Tracking Modern Slavery On The Dark Web

Out of sight, beneath the surface of the public form of the Internet that you use to check email or read news articles, exists a concealed Dark Web

The Dark Web has about 2.5 million daily visitors. It’s a perfect sanctuary for criminal organisations and terror groups to communicate, advertise, or buy or sell anything, including human beings.  

Over 50% of the Dark Web or Dark Net’s activities is in stolen goods, illicit drugs and slavery. Law enforcement agencies work continuously to stop these activities, but the challenges they face in investigating and prosecuting the real-world people behind the users who post on these sites cannot be underestimated.

The problem is that the amount of data that they need to manually shuffle through, 500,000 phone numbers and 2 million sex ads posted a month, is too large and unstructured for them to find connections quickly. Thus, only a low percentage of cases can be pursued.

The most rampant form of trafficking on the Dark Web is child trafficking and in the United States two out of every three children sold for sex are trafficked online. 

In 2011, Europol, in coordination with 13 different countries, arrested 184 people suspected of child abuse and the spread of child pornography in the form of images. A similar operation was carried out in the United Kingdom and 650 people accused of different forms of child abuse, from the possession of child pornography images to pandering, were arrested. A study by the UK organisation Stop the Traffik found that many of the "pastes" (paste sites are sites accessible on the Internet and are used for sharing information like email, name, etc) that advertise the sale of people are posted almost daily. 

Benjamin Faulkner, a Canadian, was the owner of “Child's Play,”, a dark-net child pornography website that at its peak had over 1 million profiles. The website showcased over 100 producers of pornography who raped and brutalised children and shot videos of their sadism for the delight of paedophiles around the world. After a six month investigation, the United States Department of Homeland Security captured Faulkner in  October 2016. At the time of his arrest, Faulkner carried on his electronic devices a child porn collection of 47,000 images and 2,900 videos. 

The nature of the Dark Web makes it very difficult to track down these people despite the best efforts Interpol, the US Justice Department and Homeland Security. The big technology companies are also working on tools using artificial intelligence and machine learning to spot illicit trafficking rings online. 

The US Defense Advanced Research Projects Agency (DARPA) has been working on a multi-year project called the Memex Program since 2014 to help identify human trafficking on the Internet. 

The purpose of the Memex program is to identify content on the surface and Dark Web to target informations indicative of human trafficking and DARPA is building the capacity to do this using advanced web crawler technology. Web crawler technology consists of a computer program that automatically and systematically searches web pages for certain words or content.

Much more work needs to be done to combat the problem of human trafficking, especially when it comes to online illicit trading of people, but with the involvement of more tech companies and wider public participation, law enforcement has increasingly powerful tools to meet the challenge. 

DARPA:     Verdict:       MIT:      Deccan Chronicle:       MEAAW:      WEF:    Europol:     Image: Unsplash

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Friends Reunite As Facebook & Australia Make Up
Cyber Security Training Goes Gaming »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.