Technology To Combat Human Trafficking

With an estimated 24.9 million victims worldwide at any given time, human traffickers prey on adults and children of all ages, backgrounds, and nationalities, exploiting them for their own profit. 

In the US between 15,000 and 50,000 women and children are forced into sexual slavery every year and the US Department of Health & Human Services estimates the total number of victims stands at 240,000 to 325,000. 

While the changing nature of technology means that traffickers are increasingly hard to track, it also means that there are a growing number of ways to combat human trafficking at every level. Government agencies, multi-national corporations, and individual app designers are providing new technologies, making it easier for law enforcement, non-profit organisations, and you to help fight human trafficking.

In order to combat this crisis a non-profit organisation took inspiration from the Indian Police, which used facial recognition technology to identify 3,000 missing children in a four-day period a few years ago. After learning about the power of technology in identification children who were vulnerable to human trafficking and child labor, the non-profit organisation ‘Moms in Security’ sought donations of tools and technology from manufacturers and developers that included software licenses and small surveillance tools to use this technology while conducting human trafficking rescue missions. 

Though technology is not the first and most readily available solution in human trafficking incidents, it is a particularly useful tool that should not be overlooked. In particular, Blockchain is a technology that is being increasingly used to combat human trafficking. 

  • Blockchain technology, which provides a shared, transparent, digital ledger of transactions, enables the tracking of goods from their original source to their final destination and can also be used to identify human trafficking risks. 
  • Artificial Intelligence (AI) can help with age progressions needed to identify victims who may have been missing for years.
  • Running facial recognition software on postings and checking the data against missing persons reports allows authorities to identify victims of human trafficking. 
  • Platforms for e-learning and apps for e-medicine allow professional support to meet survivors where they are and develop skills to find employment.
  • With global companies having thousands of suppliers across continents, tracking supply chains is currently not an easy task that Blockchain be applied to.

Even when it comes to privacy, technology can help by having state of the art security to make sure victims’ information is used for the exclusive purpose of human trafficking disruption, rescues, and prosecution.

US State Dept:   Bedbible:   Equal Times:    I-HLS:   Psychology Today:   Rahabs Daughters:    BSR:    JDSupra

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Ransomware Used Against Albania Linked To Iran
BlackByte Ransomware Group Have An Update »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.