SlideShare a Scribd company logo
1 of 12
@TRACE_EU http://trace-project.eu
▪ Facilitation
▪ recruitment
▪ Exploitation
▪ Prevention
▪ To combat human trafficking
▪ The role emerging technologies
1. Identify & map different types of technologies being used to faciliate,
prevent and combat
1. CATEGORIES:
1. WEB –BASED (internet, applications & software)
2. HARDWARE
2. Assess this use
3. Identify future trends in technology and human trafficking
4. Develop recommendations for theTRACE target audience
1. Policy makers
2. Law enforcement agencies
3. Civil society organisations
▪ Technology facilitated trafficking: “[…]the social
and technical ecosystem wherein individuals use
information and communication technologies to
engage in human trafficking and related
behaviors (Latonero et al)
▪ recruitment
▪ exploitation
Web based (internet, applications &
software)
• Social networking sites
• Advertising and classifieds
• Applications (Instagram, Skype etc.)
• Web sites, including DarkWeb
• Online dating sites
• Online forums
• Peer to peer networks
Hardware
• Cameras, video and image and
other recording devices
• Telephone, mobile & landline
• Desktop computers, laptops &
tablets
• Scanners
• Television programming services
 Example: facilitating – recruitment – online dating
websites
x European national, accepts y’s marriage
proposal after a two-year relationship using
the online dating site eHarmony. Once in the
UK & residing at y’s home, x & daughter were
forced to work long hours without pay,
verbally abused and held captive inside the
home. (2010)
Web-based (internet, applications and
software)
• Case management tools
• Facial reconstruction software
• Databases
• e-Learning training platforms
• Case management tools
• Geographic information systems
• Financial tracking
• I2 Software
• Supply chain management tool kits
Hardware
•CCTV
• Routers and backup devices
 Example: Combat – UNODC case law database
• Publicly available repository of
summaries and full court cases
to support successful
convictions
• 30 April 2014, more than 1000
cases from 83 countries.
• People can contribute new
cases by directly contacting
the UNODC.
Web-based (internet, applications &
software)
• Applications
• Crowdfunding
• E-learning training programmes & platforms
• Websites (generic & other)
• Financial tracking
• Online petitions
• Social networking sites
Hardware
• Television
• Telephone
 Example: Preventing – social media – awareness raising
Big Data
Digital
Currencies
RPAS
Geographical
mapping
Tailored
search engines
TRACE Briefing paper TRACE report TRACE Handbook
Further information is available on theTRACE website.
anna.donovan@trilateralresearch.com
@TRACE_EU http://trace-project.eu

More Related Content

What's hot

Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...lorenzo cantoni
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionWaldir Moreira
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorshipmerlyna
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...lorenzo cantoni
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationDeoky5799
 
Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
 
I’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” ThemselvesI’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” Themselvesshontaviaj
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Yamina Guidoum Urbact Final
Yamina Guidoum Urbact FinalYamina Guidoum Urbact Final
Yamina Guidoum Urbact Finalpeterramsden
 

What's hot (17)

Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...
 
Project1
Project1Project1
Project1
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental Communication
 
Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017
 
Assignment 8
Assignment 8Assignment 8
Assignment 8
 
Publish homework
Publish homeworkPublish homework
Publish homework
 
I’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” ThemselvesI’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” Themselves
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Yamina Guidoum Urbact Final
Yamina Guidoum Urbact FinalYamina Guidoum Urbact Final
Yamina Guidoum Urbact Final
 
Silviu Popa Romania
Silviu Popa RomaniaSilviu Popa Romania
Silviu Popa Romania
 

Viewers also liked

Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015TRACE Project
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceTRACE Project
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children TRACE Project
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking TRACE Project
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies TRACE Project
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsTRACE Project
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopTRACE Project
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking TRACE Project
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickersTRACE Project
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODCTRACE Project
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers TRACE Project
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...TRACE Project
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human traffickingTRACE Project
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalTRACE Project
 

Viewers also liked (20)

Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-trace
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beings
 
Muraszkiewicz
MuraszkiewiczMuraszkiewicz
Muraszkiewicz
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus Workshop
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickers
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODC
 
Kidane Selam
Kidane SelamKidane Selam
Kidane Selam
 
key note
key notekey note
key note
 
IOM Presentation
IOM Presentation IOM Presentation
IOM Presentation
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...
 
FRA presentation
FRA presentation FRA presentation
FRA presentation
 
Rijken Conny
Rijken ConnyRijken Conny
Rijken Conny
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human trafficking
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removal
 

Similar to The role of technology in human trafficking

Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submittedKate Pangbourne
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Fatemeh Ahmadi
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft Eesti
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 

Similar to The role of technology in human trafficking (20)

Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
INTERNET 2.pptx
INTERNET 2.pptxINTERNET 2.pptx
INTERNET 2.pptx
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Internet Law
Internet LawInternet Law
Internet Law
 
Internet
InternetInternet
Internet
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submitted
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the Internet
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
MIS Lesson1
MIS Lesson1MIS Lesson1
MIS Lesson1
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfdigitalnikesh24
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Divorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdfDivorce Procedure in India (Info) (1).pdf
Divorce Procedure in India (Info) (1).pdf
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 

The role of technology in human trafficking

  • 2. ▪ Facilitation ▪ recruitment ▪ Exploitation ▪ Prevention ▪ To combat human trafficking ▪ The role emerging technologies
  • 3. 1. Identify & map different types of technologies being used to faciliate, prevent and combat 1. CATEGORIES: 1. WEB –BASED (internet, applications & software) 2. HARDWARE 2. Assess this use 3. Identify future trends in technology and human trafficking 4. Develop recommendations for theTRACE target audience 1. Policy makers 2. Law enforcement agencies 3. Civil society organisations
  • 4. ▪ Technology facilitated trafficking: “[…]the social and technical ecosystem wherein individuals use information and communication technologies to engage in human trafficking and related behaviors (Latonero et al) ▪ recruitment ▪ exploitation
  • 5. Web based (internet, applications & software) • Social networking sites • Advertising and classifieds • Applications (Instagram, Skype etc.) • Web sites, including DarkWeb • Online dating sites • Online forums • Peer to peer networks Hardware • Cameras, video and image and other recording devices • Telephone, mobile & landline • Desktop computers, laptops & tablets • Scanners • Television programming services
  • 6.  Example: facilitating – recruitment – online dating websites x European national, accepts y’s marriage proposal after a two-year relationship using the online dating site eHarmony. Once in the UK & residing at y’s home, x & daughter were forced to work long hours without pay, verbally abused and held captive inside the home. (2010)
  • 7. Web-based (internet, applications and software) • Case management tools • Facial reconstruction software • Databases • e-Learning training platforms • Case management tools • Geographic information systems • Financial tracking • I2 Software • Supply chain management tool kits Hardware •CCTV • Routers and backup devices
  • 8.  Example: Combat – UNODC case law database • Publicly available repository of summaries and full court cases to support successful convictions • 30 April 2014, more than 1000 cases from 83 countries. • People can contribute new cases by directly contacting the UNODC.
  • 9. Web-based (internet, applications & software) • Applications • Crowdfunding • E-learning training programmes & platforms • Websites (generic & other) • Financial tracking • Online petitions • Social networking sites Hardware • Television • Telephone
  • 10.  Example: Preventing – social media – awareness raising
  • 12. TRACE Briefing paper TRACE report TRACE Handbook Further information is available on theTRACE website. anna.donovan@trilateralresearch.com @TRACE_EU http://trace-project.eu