1,848 research outputs found
The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking
In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward
Victim or whore: The similarities and differences between victim’s experiences of domestic violence and sex trafficking
This research review addresses the similarities and differences between domestic violence and sex
trafficking victimization. While there is evidence that domestic violence and sex trafficking often cooccur,
there is a large disparity in the understanding and interventions utilized by law enforcement
as well as the services available for victims of each crime despite the considerable overlap of
victimization. This article explores current research regarding domestic violence and sex trafficking
with a focus towards identifying areas of overlap and areas distinct to sex trafficking
FOSTA: A Hostile Law with a Human Cost
The Allow States and Victims to Fight Online Sex Trafficking Act of 2017 (“FOSTA”) rescinded legal immunity for websites that intentionally host user-generated advertisements for sex trafficking. However, Congress’s mechanism of choice to protect sex-trafficking victims has faced critique and backlash from advocates for those involved in commercial sex, who argue that FOSTA’s broad legislative language does far more to harm sex workers—a group distinct from sex-trafficking victims—than it does to end sex trafficking, chilling significant protected speech in the process. These critics posit that FOSTA’s results toward eradicating sex trafficking have been negligible and that its chief outcome has been to eliminate digital screening and security protections that consensual sex workers rely upon, thereby forcing the industry back into a far more dangerous street-based model. By eliminating protections for consensual sex workers, however, FOSTA endangers trafficking victims as well, and without online advertisements serving as a “smoking gun,” law enforcement has struggled to find trafficked individuals. This Note explores FOSTA’s effects on consensual sex workers in the United States from two angles. First, it analyzes how FOSTA’s chill on speech that advocates for sex workers’ health, safety, and right to work in their industry contributes to the law’s unconstitutional overbreadth. Second, it compares FOSTA’s practical effects that are in line with its stated goals with the harmful consequences the law has inflicted upon the sex work community and beyond. While this Note proposes amended language to improve FOSTA, it ultimately advocates for FOSTA’s repeal and suggests that if sex work were decriminalized and more pragmatic legislation were implemented to better inculpate traffickers, mitigate harm to trafficking survivors, and reduce future victimization, FOSTA’s stated goals could be realized
Case study: Provider for program to prevent the revictimization of persons trafficked for sex
This case study seeks to identify behavior, skills, and attitudes of a professional providing an effective reintegration program for persons trafficked for sex. New demands on medical and social services were created over the past two decades by legislative changes. Initial research focuses on rescue and unmet primary needs. The service program selected for this study has stepped beyond awareness and rescue efforts to the rehabilitation and prevention of revictimization of trafficked persons. A literature review covers the history of sex trafficking in the United States; the recovery environment; materials, trainings and programs available for professionals seeking knowledge to serve this population; special conditions created by victim characteristics that influence services needed; service provider’s perceptual and motivational influences; and vicarious trauma and resilience as described in therapeutic literature. Information collected for the review is used to create open-ended questions for a semi-structured interview. The case study is analyzed for descriptive data to guide and support the development of future programs and providers needed to meet demand
Sex Trafficking Prevention Training for Higher Education Students
Higher education students are vulnerable to being sex trafficked (Campus Law Enforcement-DHS, n.d.). As a means of prevention, an online training was developed for higher education students. The purpose of this training was to provide awareness and education about sex trafficking and promote safety in terms of relationships, jobs, and the internet. The intention of this study was to research the effectiveness of this training in building an understanding of sex trafficking. A convergent mixed methods study was conducted using pre and post surveys to assess awareness around sex trafficking in higher education. The training was found to be effective in educating participants about “discerning legitimate and safe websites and apps.” In addition, participants’ questions and concerns about sex trafficking are included for future course development and awareness training. Ideas for future steps to help prevent sex trafficking are also included. This dissertation is available in open access at AURA (https://aura.antioch.edu) and OhioLINK ETD Center (https:// etd.ohiolink.edu)
Understanding the Organization, Operation, and Victimization Process of Labor Trafficking in the United States
This study examines the organization, operation, and victimization process of labor trafficking across multiple industries in the United States. It examines labor trafficking victim abuse and exploitation along a continuum, from victims' recruitment for work in the United States; through their migration experiences (if any), employment victimization experiences, and efforts to seek help; to their ultimate escape and receipt of services. Data for this study came from a sample of 122 closed labor trafficking victim service records from service providers in four US cities. In addition, interviews were conducted with labor trafficking survivors, local and federal law enforcement officials, legal advocates, and service providers in each site to better understand the labor trafficking victimization experience, the networks involved in labor trafficking and the escape and removal process, and the barriers to investigation and prosecution of labor trafficking cases
An Education Implementation Project in an Emergency Department to Increase Awareness and Referral for Trafficked Person Encounters
Human trafficking impacts sufferers on a global scale with serious and lifelong health issues associated with the illegal practice. Interventions for these victims’ extensive health issues must ignite healthcare staff education and expert clinical interventions. Due to these health problems, healthcare staff function on the front lines to identify and help trafficked persons. This study focused on the scope of trafficking and health staff awareness, identification strategies to help recognize trafficked persons, techniques for interviewing, best practice strategies for intervention and referral, and new coding guidelines. During the intervention, health staff received a human trafficking pre-education questionnaire, a research supported education training intervention, and a post-intervention questionnaire. Data on post-education intervention referrals was also completed to discern impact of education on trafficking recognition and resource support. Qualities examined for ease and efficacy included the education intervention strategy, utilization of resource support, reported issues with trafficking recognition, and increase or decrease of staff confidence within interactions. Questionnaire results demonstrated increases for questions one through four following the educational intervention. Post-intervention data showed some recognition of potential human trafficking persons particularly related to mental health. Project results were consistent with other research recommendations. Continued human trafficking encounters in health systems necessitates continued research into best education, interviewing, intervention, and post-care methods
The Cyberworld and Human Trafficking: A Double-Edged Sword
This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source intelligence, biometric facial recognition, and hashing assist in the fight. And finally, an overview of Operation Innocent Images, the Endangered Child Alert Program, and Operation Peer Pressure, is provided to highlight steps taken to stop the victimization of innocent human beings
Recommended from our members
Study on the gender dimension of trafficking in human beings
The purpose of this study is to contribute to the identification and understanding of what it means to be ‘taking into account the gender perspective, to strengthen the prevention of this crime and protection of the victims there-of’, as required in Article 1 of European Union (EU) Directive 2011/36/EU on Preventing and Combating Trafficking in Human Beings and Protecting its Victims in the context of the EU Strategy (COM(2012) 286 final) Towards the Eradication of Trafficking in Human Beings.
The study contributes to Priority E Action 2 of the Strategy, which states that ‘the Commission will develop knowledge on the gender dimensions of human trafficking, including the gender consequences of the various forms of trafficking and potential differences in the vulnerability of men and women to victimisation and its impact on them.’ Its specific objectives and tasks are to address: the ‘gender dimension of vulnerability, recruitment, and victimisation’; ‘gender issues related to traffickers and to those creating demand’; and ‘an examination of law and policy responses on trafficking in human beings from a gender perspective’.
The study addresses the five priorities of the EU Strategy: identifying, protecting, and assisting victims of traf-ficking; stepping up the prevention of trafficking in human beings; better law enforcement; enhanced coordination and cooperation among key actors and policy coherence; and increased knowledge of an effective response to emerging concerns.
This study, according to its terms of reference, aims to look specifically at the gender dimension of trafficking for the purpose of sexual exploitation. This follows evidence from statistical data from Eurostat, as well as da-ta from The European Police Office (Europol) and the United Nations Office on Drugs and Crime (UNODC), accord-ing to which the most reported form of exploitation of victims is that of sexual exploitation and its strong gen-der dimension (96 % women and girls). It further addresses recommendations addressed in the Resolution of the European Parliament of 26 February 2014 on sexual exploitation and prostitution and its impact on gender equality (2013/2103(INI)) urging the European Commission to evaluate the impact that the European legal frame-work designed to eliminate trafficking for sexual exploitation has had to date and to undertake further research on patterns of prostitution, on human trafficking for the purpose of sexual exploitation and on the increased lev-el of sex tourism in the EU, with particular reference to minors, and to promote the exchange of best practices among the Member States.
The study identifies and draws on EU law and policy competence in gender equality in its identification of the gen-der dimensions of trafficking. The gender dimensions are clustered into five issues: gender specificity and equal treatment; gender expertise, gender balance in decision-making and gender mainstreaming; the relationship be-tween prostitution and trafficking; gendered policy fields and strategic priorities; gendered systems and the the-ory of prevention
Gap analysis identifying the current state of information security within organizations working with victims of violence
Around the world, domestic violence, human trafficking, and stalking affect millions of lives every day. According to a report published by the Center for Disease Control and Prevention in January 2015, every minute 20 people fall victim to physical violence perpetrated by an intimate partner in the United States (US). As offenders use advancements in technology to perpetuate abuse and isolate victims, the scale of services provided by crisis organizations must rise to meet the demand while keeping a close eye on potential digital security vulnerabilities. It has been reported in general media and research that phishing emails, social engineering attacks, denial of service attacks, and other data breaches are gaining popularity and affecting business environments of all sizes and in any sector, including organizations dedicated to working with victims of violence.
To address this, an exploratory research study to identify the current state of information security within the US-based non-profit crisis organizations was conducted. This study identified the gaps between a theoretical maximum level of information security and the observed level of information security in organizations working with victims of violence inspired by a recognized and respected framework, National Institute of Standards and Technology (NIST) Cybersecurity Framework. This research establishes the critical foundation for researchers, security professionals, technology companies, and crisis organizations to develop assessment tools, technology solutions, training curriculum, awareness programs, and other strategic initiatives specific to crisis organizations and other non-profit organizations to aid them in improving information security for themselves and the victims they serve
- …