Technology To Combat Human Trafficking

With an estimated 24.9 million victims worldwide at any given time, human traffickers prey on adults and children of all ages, backgrounds, and nationalities, exploiting them for their own profit. 

In the US between 15,000 and 50,000 women and children are forced into sexual slavery every year and the US Department of Health & Human Services estimates the total number of victims stands at 240,000 to 325,000. 

While the changing nature of technology means that traffickers are increasingly hard to track, it also means that there are a growing number of ways to combat human trafficking at every level. Government agencies, multi-national corporations, and individual app designers are providing new technologies, making it easier for law enforcement, non-profit organisations, and you to help fight human trafficking.

In order to combat this crisis a non-profit organisation took inspiration from the Indian Police, which used facial recognition technology to identify 3,000 missing children in a four-day period a few years ago. After learning about the power of technology in identification children who were vulnerable to human trafficking and child labor, the non-profit organisation ‘Moms in Security’ sought donations of tools and technology from manufacturers and developers that included software licenses and small surveillance tools to use this technology while conducting human trafficking rescue missions. 

Though technology is not the first and most readily available solution in human trafficking incidents, it is a particularly useful tool that should not be overlooked. In particular, Blockchain is a technology that is being increasingly used to combat human trafficking. 

  • Blockchain technology, which provides a shared, transparent, digital ledger of transactions, enables the tracking of goods from their original source to their final destination and can also be used to identify human trafficking risks. 
  • Artificial Intelligence (AI) can help with age progressions needed to identify victims who may have been missing for years.
  • Running facial recognition software on postings and checking the data against missing persons reports allows authorities to identify victims of human trafficking. 
  • Platforms for e-learning and apps for e-medicine allow professional support to meet survivors where they are and develop skills to find employment.
  • With global companies having thousands of suppliers across continents, tracking supply chains is currently not an easy task that Blockchain be applied to.

Even when it comes to privacy, technology can help by having state of the art security to make sure victims’ information is used for the exclusive purpose of human trafficking disruption, rescues, and prosecution.

US State Dept:   Bedbible:   Equal Times:    I-HLS:   Psychology Today:   Rahabs Daughters:    BSR:    JDSupra

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Ransomware Used Against Albania Linked To Iran
BlackByte Ransomware Group Have An Update »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures (BVV)

Bitdefender Voyager Ventures is an early-stage investment vehicle focused on cybersecurity, data analytics and automation startups.