Tracking Modern Slavery On The Dark Web

Out of sight, beneath the surface of the public form of the Internet that you use to check email or read news articles, exists a concealed Dark Web

The Dark Web has about 2.5 million daily visitors. It’s a perfect sanctuary for criminal organisations and terror groups to communicate, advertise, or buy or sell anything, including human beings.  

Over 50% of the Dark Web or Dark Net’s activities is in stolen goods, illicit drugs and slavery. Law enforcement agencies work continuously to stop these activities, but the challenges they face in investigating and prosecuting the real-world people behind the users who post on these sites cannot be underestimated.

The problem is that the amount of data that they need to manually shuffle through, 500,000 phone numbers and 2 million sex ads posted a month, is too large and unstructured for them to find connections quickly. Thus, only a low percentage of cases can be pursued.

The most rampant form of trafficking on the Dark Web is child trafficking and in the United States two out of every three children sold for sex are trafficked online. 

In 2011, Europol, in coordination with 13 different countries, arrested 184 people suspected of child abuse and the spread of child pornography in the form of images. A similar operation was carried out in the United Kingdom and 650 people accused of different forms of child abuse, from the possession of child pornography images to pandering, were arrested. A study by the UK organisation Stop the Traffik found that many of the "pastes" (paste sites are sites accessible on the Internet and are used for sharing information like email, name, etc) that advertise the sale of people are posted almost daily. 

Benjamin Faulkner, a Canadian, was the owner of “Child's Play,”, a dark-net child pornography website that at its peak had over 1 million profiles. The website showcased over 100 producers of pornography who raped and brutalised children and shot videos of their sadism for the delight of paedophiles around the world. After a six month investigation, the United States Department of Homeland Security captured Faulkner in  October 2016. At the time of his arrest, Faulkner carried on his electronic devices a child porn collection of 47,000 images and 2,900 videos. 

The nature of the Dark Web makes it very difficult to track down these people despite the best efforts Interpol, the US Justice Department and Homeland Security. The big technology companies are also working on tools using artificial intelligence and machine learning to spot illicit trafficking rings online. 

The US Defense Advanced Research Projects Agency (DARPA) has been working on a multi-year project called the Memex Program since 2014 to help identify human trafficking on the Internet. 

The purpose of the Memex program is to identify content on the surface and Dark Web to target informations indicative of human trafficking and DARPA is building the capacity to do this using advanced web crawler technology. Web crawler technology consists of a computer program that automatically and systematically searches web pages for certain words or content.

Much more work needs to be done to combat the problem of human trafficking, especially when it comes to online illicit trading of people, but with the involvement of more tech companies and wider public participation, law enforcement has increasingly powerful tools to meet the challenge. 

DARPA:     Verdict:       MIT:      Deccan Chronicle:       MEAAW:      WEF:    Europol:     Image: Unsplash

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Friends Reunite As Facebook & Australia Make Up
Cyber Security Training Goes Gaming »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER) - USA

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Senserva

Senserva

Senserva delivers a deep analysis for security user accounts and applications within the Microsoft cloud environment.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

National Cyber Force (NCF) - UK

National Cyber Force (NCF) - UK

The National Cyber Force (NCF) is a partnership between defence and intelligence.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.