Tracking Modern Slavery On The Dark Web

Out of sight, beneath the surface of the public form of the Internet that you use to check email or read news articles, exists a concealed Dark Web

The Dark Web has about 2.5 million daily visitors. It’s a perfect sanctuary for criminal organisations and terror groups to communicate, advertise, or buy or sell anything, including human beings.  

Over 50% of the Dark Web or Dark Net’s activities is in stolen goods, illicit drugs and slavery. Law enforcement agencies work continuously to stop these activities, but the challenges they face in investigating and prosecuting the real-world people behind the users who post on these sites cannot be underestimated.

The problem is that the amount of data that they need to manually shuffle through, 500,000 phone numbers and 2 million sex ads posted a month, is too large and unstructured for them to find connections quickly. Thus, only a low percentage of cases can be pursued.

The most rampant form of trafficking on the Dark Web is child trafficking and in the United States two out of every three children sold for sex are trafficked online. 

In 2011, Europol, in coordination with 13 different countries, arrested 184 people suspected of child abuse and the spread of child pornography in the form of images. A similar operation was carried out in the United Kingdom and 650 people accused of different forms of child abuse, from the possession of child pornography images to pandering, were arrested. A study by the UK organisation Stop the Traffik found that many of the "pastes" (paste sites are sites accessible on the Internet and are used for sharing information like email, name, etc) that advertise the sale of people are posted almost daily. 

Benjamin Faulkner, a Canadian, was the owner of “Child's Play,”, a dark-net child pornography website that at its peak had over 1 million profiles. The website showcased over 100 producers of pornography who raped and brutalised children and shot videos of their sadism for the delight of paedophiles around the world. After a six month investigation, the United States Department of Homeland Security captured Faulkner in  October 2016. At the time of his arrest, Faulkner carried on his electronic devices a child porn collection of 47,000 images and 2,900 videos. 

The nature of the Dark Web makes it very difficult to track down these people despite the best efforts Interpol, the US Justice Department and Homeland Security. The big technology companies are also working on tools using artificial intelligence and machine learning to spot illicit trafficking rings online. 

The US Defense Advanced Research Projects Agency (DARPA) has been working on a multi-year project called the Memex Program since 2014 to help identify human trafficking on the Internet. 

The purpose of the Memex program is to identify content on the surface and Dark Web to target informations indicative of human trafficking and DARPA is building the capacity to do this using advanced web crawler technology. Web crawler technology consists of a computer program that automatically and systematically searches web pages for certain words or content.

Much more work needs to be done to combat the problem of human trafficking, especially when it comes to online illicit trading of people, but with the involvement of more tech companies and wider public participation, law enforcement has increasingly powerful tools to meet the challenge. 

DARPA:     Verdict:       MIT:      Deccan Chronicle:       MEAAW:      WEF:    Europol:     Image: Unsplash

You Might Also Read: 

Tech Giants Have Facilitated An Online Slavery Market:

 

« Friends Reunite As Facebook & Australia Make Up
Cyber Security Training Goes Gaming »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.