2. The cyber modus operandi of human traffickers 4
The human trafficking process Recruitment Financial management Transportation Exploitation 5
2. The cyber modus operandi of human traffickers ◎Recruitment ◎ Gaining access to victims ◎ Identification and selection ◎ Grooming ◎ Victim subjection 6
2. The cyber modus operandi of human traffickers ◎Transportation ◎ Coordination & communication ◎ Structure of the operation 7
2. The cyber modus operandi of human traffickers ◎Exploitation ◎ Advertising ◎ Control ◎ Technology as a modality of exploitation 8
2. The cyber modus operandi of human traffickers ◎Financial management ◎ Digital payment systems ◎ Money laundering ◎ Cryptocurrency 9
3. The use of technology in the field of antitrafficking 10
3. The use of technology in the field of anti-trafficking ◎Opportunities ◎ Investigating trafficking ◎ Gaining insight ◎ Empowerment & awareness 11
3. The use of technology in the field of anti-trafficking ◎Challenges ◎ “Needle-in-a-haystack problem” ◎ Identifying trafficking ◎ Traceability ◎ Increasing sophistication 12
4. Discussion Considering trafficking & technology from a cybercriminological perspective 13
4. Discussion ◎“Old crime, new tricks” ◎Diversity of technologyfacilitated trafficking 14
4. Discussion ◎Visibility & anonymity ◎Tight interweaving between technology and trafficking in persons 15