Tracking Modern Slavery On The Dark Web

Out of sight, beneath the surface of the public form of the Internet that you use to check email or read news articles, exists a concealed Dark Web

The Dark Web has about 2.5 million daily visitors. It’s a perfect sanctuary for criminal organisations and terror groups to communicate, advertise, or buy or sell anything, including human beings.  

Over 50% of the Dark Web or Dark Net’s activities is in stolen goods, illicit drugs and slavery. Law enforcement agencies work continuously to stop these activities, but the challenges they face in investigating and prosecuting the real-world people behind the users who post on these sites cannot be underestimated.

The problem is that the amount of data that they need to manually shuffle through, 500,000 phone numbers and 2 million sex ads posted a month, is too large and unstructured for them to find connections quickly. Thus, only a low percentage of cases can be pursued.

The most rampant form of trafficking on the Dark Web is child trafficking and in the United States two out of every three children sold for sex are trafficked online. 

In 2011, Europol, in coordination with 13 different countries, arrested 184 people suspected of child abuse and the spread of child pornography in the form of images. A similar operation was carried out in the United Kingdom and 650 people accused of different forms of child abuse, from the possession of child pornography images to pandering, were arrested. A study by the UK organisation Stop the Traffik found that many of the "pastes" (paste sites are sites accessible on the Internet and are used for sharing information like email, name, etc) that advertise the sale of people are posted almost daily. 

Benjamin Faulkner, a Canadian, was the owner of “Child's Play,”, a dark-net child pornography website that at its peak had over 1 million profiles. The website showcased over 100 producers of pornography who raped and brutalised children and shot videos of their sadism for the delight of paedophiles around the world. After a six month investigation, the United States Department of Homeland Security captured Faulkner in  October 2016. At the time of his arrest, Faulkner carried on his electronic devices a child porn collection of 47,000 images and 2,900 videos. 

The nature of the Dark Web makes it very difficult to track down these people despite the best efforts Interpol, the US Justice Department and Homeland Security. The big technology companies are also working on tools using artificial intelligence and machine learning to spot illicit trafficking rings online. 

The US Defense Advanced Research Projects Agency (DARPA) has been working on a multi-year project called the Memex Program since 2014 to help identify human trafficking on the Internet. 

The purpose of the Memex program is to identify content on the surface and Dark Web to target informations indicative of human trafficking and DARPA is building the capacity to do this using advanced web crawler technology. Web crawler technology consists of a computer program that automatically and systematically searches web pages for certain words or content.

Much more work needs to be done to combat the problem of human trafficking, especially when it comes to online illicit trading of people, but with the involvement of more tech companies and wider public participation, law enforcement has increasingly powerful tools to meet the challenge. 

DARPA:     Verdict:       MIT:      Deccan Chronicle:       MEAAW:      WEF:    Europol:     Image: Unsplash

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Friends Reunite As Facebook & Australia Make Up
Cyber Security Training Goes Gaming »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Cyber-Physical Systems Security Institute (CPSSI)

Cyber-Physical Systems Security Institute (CPSSI)

CPSSI is a non-profit, by-invitation-only research and educational organization focused on practical and theoretical solutions to the cybersecurity challenges facing Cyber-Physical Systems.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.