Non-traditional cyber adversaries: Combatting human trafficking through data science
Danielle Borrelli and
Sherrie Caltagirone
Additional contact information
Danielle Borrelli: California Cybersecurity Institute and Program Lead, Trafficking Investigations Hub, USA
Sherrie Caltagirone: Founder and Executive Director, Global Emancipation Network, USA
Cyber Security: A Peer-Reviewed Journal, 2020, vol. 4, issue 1, 77-90
Abstract:
Human trafficking is a complex and challenging global crime exacerbated by the use of technology. This paper begins by dicussing how traffickers utilise technology for scalability, anonymity and profitability as the Internet, social media platforms and encrypted messaging make the recruitment, exploitation and profit of an individual a low-risk, high-reward enterprise. It goes on to describe how counter-trafficking efforts are often siloed approaches, resulting in decentralised information and analysis on the size and scope of trafficking in persons. It presents resources and tools such as the human trafficking kill chain methodology and Artemis, a machine learning (ML) human trafficking risk classifier, show promising disruption tactics which may also be applied to other asymmetrical threats. Recommendations for centralised data collections methods, interagency collaboration and cybersecurity adjacent legislation are also made.
Keywords: trafficking; sexual exploitation; cyber; adversaries; data (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/5778/download/ (application/pdf)
https://hstalks.com/article/5778/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2020:v:4:i:1:p:77-90
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().