Tracking Modern Slavery On The Dark Web

Out of sight, beneath the surface of the public form of the Internet that you use to check email or read news articles, exists a concealed Dark Web

The Dark Web has about 2.5 million daily visitors. It’s a perfect sanctuary for criminal organisations and terror groups to communicate, advertise, or buy or sell anything, including human beings.  

Over 50% of the Dark Web or Dark Net’s activities is in stolen goods, illicit drugs and slavery. Law enforcement agencies work continuously to stop these activities, but the challenges they face in investigating and prosecuting the real-world people behind the users who post on these sites cannot be underestimated.

The problem is that the amount of data that they need to manually shuffle through, 500,000 phone numbers and 2 million sex ads posted a month, is too large and unstructured for them to find connections quickly. Thus, only a low percentage of cases can be pursued.

The most rampant form of trafficking on the Dark Web is child trafficking and in the United States two out of every three children sold for sex are trafficked online. 

In 2011, Europol, in coordination with 13 different countries, arrested 184 people suspected of child abuse and the spread of child pornography in the form of images. A similar operation was carried out in the United Kingdom and 650 people accused of different forms of child abuse, from the possession of child pornography images to pandering, were arrested. A study by the UK organisation Stop the Traffik found that many of the "pastes" (paste sites are sites accessible on the Internet and are used for sharing information like email, name, etc) that advertise the sale of people are posted almost daily. 

Benjamin Faulkner, a Canadian, was the owner of “Child's Play,”, a dark-net child pornography website that at its peak had over 1 million profiles. The website showcased over 100 producers of pornography who raped and brutalised children and shot videos of their sadism for the delight of paedophiles around the world. After a six month investigation, the United States Department of Homeland Security captured Faulkner in  October 2016. At the time of his arrest, Faulkner carried on his electronic devices a child porn collection of 47,000 images and 2,900 videos. 

The nature of the Dark Web makes it very difficult to track down these people despite the best efforts Interpol, the US Justice Department and Homeland Security. The big technology companies are also working on tools using artificial intelligence and machine learning to spot illicit trafficking rings online. 

The US Defense Advanced Research Projects Agency (DARPA) has been working on a multi-year project called the Memex Program since 2014 to help identify human trafficking on the Internet. 

The purpose of the Memex program is to identify content on the surface and Dark Web to target informations indicative of human trafficking and DARPA is building the capacity to do this using advanced web crawler technology. Web crawler technology consists of a computer program that automatically and systematically searches web pages for certain words or content.

Much more work needs to be done to combat the problem of human trafficking, especially when it comes to online illicit trading of people, but with the involvement of more tech companies and wider public participation, law enforcement has increasingly powerful tools to meet the challenge. 

DARPA:     Verdict:       MIT:      Deccan Chronicle:       MEAAW:      WEF:    Europol:     Image: Unsplash

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Friends Reunite As Facebook & Australia Make Up
Cyber Security Training Goes Gaming »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.