Technology To Combat Human Trafficking

With an estimated 24.9 million victims worldwide at any given time, human traffickers prey on adults and children of all ages, backgrounds, and nationalities, exploiting them for their own profit. 

In the US between 15,000 and 50,000 women and children are forced into sexual slavery every year and the US Department of Health & Human Services estimates the total number of victims stands at 240,000 to 325,000. 

While the changing nature of technology means that traffickers are increasingly hard to track, it also means that there are a growing number of ways to combat human trafficking at every level. Government agencies, multi-national corporations, and individual app designers are providing new technologies, making it easier for law enforcement, non-profit organisations, and you to help fight human trafficking.

In order to combat this crisis a non-profit organisation took inspiration from the Indian Police, which used facial recognition technology to identify 3,000 missing children in a four-day period a few years ago. After learning about the power of technology in identification children who were vulnerable to human trafficking and child labor, the non-profit organisation ‘Moms in Security’ sought donations of tools and technology from manufacturers and developers that included software licenses and small surveillance tools to use this technology while conducting human trafficking rescue missions. 

Though technology is not the first and most readily available solution in human trafficking incidents, it is a particularly useful tool that should not be overlooked. In particular, Blockchain is a technology that is being increasingly used to combat human trafficking. 

  • Blockchain technology, which provides a shared, transparent, digital ledger of transactions, enables the tracking of goods from their original source to their final destination and can also be used to identify human trafficking risks. 
  • Artificial Intelligence (AI) can help with age progressions needed to identify victims who may have been missing for years.
  • Running facial recognition software on postings and checking the data against missing persons reports allows authorities to identify victims of human trafficking. 
  • Platforms for e-learning and apps for e-medicine allow professional support to meet survivors where they are and develop skills to find employment.
  • With global companies having thousands of suppliers across continents, tracking supply chains is currently not an easy task that Blockchain be applied to.

Even when it comes to privacy, technology can help by having state of the art security to make sure victims’ information is used for the exclusive purpose of human trafficking disruption, rescues, and prosecution.

US State Dept:   Bedbible:   Equal Times:    I-HLS:   Psychology Today:   Rahabs Daughters:    BSR:    JDSupra

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Ransomware Used Against Albania Linked To Iran
BlackByte Ransomware Group Have An Update »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.