This is your presentation title 1 Introduction 2

  • Slides: 17
Download presentation
This is your presentation title

This is your presentation title

1. Introduction 2

1. Introduction 2

1. Introduction ◎The trafficking-technology nexus ◎Methodology ◎ Literature review ◎ Face-to-face interviews ◎ Convicted

1. Introduction ◎The trafficking-technology nexus ◎Methodology ◎ Literature review ◎ Face-to-face interviews ◎ Convicted trafficking offenders (n=3) ◎ Law enforcement professionals (n=13) 3

2. The cyber modus operandi of human traffickers 4

2. The cyber modus operandi of human traffickers 4

The human trafficking process Recruitment Financial management Transportation Exploitation 5

The human trafficking process Recruitment Financial management Transportation Exploitation 5

2. The cyber modus operandi of human traffickers ◎Recruitment ◎ Gaining access to victims

2. The cyber modus operandi of human traffickers ◎Recruitment ◎ Gaining access to victims ◎ Identification and selection ◎ Grooming ◎ Victim subjection 6

2. The cyber modus operandi of human traffickers ◎Transportation ◎ Coordination & communication ◎

2. The cyber modus operandi of human traffickers ◎Transportation ◎ Coordination & communication ◎ Structure of the operation 7

2. The cyber modus operandi of human traffickers ◎Exploitation ◎ Advertising ◎ Control ◎

2. The cyber modus operandi of human traffickers ◎Exploitation ◎ Advertising ◎ Control ◎ Technology as a modality of exploitation 8

2. The cyber modus operandi of human traffickers ◎Financial management ◎ Digital payment systems

2. The cyber modus operandi of human traffickers ◎Financial management ◎ Digital payment systems ◎ Money laundering ◎ Cryptocurrency 9

3. The use of technology in the field of antitrafficking 10

3. The use of technology in the field of antitrafficking 10

3. The use of technology in the field of anti-trafficking ◎Opportunities ◎ Investigating trafficking

3. The use of technology in the field of anti-trafficking ◎Opportunities ◎ Investigating trafficking ◎ Gaining insight ◎ Empowerment & awareness 11

3. The use of technology in the field of anti-trafficking ◎Challenges ◎ “Needle-in-a-haystack problem”

3. The use of technology in the field of anti-trafficking ◎Challenges ◎ “Needle-in-a-haystack problem” ◎ Identifying trafficking ◎ Traceability ◎ Increasing sophistication 12

4. Discussion Considering trafficking & technology from a cybercriminological perspective 13

4. Discussion Considering trafficking & technology from a cybercriminological perspective 13

4. Discussion ◎“Old crime, new tricks” ◎Diversity of technologyfacilitated trafficking 14

4. Discussion ◎“Old crime, new tricks” ◎Diversity of technologyfacilitated trafficking 14

4. Discussion ◎Visibility & anonymity ◎Tight interweaving between technology and trafficking in persons 15

4. Discussion ◎Visibility & anonymity ◎Tight interweaving between technology and trafficking in persons 15

Technological awareness 16

Technological awareness 16

17

17