SlideShare uma empresa Scribd logo
1 de 12
@TRACE_EU http://trace-project.eu
▪ Facilitation
▪ recruitment
▪ Exploitation
▪ Prevention
▪ To combat human trafficking
▪ The role emerging technologies
1. Identify & map different types of technologies being used to faciliate,
prevent and combat
1. CATEGORIES:
1. WEB –BASED (internet, applications & software)
2. HARDWARE
2. Assess this use
3. Identify future trends in technology and human trafficking
4. Develop recommendations for theTRACE target audience
1. Policy makers
2. Law enforcement agencies
3. Civil society organisations
▪ Technology facilitated trafficking: “[…]the social
and technical ecosystem wherein individuals use
information and communication technologies to
engage in human trafficking and related
behaviors (Latonero et al)
▪ recruitment
▪ exploitation
Web based (internet, applications &
software)
• Social networking sites
• Advertising and classifieds
• Applications (Instagram, Skype etc.)
• Web sites, including DarkWeb
• Online dating sites
• Online forums
• Peer to peer networks
Hardware
• Cameras, video and image and
other recording devices
• Telephone, mobile & landline
• Desktop computers, laptops &
tablets
• Scanners
• Television programming services
 Example: facilitating – recruitment – online dating
websites
x European national, accepts y’s marriage
proposal after a two-year relationship using
the online dating site eHarmony. Once in the
UK & residing at y’s home, x & daughter were
forced to work long hours without pay,
verbally abused and held captive inside the
home. (2010)
Web-based (internet, applications and
software)
• Case management tools
• Facial reconstruction software
• Databases
• e-Learning training platforms
• Case management tools
• Geographic information systems
• Financial tracking
• I2 Software
• Supply chain management tool kits
Hardware
•CCTV
• Routers and backup devices
 Example: Combat – UNODC case law database
• Publicly available repository of
summaries and full court cases
to support successful
convictions
• 30 April 2014, more than 1000
cases from 83 countries.
• People can contribute new
cases by directly contacting
the UNODC.
Web-based (internet, applications &
software)
• Applications
• Crowdfunding
• E-learning training programmes & platforms
• Websites (generic & other)
• Financial tracking
• Online petitions
• Social networking sites
Hardware
• Television
• Telephone
 Example: Preventing – social media – awareness raising
Big Data
Digital
Currencies
RPAS
Geographical
mapping
Tailored
search engines
TRACE Briefing paper TRACE report TRACE Handbook
Further information is available on theTRACE website.
anna.donovan@trilateralresearch.com
@TRACE_EU http://trace-project.eu

Mais conteúdo relacionado

Mais procurados

Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...lorenzo cantoni
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionWaldir Moreira
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social ChangeTeodoro Llanes II
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorshipmerlyna
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source SoftwareSeaparo Phala
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Metamorphosis
 
MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...lorenzo cantoni
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationDeoky5799
 
Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
 
I’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” ThemselvesI’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” Themselvesshontaviaj
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesMark Jhon Oxillo
 
Yamina Guidoum Urbact Final
Yamina Guidoum Urbact FinalYamina Guidoum Urbact Final
Yamina Guidoum Urbact Finalpeterramsden
 

Mais procurados (17)

Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...Information and communication technologies to listen to tourists. Practices, ...
Information and communication technologies to listen to tourists. Practices, ...
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change11 Developing ICT Project for Social Change
11 Developing ICT Project for Social Change
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
Snezana Trpevska - Content Regulation and Censorship – What is the Difference?
 
MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...MOOCs and eTourism: A reflection on the university mission, and on the impact...
MOOCs and eTourism: A reflection on the university mission, and on the impact...
 
Project1
Project1Project1
Project1
 
ICT For advocacy and Developmental Communication
ICT For advocacy and Developmental CommunicationICT For advocacy and Developmental Communication
ICT For advocacy and Developmental Communication
 
Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017Digital citizenship presentation NHS Scotland Webinar, jan 2017
Digital citizenship presentation NHS Scotland Webinar, jan 2017
 
Assignment 8
Assignment 8Assignment 8
Assignment 8
 
Publish homework
Publish homeworkPublish homework
Publish homework
 
I’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” ThemselvesI’m a Business, Man: How Educators Can “Expertize” Themselves
I’m a Business, Man: How Educators Can “Expertize” Themselves
 
ICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment TechnologiesICT as Platform for Change - Empowerment Technologies
ICT as Platform for Change - Empowerment Technologies
 
Yamina Guidoum Urbact Final
Yamina Guidoum Urbact FinalYamina Guidoum Urbact Final
Yamina Guidoum Urbact Final
 
Silviu Popa Romania
Silviu Popa RomaniaSilviu Popa Romania
Silviu Popa Romania
 

Destaque

Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015TRACE Project
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceTRACE Project
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children TRACE Project
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking TRACE Project
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies TRACE Project
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsTRACE Project
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopTRACE Project
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking TRACE Project
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickersTRACE Project
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODCTRACE Project
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers TRACE Project
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...TRACE Project
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human traffickingTRACE Project
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalTRACE Project
 

Destaque (20)

Trace workshop 10 june 2015
Trace workshop 10 june 2015Trace workshop 10 june 2015
Trace workshop 10 june 2015
 
Ecpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-traceEcpat: Ict and human trafficking-trace
Ecpat: Ict and human trafficking-trace
 
Forced criminality and exploitation of children
Forced criminality and exploitation of children Forced criminality and exploitation of children
Forced criminality and exploitation of children
 
Business and Human Trafficking
Business and Human Trafficking Business and Human Trafficking
Business and Human Trafficking
 
Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies Trafficker responses to law enforcement policies
Trafficker responses to law enforcement policies
 
Macro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beingsMacro & Micro analysis of the trafficking of human beings
Macro & Micro analysis of the trafficking of human beings
 
Muraszkiewicz
MuraszkiewiczMuraszkiewicz
Muraszkiewicz
 
Introducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus WorkshopIntroducing the TRACE project_Cyprus Workshop
Introducing the TRACE project_Cyprus Workshop
 
Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking Exploitative Sham Marriages and Human Trafficking
Exploitative Sham Marriages and Human Trafficking
 
Presentatie wp4 traffickers
Presentatie wp4  traffickersPresentatie wp4  traffickers
Presentatie wp4 traffickers
 
Profiling the traffickers_UNODC
Profiling the traffickers_UNODCProfiling the traffickers_UNODC
Profiling the traffickers_UNODC
 
Kidane Selam
Kidane SelamKidane Selam
Kidane Selam
 
key note
key notekey note
key note
 
IOM Presentation
IOM Presentation IOM Presentation
IOM Presentation
 
Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers Modus operandi utilised by human traffickers
Modus operandi utilised by human traffickers
 
The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...The human trafficking operation: the role of traffickers, (criminal) networks...
The human trafficking operation: the role of traffickers, (criminal) networks...
 
FRA presentation
FRA presentation FRA presentation
FRA presentation
 
Rijken Conny
Rijken ConnyRijken Conny
Rijken Conny
 
Routes and flows of human trafficking
Routes and flows of human traffickingRoutes and flows of human trafficking
Routes and flows of human trafficking
 
Human trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removalHuman trafficking for the purpose of organ removal
Human trafficking for the purpose of organ removal
 

Semelhante a The role of technology in human trafficking

Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Trilateral Research
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submittedKate Pangbourne
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Fatemeh Ahmadi
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft Eesti
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 

Semelhante a The role of technology in human trafficking (20)

Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
INTERNET 2.pptx
INTERNET 2.pptxINTERNET 2.pptx
INTERNET 2.pptx
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Internet Law
Internet LawInternet Law
Internet Law
 
Internet
InternetInternet
Internet
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submitted
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
Surveillance and Use of ICT for Social Control in Different Cultures: Emergin...
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the Internet
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
MIS Lesson1
MIS Lesson1MIS Lesson1
MIS Lesson1
 
ICT and Citizenship
ICT and CitizenshipICT and Citizenship
ICT and Citizenship
 

Último

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnitymahikaanand16
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptRRR Chambers
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理F La
 

Último (20)

Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 

The role of technology in human trafficking

  • 2. ▪ Facilitation ▪ recruitment ▪ Exploitation ▪ Prevention ▪ To combat human trafficking ▪ The role emerging technologies
  • 3. 1. Identify & map different types of technologies being used to faciliate, prevent and combat 1. CATEGORIES: 1. WEB –BASED (internet, applications & software) 2. HARDWARE 2. Assess this use 3. Identify future trends in technology and human trafficking 4. Develop recommendations for theTRACE target audience 1. Policy makers 2. Law enforcement agencies 3. Civil society organisations
  • 4. ▪ Technology facilitated trafficking: “[…]the social and technical ecosystem wherein individuals use information and communication technologies to engage in human trafficking and related behaviors (Latonero et al) ▪ recruitment ▪ exploitation
  • 5. Web based (internet, applications & software) • Social networking sites • Advertising and classifieds • Applications (Instagram, Skype etc.) • Web sites, including DarkWeb • Online dating sites • Online forums • Peer to peer networks Hardware • Cameras, video and image and other recording devices • Telephone, mobile & landline • Desktop computers, laptops & tablets • Scanners • Television programming services
  • 6.  Example: facilitating – recruitment – online dating websites x European national, accepts y’s marriage proposal after a two-year relationship using the online dating site eHarmony. Once in the UK & residing at y’s home, x & daughter were forced to work long hours without pay, verbally abused and held captive inside the home. (2010)
  • 7. Web-based (internet, applications and software) • Case management tools • Facial reconstruction software • Databases • e-Learning training platforms • Case management tools • Geographic information systems • Financial tracking • I2 Software • Supply chain management tool kits Hardware •CCTV • Routers and backup devices
  • 8.  Example: Combat – UNODC case law database • Publicly available repository of summaries and full court cases to support successful convictions • 30 April 2014, more than 1000 cases from 83 countries. • People can contribute new cases by directly contacting the UNODC.
  • 9. Web-based (internet, applications & software) • Applications • Crowdfunding • E-learning training programmes & platforms • Websites (generic & other) • Financial tracking • Online petitions • Social networking sites Hardware • Television • Telephone
  • 10.  Example: Preventing – social media – awareness raising
  • 12. TRACE Briefing paper TRACE report TRACE Handbook Further information is available on theTRACE website. anna.donovan@trilateralresearch.com @TRACE_EU http://trace-project.eu