1,848 research outputs found

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    Victim or whore: The similarities and differences between victim’s experiences of domestic violence and sex trafficking

    Get PDF
    This research review addresses the similarities and differences between domestic violence and sex trafficking victimization. While there is evidence that domestic violence and sex trafficking often cooccur, there is a large disparity in the understanding and interventions utilized by law enforcement as well as the services available for victims of each crime despite the considerable overlap of victimization. This article explores current research regarding domestic violence and sex trafficking with a focus towards identifying areas of overlap and areas distinct to sex trafficking

    FOSTA: A Hostile Law with a Human Cost

    Get PDF
    The Allow States and Victims to Fight Online Sex Trafficking Act of 2017 (“FOSTA”) rescinded legal immunity for websites that intentionally host user-generated advertisements for sex trafficking. However, Congress’s mechanism of choice to protect sex-trafficking victims has faced critique and backlash from advocates for those involved in commercial sex, who argue that FOSTA’s broad legislative language does far more to harm sex workers—a group distinct from sex-trafficking victims—than it does to end sex trafficking, chilling significant protected speech in the process. These critics posit that FOSTA’s results toward eradicating sex trafficking have been negligible and that its chief outcome has been to eliminate digital screening and security protections that consensual sex workers rely upon, thereby forcing the industry back into a far more dangerous street-based model. By eliminating protections for consensual sex workers, however, FOSTA endangers trafficking victims as well, and without online advertisements serving as a “smoking gun,” law enforcement has struggled to find trafficked individuals. This Note explores FOSTA’s effects on consensual sex workers in the United States from two angles. First, it analyzes how FOSTA’s chill on speech that advocates for sex workers’ health, safety, and right to work in their industry contributes to the law’s unconstitutional overbreadth. Second, it compares FOSTA’s practical effects that are in line with its stated goals with the harmful consequences the law has inflicted upon the sex work community and beyond. While this Note proposes amended language to improve FOSTA, it ultimately advocates for FOSTA’s repeal and suggests that if sex work were decriminalized and more pragmatic legislation were implemented to better inculpate traffickers, mitigate harm to trafficking survivors, and reduce future victimization, FOSTA’s stated goals could be realized

    Case study: Provider for program to prevent the revictimization of persons trafficked for sex

    Get PDF
    This case study seeks to identify behavior, skills, and attitudes of a professional providing an effective reintegration program for persons trafficked for sex. New demands on medical and social services were created over the past two decades by legislative changes. Initial research focuses on rescue and unmet primary needs. The service program selected for this study has stepped beyond awareness and rescue efforts to the rehabilitation and prevention of revictimization of trafficked persons. A literature review covers the history of sex trafficking in the United States; the recovery environment; materials, trainings and programs available for professionals seeking knowledge to serve this population; special conditions created by victim characteristics that influence services needed; service provider’s perceptual and motivational influences; and vicarious trauma and resilience as described in therapeutic literature. Information collected for the review is used to create open-ended questions for a semi-structured interview. The case study is analyzed for descriptive data to guide and support the development of future programs and providers needed to meet demand

    Sex Trafficking Prevention Training for Higher Education Students

    Get PDF
    Higher education students are vulnerable to being sex trafficked (Campus Law Enforcement-DHS, n.d.). As a means of prevention, an online training was developed for higher education students. The purpose of this training was to provide awareness and education about sex trafficking and promote safety in terms of relationships, jobs, and the internet. The intention of this study was to research the effectiveness of this training in building an understanding of sex trafficking. A convergent mixed methods study was conducted using pre and post surveys to assess awareness around sex trafficking in higher education. The training was found to be effective in educating participants about “discerning legitimate and safe websites and apps.” In addition, participants’ questions and concerns about sex trafficking are included for future course development and awareness training. Ideas for future steps to help prevent sex trafficking are also included. This dissertation is available in open access at AURA (https://aura.antioch.edu) and OhioLINK ETD Center (https:// etd.ohiolink.edu)

    Understanding the Organization, Operation, and Victimization Process of Labor Trafficking in the United States

    Get PDF
    This study examines the organization, operation, and victimization process of labor trafficking across multiple industries in the United States. It examines labor trafficking victim abuse and exploitation along a continuum, from victims' recruitment for work in the United States; through their migration experiences (if any), employment victimization experiences, and efforts to seek help; to their ultimate escape and receipt of services. Data for this study came from a sample of 122 closed labor trafficking victim service records from service providers in four US cities. In addition, interviews were conducted with labor trafficking survivors, local and federal law enforcement officials, legal advocates, and service providers in each site to better understand the labor trafficking victimization experience, the networks involved in labor trafficking and the escape and removal process, and the barriers to investigation and prosecution of labor trafficking cases

    An Education Implementation Project in an Emergency Department to Increase Awareness and Referral for Trafficked Person Encounters

    Get PDF
    Human trafficking impacts sufferers on a global scale with serious and lifelong health issues associated with the illegal practice. Interventions for these victims’ extensive health issues must ignite healthcare staff education and expert clinical interventions. Due to these health problems, healthcare staff function on the front lines to identify and help trafficked persons. This study focused on the scope of trafficking and health staff awareness, identification strategies to help recognize trafficked persons, techniques for interviewing, best practice strategies for intervention and referral, and new coding guidelines. During the intervention, health staff received a human trafficking pre-education questionnaire, a research supported education training intervention, and a post-intervention questionnaire. Data on post-education intervention referrals was also completed to discern impact of education on trafficking recognition and resource support. Qualities examined for ease and efficacy included the education intervention strategy, utilization of resource support, reported issues with trafficking recognition, and increase or decrease of staff confidence within interactions. Questionnaire results demonstrated increases for questions one through four following the educational intervention. Post-intervention data showed some recognition of potential human trafficking persons particularly related to mental health. Project results were consistent with other research recommendations. Continued human trafficking encounters in health systems necessitates continued research into best education, interviewing, intervention, and post-care methods

    The Cyberworld and Human Trafficking: A Double-Edged Sword

    Get PDF
    This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source intelligence, biometric facial recognition, and hashing assist in the fight. And finally, an overview of Operation Innocent Images, the Endangered Child Alert Program, and Operation Peer Pressure, is provided to highlight steps taken to stop the victimization of innocent human beings

    Gap analysis identifying the current state of information security within organizations working with victims of violence

    Get PDF
    Around the world, domestic violence, human trafficking, and stalking affect millions of lives every day. According to a report published by the Center for Disease Control and Prevention in January 2015, every minute 20 people fall victim to physical violence perpetrated by an intimate partner in the United States (US). As offenders use advancements in technology to perpetuate abuse and isolate victims, the scale of services provided by crisis organizations must rise to meet the demand while keeping a close eye on potential digital security vulnerabilities. It has been reported in general media and research that phishing emails, social engineering attacks, denial of service attacks, and other data breaches are gaining popularity and affecting business environments of all sizes and in any sector, including organizations dedicated to working with victims of violence. To address this, an exploratory research study to identify the current state of information security within the US-based non-profit crisis organizations was conducted. This study identified the gaps between a theoretical maximum level of information security and the observed level of information security in organizations working with victims of violence inspired by a recognized and respected framework, National Institute of Standards and Technology (NIST) Cybersecurity Framework. This research establishes the critical foundation for researchers, security professionals, technology companies, and crisis organizations to develop assessment tools, technology solutions, training curriculum, awareness programs, and other strategic initiatives specific to crisis organizations and other non-profit organizations to aid them in improving information security for themselves and the victims they serve
    corecore