrell, A., & Fahy, S. (2009). The problem of human trafficking in the U.S.: Public frames and
policy responses. Journal of Criminal Justice, 37(6), 617-626.
doi:10.1016/j.jcrimjus.2009.09.010
Forrest, S., Hofmey, S., & InEdwards, R. (2013, June 24). The Complex Science of Cyber
Defense. Retrieved February 29, 2016, from https://hbr.org/2013/06/embrace-the-
complexity-of-cybe
Human Trafficking 22
Fuchs, E. (2014, August 11). This Is What Modern-Day Sex Slavery In America Looks Like.
Retrieved February 28, 2016, from http://goo.gl/2dBp35
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of
technology-enabled offenses. New York, NY: Routledge.
Hughes, D. M. (2000, February). The Internet and sex industries: Partners in global sexual
exploitation. IEEE Technology and Society Magazine, 19(1), 35-42.
Huston, W. T. (2016, February 29). Wounded Military Vets Joining Law Enforcement in Hunt
for Online Child Predators - Breitbart. Retrieved February 29, 2016, from
http://www.breitbart.com/big-government/2016/02/29/wounded-military-vets-joining-
law-enforcement-in-hunt-for-online-child-predators/?utm_source=facebook
Kostopoulos, G. K. (2013). Cyberspace and Cybersecurity. Auerbach Publications.
Latonero, M. (2011, September). Human Trafficking Online: The Role of Social Networking
Sites and Online Classifieds [Scholarly project]. University of Southern California,
Center on Communication Leadership & Policy Retrieved July 29, 2016, from
https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf
Latonero, M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K. (2012).The rise
of mobile and the diffusion of technology-facilitated trafficking. Los Angeles, CA:
University of Southern California, Center on Communication Leadership & Policy from
https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf
Human Trafficking 23
Mendel, J., & Sharapov, K. (2016). Human Trafficking and Online Networks: Policy, Analysis,
and Ignorance. Antipode. National Human Trafficking Resource Center | Texas. (2016,
June 30). Retrieved July 09, 2016, from https://traffickingresourcecenter.org/state/texas
Newell, W. (2010). Educating for a Complex World: Integrative Learning and Interdisciplinary
Studies. Retrieved August 09, 2016, from https://www.aacu.org/publications-
research/periodicals/educating-complex-world-integrative-learning-and-interdisciplinary
Pauw, E. D., Ponsaers, P., Vijver, K. V., Bruggerman, W., & Deelman, P. (2011).Technological-
led policing. Antwerp: Maklu.
Penh, P. (2007). Innocence for sale. Economist. 384, 53-54.
Repko, A. (2012). Interdisciplinary research: Process and theory. Los Angeles, CA. Sage.
Rose, J. (1974). Introduction to sociology. Chicago: Rand McNally.
Walberg, M. (2009, March 9). Sheriff sues Craigslist as 'largest source' of prostitution. Retrieved
July 12, 2016, from
http://www.chicagobreakingnews.com/2009/03/sheriffs-lawsuit-says-craiglist-largest-
source-of-prostitution.html
United Nations Office on Drugs and Crime. (2000, November 15). Retrieved July 27, 2016,
from https://www.unodc.org/unodc/treaties/CTOC/
Yu, S. (2015). Human Trafficking and the Internet. In M. J. Palmiotto (Ed.),Combating Human
Trafficking: A Multidisciplinary Approach (pp. 1-309). Boca Raton, FL: Taylor &
Francis Group.
Human Trafficking 24
Zagorianou, A. (2015, July 27). Technology and Human Trafficking. Retrieved July 24, 2016,
from http://www.uhrsn.org/2015/07/technology-and-human-trafficking/

More Related Content

What's hot

Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
Ammar farooq
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
Bill Reichart
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
John MacDougall
 
Human Trafficking And Globalization
Human Trafficking And GlobalizationHuman Trafficking And Globalization
Human Trafficking And Globalization
mulvey.laura
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
Cree Stetler
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
Dr Lendy Spires
 
Child Trafficking in India A Situational Analysis
Child Trafficking in India A Situational AnalysisChild Trafficking in India A Situational Analysis
Child Trafficking in India A Situational Analysis
HAQ: Centre for Child Rights
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determining
Alexander Decker
 
Human Trafficking Intro
Human Trafficking IntroHuman Trafficking Intro
Human Trafficking Intro
tranceking
 
HumanTraffickingPresentation
HumanTraffickingPresentationHumanTraffickingPresentation
HumanTraffickingPresentation
Rachel Brewer
 
Human Trafficking: A Local Problem
Human Trafficking: A Local ProblemHuman Trafficking: A Local Problem
Human Trafficking: A Local Problem
FBCsavannah
 
Powerpoint
PowerpointPowerpoint
Powerpoint
vanessadegonzales
 
How to stop human trafficking
How to stop human trafficking How to stop human trafficking
How to stop human trafficking
Global Development Network
 
Sex Trafficking In Nepal: A Review of Problems and Solutions
Sex Trafficking In Nepal: A Review of Problems and SolutionsSex Trafficking In Nepal: A Review of Problems and Solutions
Sex Trafficking In Nepal: A Review of Problems and Solutions
inventionjournals
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
Yasir Afzal Rajput
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
Priyankush salouria
 
Dallas 2013
Dallas 2013Dallas 2013
Weber_3300_L4-A1
Weber_3300_L4-A1Weber_3300_L4-A1
Weber_3300_L4-A1
Stephen Weber
 
Human traffiking english
Human traffiking englishHuman traffiking english
Human traffiking english
Khaernisaa Citra
 
hdgsnabdiuyts
hdgsnabdiuytshdgsnabdiuyts
hdgsnabdiuyts
EMSMedic79
 

What's hot (20)

Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Human Trafficking And Globalization
Human Trafficking And GlobalizationHuman Trafficking And Globalization
Human Trafficking And Globalization
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
 
Child Trafficking in India A Situational Analysis
Child Trafficking in India A Situational AnalysisChild Trafficking in India A Situational Analysis
Child Trafficking in India A Situational Analysis
 
Women participation in politics and poverty as determining
Women participation in politics and poverty as determiningWomen participation in politics and poverty as determining
Women participation in politics and poverty as determining
 
Human Trafficking Intro
Human Trafficking IntroHuman Trafficking Intro
Human Trafficking Intro
 
HumanTraffickingPresentation
HumanTraffickingPresentationHumanTraffickingPresentation
HumanTraffickingPresentation
 
Human Trafficking: A Local Problem
Human Trafficking: A Local ProblemHuman Trafficking: A Local Problem
Human Trafficking: A Local Problem
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
How to stop human trafficking
How to stop human trafficking How to stop human trafficking
How to stop human trafficking
 
Sex Trafficking In Nepal: A Review of Problems and Solutions
Sex Trafficking In Nepal: A Review of Problems and SolutionsSex Trafficking In Nepal: A Review of Problems and Solutions
Sex Trafficking In Nepal: A Review of Problems and Solutions
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Human Trafficking
Human TraffickingHuman Trafficking
Human Trafficking
 
Dallas 2013
Dallas 2013Dallas 2013
Dallas 2013
 
Weber_3300_L4-A1
Weber_3300_L4-A1Weber_3300_L4-A1
Weber_3300_L4-A1
 
Human traffiking english
Human traffiking englishHuman traffiking english
Human traffiking english
 
hdgsnabdiuyts
hdgsnabdiuytshdgsnabdiuyts
hdgsnabdiuyts
 

Viewers also liked

Gesture Technology
Gesture TechnologyGesture Technology
Gesture Technology
BugRaptors
 
Vocab gestures to continuity
Vocab gestures to continuityVocab gestures to continuity
Vocab gestures to continuity
Erin Silveira
 
Hand Gesture Recognition System for Human-Computer Interaction with Web-Cam
Hand Gesture Recognition System for Human-Computer Interaction with Web-CamHand Gesture Recognition System for Human-Computer Interaction with Web-Cam
Hand Gesture Recognition System for Human-Computer Interaction with Web-Cam
ijsrd.com
 
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
Waqas Tariq
 
hand gesture based interactive photo silder
hand gesture based interactive photo silderhand gesture based interactive photo silder
hand gesture based interactive photo silder
sampada muley
 
Vietnam culture
Vietnam cultureVietnam culture
Vietnam culture
Nguyen Duc Hoat
 
Human machine interaction using Hand gesture recognition
Human machine interaction using Hand gesture recognitionHuman machine interaction using Hand gesture recognition
Human machine interaction using Hand gesture recognition
Manoj Harsule
 
Gestures Presentation
Gestures PresentationGestures Presentation
Gestures Presentation
Asha McGarrell
 
Gestures and body language
Gestures and body languageGestures and body language
Gestures and body language
mariashanicemitra
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
jinal thakrar
 
Gesture recognition adi
Gesture recognition adiGesture recognition adi
Gesture recognition adi
aditya verma
 
Hand Gesture Recognition
Hand Gesture RecognitionHand Gesture Recognition
Hand Gesture Recognition
Shounak Katyayan
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
Shounak Katyayan
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
Suraj Rai
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
PrachiWadekar
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
Nagamani Gurram
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
International Journal of Technical Research & Application
 
Product and service design
Product and service designProduct and service design
Product and service design
Grace Falcis
 

Viewers also liked (18)

Gesture Technology
Gesture TechnologyGesture Technology
Gesture Technology
 
Vocab gestures to continuity
Vocab gestures to continuityVocab gestures to continuity
Vocab gestures to continuity
 
Hand Gesture Recognition System for Human-Computer Interaction with Web-Cam
Hand Gesture Recognition System for Human-Computer Interaction with Web-CamHand Gesture Recognition System for Human-Computer Interaction with Web-Cam
Hand Gesture Recognition System for Human-Computer Interaction with Web-Cam
 
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
Hand Segmentation Techniques to Hand Gesture Recognition for Natural Human Co...
 
hand gesture based interactive photo silder
hand gesture based interactive photo silderhand gesture based interactive photo silder
hand gesture based interactive photo silder
 
Vietnam culture
Vietnam cultureVietnam culture
Vietnam culture
 
Human machine interaction using Hand gesture recognition
Human machine interaction using Hand gesture recognitionHuman machine interaction using Hand gesture recognition
Human machine interaction using Hand gesture recognition
 
Gestures Presentation
Gestures PresentationGestures Presentation
Gestures Presentation
 
Gestures and body language
Gestures and body languageGestures and body language
Gestures and body language
 
GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
 
Gesture recognition adi
Gesture recognition adiGesture recognition adi
Gesture recognition adi
 
Hand Gesture Recognition
Hand Gesture RecognitionHand Gesture Recognition
Hand Gesture Recognition
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
Gesture recognition technology
Gesture recognition technology Gesture recognition technology
Gesture recognition technology
 
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
HAND GESTURE RECOGNITION FOR HCI (HUMANCOMPUTER INTERACTION) USING ARTIFICIAL...
 
Product and service design
Product and service designProduct and service design
Product and service design
 

Similar to Punzo_3300_L8-RP

Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docxRunning head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
todd581
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
Avinash Rajput
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
JohnGacinya
 
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docxWeek 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
melbruce90096
 
HSC 425 Paper
HSC 425 PaperHSC 425 Paper
HSC 425 Paper
Grayson Teng
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
Gim Andrade Vidal
 
Le rapport de l'Etat américain sur l'esclavage
Le rapport de l'Etat américain sur l'esclavageLe rapport de l'Etat américain sur l'esclavage
Le rapport de l'Etat américain sur l'esclavage
itele
 
Social Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdfSocial Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdf
Women's Rights Group
 
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
International Journal of World Policy and Development Studies
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and control
JohnGacinya
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
JohnGacinya
 
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
Amy Cernava
 
Public Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day SlaveryPublic Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day Slavery
Dr. Carsten Weerth BSc (University of Glasgow) LLM MA
 
Humantraff
HumantraffHumantraff
Humantraff
dwig00
 
Human Trafficking in Vietnam: A Review of Patterns and Legal Framework
Human Trafficking in Vietnam: A Review of Patterns and Legal FrameworkHuman Trafficking in Vietnam: A Review of Patterns and Legal Framework
Human Trafficking in Vietnam: A Review of Patterns and Legal Framework
inventionjournals
 
#1 DISCUSSION 11 WEEK 15 (kar)Research a current news item (ne.docx
#1  DISCUSSION 11 WEEK 15  (kar)Research a current news item (ne.docx#1  DISCUSSION 11 WEEK 15  (kar)Research a current news item (ne.docx
#1 DISCUSSION 11 WEEK 15 (kar)Research a current news item (ne.docx
mayank272369
 

Similar to Punzo_3300_L8-RP (17)

Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docxRunning head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
Running head PROJECT PROPOSAL ON HUMAN TRAFFICKING 1PROJECT PR.docx
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docxWeek 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
Week 5BSHS 302 Week 5 DQ 2 (Existence of Sweat Shops in other C.docx
 
HSC 425 Paper
HSC 425 PaperHSC 425 Paper
HSC 425 Paper
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Le rapport de l'Etat américain sur l'esclavage
Le rapport de l'Etat américain sur l'esclavageLe rapport de l'Etat américain sur l'esclavage
Le rapport de l'Etat américain sur l'esclavage
 
Social Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdfSocial Media and Sex Trafficking Is There a Connection.pdf
Social Media and Sex Trafficking Is There a Connection.pdf
 
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
The Effectiveness of State and Non-State Actors in Combating Human Traffickin...
 
Human trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and controlHuman trafficking incidence in rwanda its challenges, prevention and control
Human trafficking incidence in rwanda its challenges, prevention and control
 
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and ControlHuman Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
Human Trafficking Incidence in Rwanda: Its Challenges, Prevention and Control
 
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...A Critical Analysis Of Cross-Border Human Trafficking  An Opportunity For The...
A Critical Analysis Of Cross-Border Human Trafficking An Opportunity For The...
 
Public Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day SlaveryPublic Service Announcement: Human Trafficking - The Modern Day Slavery
Public Service Announcement: Human Trafficking - The Modern Day Slavery
 
Humantraff
HumantraffHumantraff
Humantraff
 
Human Trafficking in Vietnam: A Review of Patterns and Legal Framework
Human Trafficking in Vietnam: A Review of Patterns and Legal FrameworkHuman Trafficking in Vietnam: A Review of Patterns and Legal Framework
Human Trafficking in Vietnam: A Review of Patterns and Legal Framework
 
#1 DISCUSSION 11 WEEK 15 (kar)Research a current news item (ne.docx
#1  DISCUSSION 11 WEEK 15  (kar)Research a current news item (ne.docx#1  DISCUSSION 11 WEEK 15  (kar)Research a current news item (ne.docx
#1 DISCUSSION 11 WEEK 15 (kar)Research a current news item (ne.docx
 

More from Michael Punzo

ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
Michael Punzo
 
landtroop_letter_of_reccomendation
landtroop_letter_of_reccomendationlandtroop_letter_of_reccomendation
landtroop_letter_of_reccomendationMichael Punzo
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
Michael Punzo
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
Michael Punzo
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
Michael Punzo
 
ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12
Michael Punzo
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
Michael Punzo
 
ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
Michael Punzo
 
BurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.docBurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.doc
Michael Punzo
 
PUNZO_M2_A1
PUNZO_M2_A1PUNZO_M2_A1
PUNZO_M2_A1
Michael Punzo
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
Michael Punzo
 

More from Michael Punzo (12)

ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
 
landtroop_letter_of_reccomendation
landtroop_letter_of_reccomendationlandtroop_letter_of_reccomendation
landtroop_letter_of_reccomendation
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
 
rcc_lisk_lor
rcc_lisk_lorrcc_lisk_lor
rcc_lisk_lor
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
 
BurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.docBurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.doc
 
PUNZO_M2_A1
PUNZO_M2_A1PUNZO_M2_A1
PUNZO_M2_A1
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 

Punzo_3300_L8-RP

  • 1. Human Sex Trafficking: A Perspective from General Business, Organizational Leadership with a focus on Information Technology Michael Punzo Texas Tech University INTS 3300 - D01
  • 2. Human Trafficking 1 Abstract The interdisciplinary problem is human sex trafficking. The sources that I chose are directly tied to my disciplines, information technology [cyber security], and general business. Today’s criminals are using information technology to advance their gain in the underworld of cybercrime. There are various forms of cybercrime such as cyber bullying, hacking, theft (identity), and even sex trafficking. Information technology encompasses social media platforms such as Facebook, Twitter, MySpace, SnapChat, and various others. Each of these platforms can be and are being used by the criminal element to seek out their victims. Although bigger cities like Las Vegas, Los Angeles, Miami, Houston, and New York are still losing young boys and girls to prostitution, human trafficking is picking up ground and many of the hustlers and pimps are turning to the Internet and technology to make their financial gains. They are selling these young girls and boys over the Internet like a commodity. The police are behind in technical means and are trying to learn this technology that the criminal element (cyber criminal) has built and been using to stay one step ahead. The bottom line is that in order for us to be able to prevent crimes like this from happening we must be more aware, educate our police, and build stronger and more efficient databases using data mining. This would allow a process to review large amounts of data that would seek out consistent patterns and systematic relationships between variables.
  • 3. Human Trafficking 2 STEP 1: Stating the Focus Question Everyday thousands of women and children are being forced into human trafficking in all parts of the world (Keomanivong, 2008). The mere thought of slavery, to many, seems like a thing of the past, but the harsh reality is slavery has reared its ugly head once again. Modern day slavery is something that robs the children of their innocence and youth. The criminal elements that are active in this heinous crime force their victims [slaves] into participating in a sex act or merely hold them as slaves (Kanics, 2003). Several victims of this crime that the trafficker decides to keep and not traffic, have been beaten repeatedly, tortured by their captor, and then handed off to another trafficker or just someone within the ranks. The complex problem is human trafficking and it has no borders - the problem is global. Human trafficking comes in two similar but distinct forms - labor and sex. The United Nations classifies Human Trafficking “as the recruitment, transportation, transfer, harboring, or receipt of persons by improper means (including force, abduction, fraud, or coercion) for an improper purpose including forced labor or sexual exploitation”)(United Nations). Human trafficking crimes, for the most part, get overlooked, unnoticed, or ignored simply from insufficient information made available to the public. The fact of the matter is this “overlooked” or “unnoticed” crime grosses over $7 billion dollars in revenue and traffics over 4 million people worldwide (Kanics, 2003). Delving into the reasoning [what leads people to this] behind this crime is broad. For instance, poverty and insufficient direct involvement from governments leads people down this dark and dangerous path. Without government intervention the criminal element grows and so does numbers of victims. When, there are multiple backgrounds that come together the community can form a committee to discuss this problem. Members of such a committee can then begin to concentrate
  • 4. Human Trafficking 3 on certain groups to gather information among from local law enforcement, state and federal, legal, medical, community members, mental health professionals, and political groups. So, is human sex trafficking a social issue that affects everyone or just those involved in the activity? Could a discipline in Information Technology help in reducing, curtailing, or solving the problem? STEP 2: Justify Using an Interdisciplinary Approach In 2014 the National Human Trafficking Resource Center (NHTRC) reported there upwards and over 3,500 sex trafficking cases reported in the United States. (National Human Trafficking Resource Center, "Human Trafficking"). The difference between sex trafficking and labor trafficking is the venue or settings. Sex traffickers sell or place their victims in brothels, escort services, fake massage parlors, strip clubs and even prostitution. Labor traffickers place, or sell their victims to farmers or factories willing to participate in illegal activities. There are 20.9 million victims of human trafficking worldwide. Only about 0.4% of those victims are identified worldwide, and less than 0.4% get the help or support they need (Pauw, Ponsaers, Vijver, Bruggerman, Deelman 2011). Under the United States federal law, anyone under 18 years of age induced into commercial sex is a victim of sex trafficking -- regardless of whether the trafficker uses force, fraud, or coercion (Coorlim, 2015)(Ford, 2015). According to the U.S. State Department, 600,000 to 800,000 people are trafficked across international borders yearly, of which 80% are female and half are children. In addition to that, approximately 80% of trafficking involves sexual exploitation, and only 19% has to do with labor exploitation. The United Nations
  • 5. Human Trafficking 4 estimated that the human trafficking was a $31.6 billion dollar industry. (Farrell, A. & Fahy, S., 2009) Human trafficking encompasses a large framework. It is a global issue that affects everyone from the poor to the elite rich. In the state of Texas alone there were 433 human trafficking cases reported in 2015. Out of 433 of those reported cases, 337 were sex trafficking and 368 of the victims were female (National Human Trafficking Resource Center Texas, 2016). Specifically, human trafficking victims are mainly women and children. Because of the attention placed on this issue, the U.S. stepped up and passed The Victims of Trafficking and Violence Protection Act (TVPA) as early as the year 2000 (Current Federal Laws, 2015). STEP 3 and 4: Identify Relevant Disciplines and Conduct a Literature Search As early as the Clinton administration, people began to understand the seriousness, as well as the criminal and economic aspect of this problem. In a report by the United Nations, released in 1998, the International Labor Organization (ILO), called for the sex industry to be recognized as a gainful economic role that contributed to the overall gross domestic product (GDP) in parts of Southeast Asia (Raymond, 1999). Since prostitution was now recognized as an official labor, prostitution fell under labor trafficking. Now the focus was split between sex (forced sex) trafficking and labor (working) trafficking. Janice G. Raymond, well-known author and feminist activist (fighting against sexual exploitation and violence against women and the medical abuse of women as well) has testified internationally and nationally (the European Parliament of the European Union 2004 and the United States Congress in 2003) opposing the move to make the sex industry a legitimate form of business. She is involved in stating the case to the various governments to not desensitize and decriminalize this criminal act. She has been
  • 6. Human Trafficking 5 campaigning to find alternatives for women involved in the prostitution industry, asking the governments to create alternatives for those caught in the nightmare of sexual exploitation. In modern society criminals are using information technology to advance their gain in the underworld of cybercrime (Holt, 2016). There are various forms of cybercrime such as cyber bullying, hacking, theft (identity), and even sex trafficking. Information technology encompasses social media platforms such as Facebook, Tinder, Twitter, MySpace, SnapChat, and various others (Holt & Bossler, 2016)(Latonero 2011). According to Repko Each one of these platforms can be and are being used by the criminal element to seek out their victims. Although bigger cities like Las Vegas, Los Angeles, Miami, Houston, and New York are still losing young boys and girls to prostitution, human trafficking is picking up ground and many of the hustlers and pimps are turning to the Internet and technology to make their financial gains (New York Business Journal, 2015). They are selling these young girls and boys over the Internet like a commodity. STEP 5: Develop Adequacy in Each Relevant Discipline Cyber security in the 21st century has brought to the forefront the importance of security [online] and joint efforts between individuals and the businesses they operate. Adam Palmer, a senior expert in cybercrime and emerging crimes at UNODC (UN Office on Drugs and Crime), said, “smartphones are the new phenomenon”. The police have to play catch-up to learn this new technology in order to stay up with today’s cyber criminal. “Police are having to learn new techniques to keep up with the criminals using smartphones for sex and labor trafficking. A couple of years ago the majority of crimes were being committed on desktop computers” (Wescott, 2013). In today’s society just about every crime committed, there seems to be a phone
  • 7. Human Trafficking 6 tied to it (Wescott, 2013). The widespread growth of the Internet and mobile technologies, combined with the ever rising threat to the personal and business world has become a major concern for any and every person, organization /business that operates online. We must be more aware of the role technology is playing in human trafficking. We must strive to keep pace and educate ourselves with the ongoing and ever evolving [growing] pieces, parts, devices, programs, applications and trends in the technology sector. Mobile technology will have to take a more central role in responding to the complex problem. Bottom line is that in order for us to be able to prevent crimes like this from happening we must be more aware, educate our police, build stronger and more efficient databases using data mining. This would allow a process to review large amounts of data that would seek out consistent patterns and systematic relationships between variables. This addresses Repko’s step to developing adequacy in the relevant discipline. Repko states, “By adequacy interdisciplinarians mean knowing enough about the discipline to have a basic understanding of how it approaches, as well as illuminates and characterizes, the problem” (Repko, 2012, p.102). STEP 6: Analyze the Problem and Evaluate Each Theory “Analyzing the problem requires viewing it through the lens of each disciplinary perspective primarily in terms of its insights and theories” (Repko, 2012, p.226). Justifying an interdisciplinary approach would allow one to weave multiple disciplines in answering this complex problem. Sex trafficking affects the 1.) General Business, 2.) Organizational Leadership, and even the world of 3.) Information Technology. Statistics show that social issues affect everyone. Meaningful questions that would arise from the social issue would be:
  • 8. Human Trafficking 7 ● How can a market-driven criminal industry be controlled or curtailed to lessen widespread sex trafficking? ● Who is the most vulnerable candidate for exploitation? ● What type of policy can be implemented to control or eradicate this business? ● What charities or organizations help with this issue? ● According to labor groups, how can we track known offenders/profiteers in the human trafficking business? ● How to provide assistance to those who had been a victim? ● How can basic forensic techniques (old fashioned detective work) can be used in catching these criminals over the internet? ● Why not create a master database with known criminal businesses (illegal massage parlors, brothels, black market websites, prostitution rings, pimps, etc.)? ● How can we create a database with illegal human organ harvesting/trafficking (who is the buyer, seller, and recipient)? Looking at this from an information technology discipline (IT), you see that the answer is complex and it comes from several facets. There is much more than can be with a database than simply adding names and numbers - like gift registry. Using the Business Intelligence model you can breakdown the database to a more detailed view of human trafficking. If a supermarket can track Visa purchases between the hours of five and six, from those purchases identify customers with the last two digits being 88 on their Visa card, and from that group of people find the ones who purchased milk, then you should be able to create a database to track human trafficking (people, places and things). Another, avenue to explore from the same discipline is the security aspect of IT. Find a way to track the criminal element through the dark web. Each computer
  • 9. Human Trafficking 8 (laptop, desktop, mobile phone) has its own unique identifier that is almost like a calling card. Using this unique identifier the criminal element can be traced and brought to justice. The technology and the know-how is there, but political opposition impedes progress. Certainly one can see that Organizational Leadership of such a vast varied group would take developed skills in such a discipline. An Organizational Manager is needed to oversee such a huge task. For every background there are multiple different personalities and thoughts on how to eliminate this problem. Being able to use an interdisciplinary approach results in a team of like-minded individuals. Providing research training and development of a Domestic Minor Sex Trafficking (DMST) program is one of the necessary tools needed. An Organizational Manager can keep and direct the focus of each of the team members in order to gather such information necessary for said program. Another tool needed is providing education for the various backgrounds working on the team (local law enforcement, state and federal, legal, medical, community members, mental health professionals, and political groups). In my previous studies I have learned how to develop a plan that will take a team from early development to a completed project. It certainly comes with bumps in the road but a focused project manager can usually finish the task. An Organizational Leader [Manager] in this case is not just a boss, but a liaison between the various members. In this situation the Organizational Leader [Manager] can direct the focus for the various research and training needed to develop an overall program. Maintaining the program and even expanding the program would be necessary for attempting to eliminate sex trafficking among minors. This certainly would fall in my area of expertise in Information Technology (IT). Whether we like it or not, technology (Internet, social
  • 10. Human Trafficking 9 media, smart phone, tablets and mobile applications) is in every facet of our lives. We must use our intelligence hand-in-hand with technology to encompass the global initiative. STEP 7: Identify Conflicts Between Insights/ Theories and their Sources Amongst my three disciplines, there are no conflicts of literature. In other words, most of what I have read, studied, and cited throughout my disciplines, all come together under the umbrella of cyber-warfare regarding human trafficking. That is not to say there is not conflict from other disciplines standpoint on this issue. Various disciplines could be used to better explain human trafficking; some of them include political science, general business, psychology, sociology, religion, economics, organizational leadership, criminal justice, international law, anthropology, information technology and mathematics. Whether it be political science, psychology, sociology, or any of the aforementioned, I am using my disciplines [information technology, general business, organizational leadership] to integrate a solution to the complex problem. Looking at this from the sociology discipline one can see that sociology not only presents the numbers and facts that lie behind human trafficking, but also the demographics and raw data needed to better understand it. Sociology also helps explain the pace of social change, and will allow for human trafficking to be observed by using historical analysis (Rose, 1974). Sociology helps those in the IT sector working to combat human trafficking with the data needed to track, locate, and apprehend the criminals behind the crime. From the political science discipline, we see how the world handles human trafficking, and how there tends to be an absence of governmental intervention. Information technology and general business can help cross the political barrier. With proper leaders and officials, and
  • 11. Human Trafficking 10 governments that are more proactive like the United States, then the possibility of seeing a change becomes greater. Organizational leadership is a way to teach and guide local, state and federal officials in an effort to have them on equal footing with the traffickers using technology for their gain. Another conflict outside of my disciplines would be financial. I am approaching human sex trafficking from a digital perspective, the complex problem in the cyber-world, but there is another whole other side that some would argue is more important than the cyber element and that would be the economic factor. Since there is insufficient wealth and an abundance of poverty in certain developing countries, it is important to use economics to make sense of why this shortage exists in the countries where human trafficking is most prominent. In countries like Vietnam, many of the young to older women that are part of the human trafficking ring (sex or labor) use it as a way to earn a living. Poverty is more of a complex issue causing parents to even sell their children in order to make just enough money to survive (Penh, 2007). As six blind men described an elephant from their own perspective, each of the men was right in their own way, but to get the total picture of the elephant all six of their perspectives were needed to conclude what is an elephant. Therefore, we need a perspective from different disciplines to solve a complex problem. Having only one perspective, then we see the elephant [human trafficking] as just a fan [social issue] (as one blind man felt of the ear of the elephant); instead of seeing him as a whole [information technology as a solution for human trafficking]. STEP 8: Create Common Ground between Concepts Being able to use my skills to combat this growing problem is a way of turning something that is being used for illegal activity and using it for the global good of mankind.
  • 12. Human Trafficking 11 Information Technology is not limited to one facet, but rather multiple facets of this problem. William Newell gives us four different techniques to create common ground: redefinition, extension, organization, and transformation (Newell, 2010). In the IT world one can collaborate with the different fields of expertise. We can improve this collaboration by identifying those who prey upon the weak. This gives us an edge to combat sex trafficking using multiple platforms. The enormous volume of data that is available to predators must be harnessed [collected] in a database that is made available to the global first responder network [Interpol]. After the data is collected the first responder network (Polaris, state, federal, and global police agencies) can then sift through the information, analyze the important and immediate needs and take action. Being able to red flag certain information can notify authorities when necessary. With information technologies sex trafficking can be monitored possibly eradicated. According to a project conducted by Center on Communication Leadership & Policy at the University of Southern California “Technology-facilitated trafficking is far more diverse than initially thought, it has spread across multiple online sites and digital platforms. Mobile devices and networks play an increasingly important role that can potentially transform the trafficking landscape” (Center on Communication Leadership & Policy). STEP 9: Construct a More Comprehensive Understanding Technology is rapidly growing and technology in its most innocent form is good, but it can be used for evil. What happens when the weapon (technology) used for the elimination of crime is the same weapon used against people’s safety? Something developed (built) for good is often exploited which can result in depraved actions. The Internet has become both the hunting ground and the marketplace for human sex trafficking and has become a resource of means for
  • 13. Human Trafficking 12 traffickers [sex] with the ability to mask who they really are. We have to find ways to combat these abusers and sex traffickers of children and others that are hiding behind encrypted networks. It is key that cyber security and social media work together in finding a solution. The nature of no supervision on the Internet, allows pimps, sex traffickers to use this outlet to purchase trafficked women and children for criminal intent without the risk of prosecution. Due to the fact that using the Internet holds such a small risk of prosecution, the Internet has become the vehicle of choice amongst sex traffickers. Its audience is global through the World Wide Web. The ease and availability of the Internet seems to decriminalize the act of exploiting women and children, as they are being bought and sold like a piece of equipment. There needs to be an international recognition and establishment of some type of strict human rights law that would carry an explicit prosecution for using the Internet for sex trafficking. Currently the statistics show “forced sexual exploitation “ is a multi-billion dollar business. In the US alone, it is estimated to amount to over 27 billion dollars per year. This is the amount that is estimated by the standard fees of a prostitute, assuming each forced sex worker had 3 or 4 engagements per day. Yet, most sex trafficking goes unreported because it is a criminal activity. According to the International Labor Organization (ILO) as of 2006 a more accurate estimate was over $73 billion (USD) dollars globally. Tied into the Technology Internet commerce, brought on by sex trafficking, is the commercial sex industry. Many believe the development of high-tech software; video streaming capabilities, and advanced search results (much of what we get from Google) is credited to the sex industry. Craigslist.org was estimated at producing $80 million (USD) dollar in a year for the various posting of sexual nature (Walberg 2009).
  • 14. Human Trafficking 13 In modern times the term cybercrime is an umbrella term for heinous crimes or actions done through and over the Internet. Sex trafficking knows no boundaries and the Internet has made it easier for traffickers to hide and do business anonymously. BitCoin is the new online currency and is virtually untraceable (Bitcoin, 2009). This makes sex trafficking through the use of the Internet much more readily available. Smartphones are the new phenomenon and the police are having to play catch-up and learn this new technology in order to stay up with today’s cyber criminal. A few years ago the majority of crimes were being committed via desktop computers. However, in today’s society just about every crime committed, there is a cellphone tied to the crime. The rapid advancement of technology seems to be the logical answer for combating the criminal element that uses technology for sex trafficking. Presently there is not enough research that looks into what role technology plays in human sex trafficking. In order to address the role technology is playing in human sex trafficking more research is needed on the different aspects of human sex trafficking (Boyd, D., Casteel, H., Thakor, M., & Johnson, R., 2011). Netscape first transmitted information on the World Wide Web in 1994. This was the early years of the Internet as we know it today. Around the same time the first Internet prostitution website made its debut. One school of thought from Donna Hughes, an investigator for The Coalition Against Trafficking in Women and professor of Women’s Studies at the University of Rhode Island, implies, that the sex industry has been the basis for “the technological innovation and business model” (Hughes, 2000). The sex industry is considered the father of online credit card payments, first through email then later through the development of e-commerce software specifically built for secure transactions. As early as 1995, the sex industry was offering live video streaming. Along with the offer of live video streaming, the
  • 15. Human Trafficking 14 search engine was developed and promoted by those profiteers in the sex industry. Another major impact was the development of the early version of database management (Hughes, 2000). Technology is often used to advertise and coordinate the sale of victims. Technology changes the advertising/selling process from the street corner to the digital domain, therefore changing the risks that are involved in this series of actions. The risk [physical and legal] that many of the victims will face online are unlike anything else they have seen before. New issues like child pornography and money laundering and money exchange emerge and create new challenges for law enforcement. Sharing information amongst the anti-trafficking players is time sensitive and must be shared as soon as possible in order to help in the preventive process. Cyber security in the 21st century has brought to the forefront the importance of security [online] and joint efforts between individuals and the businesses they operate. If you can fight fire with fire, then you can fight sex trafficking through the Internet with the Internet. How safe and secure are we on the Internet or on your smartphone/tablet? The widespread growth of the internet combined with the ever-rising threat to the personal and business worlds has become a major concern for any and every person, organization /business that operates online. Kostopoulos suggests some strong guidelines for measuring and assessing vulnerabilities the end-user might have while online. Kostopoulos lays out a plan on how to avoid some of these vulnerabilities. He also addresses the role of the U.S. Department of Homeland Security in cyber preparedness (Kostopoulos, 2016). To provide a better understanding of human sex trafficking, one must see the end result of the interdisciplinary research that I have previously stated. By blending my disciplines of Information Technology, Organizational Leadership and General Business I believe I made a
  • 16. Human Trafficking 15 clear way to find a solution to human trafficking. Typically one might not have selected these three disciplines for this problem, but I feel they are related to the goal of eradicating human trafficking. STEP 10: Reflect on, Test, and Communicate the Understanding Researchers at USC (University of Southern California) Annenberg Center on Communication Leadership & Policy released a report showing that human traffickers have adapted to the 21st century technological landscape relatively fast. Although the quick spread of the digital technologies such as the Internet, social networking sites, and mobile phones provide some level of benefit to modern society, so have opportunities to exploit these new technologies come about as well (Latonero 2012). Technology is growing at a rapid rate, with new applications, software and hardware being developed; it opens the door, on a global scale, for the sharing of information and communication. The only problem is this new technology also allows criminals to gather and become more structured globally as well as use it to victimize unsuspecting women and children, all the while hiding behind a computer, which enables this behavior. Technology knows no boundaries and when it comes to the flow of information there are no borders. With new technology comes greater accessibility to all, even sex traffickers. No longer is this limited to just a local level, but it is global on the World Wide Web. This same technology that allows these sex traffickers to reach out to victimize women and children, also allows privacy and anonymity for their despicable crimes. Typically, the criminal element taking part in this activity is not in the place where their behavior or actions take place. Internet sex crimes are no longer bound by location, as the Internet allows accessibility anywhere (Kunzie, 2010). However, just like a forest firefighter fights fire with fire, we too can use technology that is being used for trafficking to combat it.
  • 17. Human Trafficking 16 In their report they showed that mobile devices and various types of networks have become a major focus point to the role of sex trafficking of minors in the United States. Although, the social networking sites and classifieds (craigslist, online dating, etc.) are still ripe for exploitation, the finding from their research indicates that technology-facilitated trafficking is even broader and more flexible than thought. Human [sex] traffickers and criminal enterprises are taking advantage of technology (which is easily accessible and obtainable) to reach broader markets and to do illegal business quicker and more efficiently across greater divides (Latonero, M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K., 2012). CONCLUSION AND FUTURE STUDY We started with the focus question, “Is human sex trafficking a social issue that affects everyone or just those involved in the activity? Could a discipline in Information Technology help in reducing, curtailing, or solving the problem?” Looking into the future we have to strive to play catch-up both financially and technologically. A comprehensive solution to stemming online sex trafficking is to form an international agreement that explicitly prohibits such activity. The agreement could specify it is the type of conduct conducted over the Internet–and not inhibiting the freedom of speech conducted there–that constitutes criminal human trafficking violations. Members of the international community work together on adopting Internet-specific anti-trafficking provisions simply because they have already expressed their commitment to prohibiting trafficking activity under the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (United Nations Office on Drugs and Crime, 2000).
  • 18. Human Trafficking 17 Boyd, D., Casteel, H., Thakor, M., & Johnson, R. (n.d.). Human Trafficking and Technology. A framework for understanding the role of technology in the commercial sexual exploitation of children in the U.S. - Together Against Trafficking in Human Beings - European Commission. (Discipline - Information Technology, Phenomenon: Role of technology in sex trafficking, Research Methods: qualitative & quantitative) Presently there is little research that looks into the what role technology plays in human sex trafficking. Policies, procedures and interventions based speculation and forming an opinion or making estimations or assumptions about this from little known facts or various incidents. In order to address the role technology is playing in human sex trafficking more research is needed on the different aspects of human sex trafficking. Technology is often used to advertise and coordinate the sale of victims. Technology changes the advertising/selling process from the street corner to the digital domain, therefore changing the risks that are involved in this series of actions. The risk [physical and legal] that many of the victims will face online are unlike anything else they have seen before. New issues like child pornography and money laundering and money exchange emerge and create new challenges for law enforcement. Sharing information amongst the anti-trafficking players is time sensitive and must shared as soon as possible in order to help in the preventive process. “Cyberspace and Cybersecurity” (Kostopoulos, 2016): Kostopoulos, G. K. Kostopoulos, G. K. (2013). Cyberspace and Cybersecurity. Boca Raton, FL: Taylor & Francis Group. (Discipline: Information Technology & Business, Phenomenon: How safe are we in the cyberworld?, Research Method: qualitative & quantitative) Cyber security in the 21st century has brought to the forefront the importance of security [online] and joint efforts between individuals and the businesses they operate. If you can fight fire with fire, then you can fight sex trafficking through the internet with the internet. How safe and secure are we on the internet or on your smartphone/tablet? The widespread growth of the internet combined with the ever rising threat to the personal and business worlds has become a major concern for any and every person, organization /business that operates online. Kostopoulos lays out some very strong guidelines for measuring and assessing vulnerabilities the end-user might have while online. Kostopoulos lays out a plan on how to avoid some of these vulnerabilities. He also addresses the role of the U.S. Department of Homeland Security in cyber preparedness.
  • 19. Human Trafficking 18 Dixon, H. B., Jr. (2013). Human Trafficking and the Internet* (*and Other Technologies, too). The Judges' Journal, 52(1). (Discipline: Judicial Law & Information Technology, Phenomenon: Strategies to combat human trafficking, Research Method: qualitative & quantitative) The use of the Internet is widespread and accessible to almost everyone in almost every location in the world. Human trafficking is a very large problem that has certainly made its debut on the Internet. Whether it is a public social outlet such as Facebook, or a more private hidden chat room, both are used to entice some of the millions of human trafficking victims. It may appear as an “innocent “ chat with an unknown, a posting of a job recruitment, or even trying to meet that special someone on a matchmaking site, but as some victims will come to realize, it was a ruse. There lure of something better is always out there, even on the Internet. The contrasting side of the lure on the Internet is being able to combat human trafficking through the use of the Internet. Posting ads warning people of such tactics helps to curb this activity. The Internet is even being used by certain anti-trafficking groups that aid the law enforcement and investigators to interrupt such activity on the Internet. Furthermore, the advanced technologies can be used to even track the consumers of such sex trafficking. Educating the public will produce a major effort to curb/stop sex trafficking through use of the Internet. Using this technology makes good common sense. After all, if the criminal makes use of what is available, then it should be used by law enforcement, investigators and anti-trafficking groups. Getting private industry(big money) and the private individuals involved will help further the effort of using the Internet to end sex trafficking. Farrell, A. & Fahy, S. (2009). The problem of human trafficking in the U.S.: Public frames and policy responses. Journal of Criminal Justice, 37, 517-526.(Discipline: Criminal Justice, Research Method: qualitative and quantitative, Phenomenon: combating sex trafficking through the use of the Internet) Human trafficking encompasses a large framework. It is a global issue that affects everyone from the poor to the elite rich. Specifically, human trafficking victims are mainly women and children. Because of the attention placed on this issue, the U.S. stepped up and passed The Victims of Trafficking and Violence Protection Act (TVPA) as early as the year 2000. The authors of this article strived to present the information as a human rights issue. As early as the Clinton administration, people began to understand the seriousness and the criminal aspect of this problem. Since prostitution was now
  • 20. Human Trafficking 19 recognized as an official labor, prostitution fell under labor trafficking. Now the focus was split between sex (forced sex) trafficking and labor (working) trafficking. The media played a role in setting the tone to read “trafficking “ meant persons from outside the U.S. coming to our country to work or be held against their will to perform sex. This implied “outsiders” were the issue and not the trafficking; when in fact, persons from the U.S. were being trafficked on this country’s soil as well as outside our borders. Then came the outcry for funding to combat the problem. However, as with anything political or profitable, people manipulated the data to gain power or money for their own. Latonero, M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K. (2012).The rise of mobile and the diffusion of technology-facilitated trafficking. Los Angeles, CA: University of Southern California, Center on Communication Leadership & Policy. (Disciplines: Business, Communications, Information Technology, Political Science, Journalism, Law, Phenomenon: Using technology to combat human trafficking, Research Method: qualitative & quantitative) Researchers at USC (University of Southern California) Annenberg Center on Communication Leadership & Policy released a report showing that human traffickers have adapted to the 21st century technological landscape relatively fast. Although the quick spread of the digital technologies such as the Internet, social networking sites, and mobile phones provide some level of benefit to modern society, so have opportunities to exploit these new technologies come about as well. However, just like a forest firefighter fights fire with fire, we too can use technology that is being used for trafficking to combat it. In their report they showed that mobile devices and various types of networks have become a major focus point to the role of sex trafficking of minors in the United States. Although, the social networking sites and classifieds (craigslist, online dating, etc.) are still ripe for exploitation, the findings from their research indicates that technology- facilitated trafficking is even broader and more flexible than thought. Human [sex] traffickers and criminal enterprises are taking advantage of technology (which is easily accessible and obtainable) to reach broader markets and to do illegal business quicker and more efficiently across greater divides.
  • 21. Human Trafficking 20 Walker-Rodriguez, A., & Hill, R. (2011, March). Human Sex Trafficking. (Disciplines: Organizational Leadership, Law, Information Technology, Phenomenon: Human sex trafficking a problem at home as well as abroad, Research Method: qualitative & quantitative) Human sex trafficking is a form of modern day slavery and it is a very lucrative business as well. It is considered to be the third-largest criminal enterprise in the world and one of the fastest-growing businesses of organized crime. The business itself has become more organized and violent. According to Walker-Rodriguez and Hill many of the victims (women and young girls) that are kidnapped, are sold to other traffickers, who in turn lock them (the victims) up in brothels for long periods of time, they drug them, rape them repeatedly and use various scare tactics to terrorize them. They [the traffickers] can sometimes create a bond with their younger victims by promising marriage or even a lifestyle the child did not have in a previous life or with their family. Often the traffickers use words such as “love” or “need” to coerce the victim into doing what they want and that any sex acts they are required to do is for their future. Where there is a positive male role model absent in the victim’s family life it leaves opportunity for the predator to take advantage. ICE (U.S. Immigration Customs Enforcement) along with INTERPOL or ICPO (The International Criminal Police Organization) forcefully pursues their targets in the global criminal enterprise of human sex trafficking, which includes people (anyone from a simple street thug to a wealthy oil tycoon or politician), currency, and the various items [materials - computers, servers (local and remote)] that support the human sex trafficking networks. Creating a database with all relevant information would enable the FBI, ICE or INTERPOL to have easy access to a card catalog with pertinent information regarding victims, predators, popular networks, and other players in the game.
  • 22. Human Trafficking 21 References Armerding, T. (2015, June 23). Cybercrime: Much more organized. Retrieved February 26, 2016, from http://goo.gl/TvKRA0 Bitcoin - Open source P2P money. (2009). Retrieved July 08, 2016, from https://bitcoin.org/en/ Boyd, D., Casteel, H., Thakor, M., & Johnson, R. (n.d.). Human Trafficking and Technology. A framework for understanding the role of technology in the commercial sexual exploitation of children in the U.S. - European Commission. Retrieved July 12, 2016, from https://ec.europa.eu/anti-trafficking/publications/human-trafficking-and-technology- framework-understanding-role-technology-commercial_en Current Federal Laws. (2015). Retrieved July 09, 2016, from http://polarisproject.org/current- federal-laws Dixon, H. B., Jr. (2013). Human Trafficking and the Internet* (*and Other Technologies, too). The Judges' Journal, 52(1). Facebook partners with N.Y. attorney general on plan to fight human trafficking. (2015). New York Business Journal. Retrieved February 25, 2016, from http://goo.gl/tFYY9B Farrell, A., & Fahy, S. (2009). The problem of human trafficking in the U.S.: Public frames and policy responses. Journal of Criminal Justice, 37(6), 617-626. doi:10.1016/j.jcrimjus.2009.09.010 Forrest, S., Hofmey, S., & InEdwards, R. (2013, June 24). The Complex Science of Cyber Defense. Retrieved February 29, 2016, from https://hbr.org/2013/06/embrace-the- complexity-of-cybe
  • 23. Human Trafficking 22 Fuchs, E. (2014, August 11). This Is What Modern-Day Sex Slavery In America Looks Like. Retrieved February 28, 2016, from http://goo.gl/2dBp35 Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses. New York, NY: Routledge. Hughes, D. M. (2000, February). The Internet and sex industries: Partners in global sexual exploitation. IEEE Technology and Society Magazine, 19(1), 35-42. Huston, W. T. (2016, February 29). Wounded Military Vets Joining Law Enforcement in Hunt for Online Child Predators - Breitbart. Retrieved February 29, 2016, from http://www.breitbart.com/big-government/2016/02/29/wounded-military-vets-joining- law-enforcement-in-hunt-for-online-child-predators/?utm_source=facebook Kostopoulos, G. K. (2013). Cyberspace and Cybersecurity. Auerbach Publications. Latonero, M. (2011, September). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds [Scholarly project]. University of Southern California, Center on Communication Leadership & Policy Retrieved July 29, 2016, from https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf Latonero, M., Musto, J., Boyd, Z., Boyle, E., Bissell, A., Kim, J., & Gibson, K. (2012).The rise of mobile and the diffusion of technology-facilitated trafficking. Los Angeles, CA: University of Southern California, Center on Communication Leadership & Policy from https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf
  • 24. Human Trafficking 23 Mendel, J., & Sharapov, K. (2016). Human Trafficking and Online Networks: Policy, Analysis, and Ignorance. Antipode. National Human Trafficking Resource Center | Texas. (2016, June 30). Retrieved July 09, 2016, from https://traffickingresourcecenter.org/state/texas Newell, W. (2010). Educating for a Complex World: Integrative Learning and Interdisciplinary Studies. Retrieved August 09, 2016, from https://www.aacu.org/publications- research/periodicals/educating-complex-world-integrative-learning-and-interdisciplinary Pauw, E. D., Ponsaers, P., Vijver, K. V., Bruggerman, W., & Deelman, P. (2011).Technological- led policing. Antwerp: Maklu. Penh, P. (2007). Innocence for sale. Economist. 384, 53-54. Repko, A. (2012). Interdisciplinary research: Process and theory. Los Angeles, CA. Sage. Rose, J. (1974). Introduction to sociology. Chicago: Rand McNally. Walberg, M. (2009, March 9). Sheriff sues Craigslist as 'largest source' of prostitution. Retrieved July 12, 2016, from http://www.chicagobreakingnews.com/2009/03/sheriffs-lawsuit-says-craiglist-largest- source-of-prostitution.html United Nations Office on Drugs and Crime. (2000, November 15). Retrieved July 27, 2016, from https://www.unodc.org/unodc/treaties/CTOC/ Yu, S. (2015). Human Trafficking and the Internet. In M. J. Palmiotto (Ed.),Combating Human Trafficking: A Multidisciplinary Approach (pp. 1-309). Boca Raton, FL: Taylor & Francis Group.
  • 25. Human Trafficking 24 Zagorianou, A. (2015, July 27). Technology and Human Trafficking. Retrieved July 24, 2016, from http://www.uhrsn.org/2015/07/technology-and-human-trafficking/