Professional Documents
Culture Documents
Technology
TO COMBAT HUMAN TRAF FICKING
Arthur T. Ball Clyde W. Ford, CEO
Managing Director, Asia Entegra Analytics
Public Safety and National Security
Microsoft Corporation
Contents
An Overview of the Problem………………………..….3 Entegra Analytics’ Fusion Cloud……………………………….14
Human trafficking is one of the largest and most Figure 1. Last year’s documented human trafficking
cases and routes of travel in Southeast Asia.
profitable criminal enterprises in the world.
Contravening numerous international treaties, as
well as the laws of most nations, the practice often with impunity, within and between nation
ensnares more than 25 million people (mostly states. Quick to adopt the latest IT trends,
women and girls) around the world, including increasingly they use websites, social media, and
upwards of 250,000 people in the United States. It mobile technology to escape scrutiny from the COI
is estimated to be the third largest criminal activity and to fuel the hopes of targeted audiences with
globally, after the illicit sales of weapons and false promises of a better life.
drugs, generating roughly $32 billion dollars a
year. This is more than the profits of Nike, Google, Unfortunately, improvements in technology and
and Starbucks combined. increased network bandwidths across the
developing world will allow this trend to continue
Yet, our recent interviews with informed staff from unabated unless effective, collective strategies are
relevant IGOs and NGOs in Southeast Asia put in place that keep pace with the latest
identified only a small number of reported cases technological trends. These formidable criminal
and general human-trafficking routes, as shown in enterprises proliferate in the lesser-governed
Figure 1. The sum of these reported cases presents regions of the real and virtual world, as do the
a stark contrast with the ILO estimate; so the well-documented linkages between human
choice in cartography here is also deliberate, trafficking, drugs, violent crime, money laundering,
reflecting not only the timeless nature of the and even international terrorism.
problem, but also the current lack of advanced
mapping and other technology to effectively track
and document the trade.
Risk-Reward
issue—working across multiple jurisdictions and
criminal justice systems through a variety of
means—the goal is attainable. Such means include
Environment
the appropriate incorporation of modern
information technology solutions (several of which
are described later in this document) into the
collective effort. In particular, Microsoft believes
While completely eliminating this crime may not that “disruptive” technology solutions can play an
be possible, it is possible to dramatically increase important role in shifting the dynamics of the
the risks associated with human trafficking to the trafficking trade. Technology can democratize the
point where traffickers are forced to recalculate process of combatting traffickers, providing
their cost-benefit analysis and seriously consider everyone a mechanism to participate and “speak”
the wisdom of continuing their heinous trade. with an equal voice; enabling ways to connect
Currently human traffickers operate in a low-risk, individual emotions and public sentiment to the
high-reward setting. By contrast, illegal marriage issues; and presenting methods for more active
brokers and those who smuggle migrant labor participation. While creating and facilitating these
operate with impunity in a low-risk, low-reward opportunities for dynamic participation,
setting. technology can build and disseminate sources of
awareness, knowledge, skills, encouragement, and
There are many reasons why the risk is so low for public acknowledgement. Through cooperative
these highly rewarded trafficking profiteers. efforts that raise the costs, risks, and difficulty of
Victims and their families eschew cooperation with doing business for traffickers, Microsoft and its
law enforcement agencies in many countries. They partners can make human trafficking a less
may live in close proximity to traffickers and may appealing trade.
be threatened or intimidated by them. Some
countries lack the appropriate law enforcement
procedures, antitrafficking legislation, legal
penalties, and evidentiary practices necessary to
bring forth meaningful prosecutions. A weak
criminal justice system assists perpetrators and
harms victims.
Solution Space
need to adopt advanced information technology.
Organizations combatting trafficking can:
Bringing technology to bear in combatting human Situational awareness solutions are essential
trafficking can also accelerate the speed and components of any response to human trafficking.
improve the quality of decision making. Intelligence-based, georeferenced information on
Technology enables transparency. Political leaders changing conditions, movements of victims and
and heads of LEAs and related organizations will perpetrators, and the relationship of responding
be able to demonstrate greater transparency and teams to political and jurisdictional regions are critical.
accountability through their use of technology,
thereby building public confidence in their Armed with this information, responding agencies
decisions and actions. The same technology used can make better operational decisions,
to counter human trafficking can also be used to coordinating teams and providing the right
enhance public safety in other areas—reducing resources where they are most needed to interdict
crime, exposing corruption, revealing inefficiencies, and interrupt trafficking operations. Geospatial
and providing citizen access to governmental intelligence tools allow for the integration of
services, for instance. Leaders who understand the contextual data analysis with response activities
power of technology and seize the opportunities and resource deployment planning. Logistics
presented will be well positioned to contend with management applications can provide a rich
internal challenges, manage change, and govern context for ensuring that response activities
more effectively. Leaders who seize the possess all the required resources.
opportunities presented by new technology in this
fashion will no doubt discover additional political Advances in digital technology have greatly
leverage. increased the use of real-time information and
open data for decision making with immediate and
Awareness of the problems and challenges of powerful “on-the-ground” impacts. Social media
human trafficking has led to initiatives joining can also help responding organizations determine
governments, LEAs, NGOs, IGOs, academia, and where to focus their efforts. When aggregated,
socially responsible businesses in antitrafficking managed, and analyzed appropriately, real-time
PPPs. Still, not enough attention has been given to information, open data, and social media may
the role that technology plays in facilitating human reveal previously unrealized links and
trafficking, or the multitude of ways that unrecognized risks. Employing big data analysis
technology can be marshalled to fight it. Today, it and natural language processing are examples of
is increasingly relevant to consider the technology techniques that can surface such hidden
solution space in order to tackle the problems of relationships.
commercial sexual exploitation, forced labor, and
other forms of modern-day slavery in an end-to- The information gained from social media and
end fashion. other open data sources is incredibly valuable, but
organizations require additional processes,
Inter-Agency Situational solutions, and resources to manage and analyze
this data so that it can be used effectively in
Awareness, Information collaboration with other agencies or as part of an
organization’s own incident response. Identity
Management and Analysis management, privilege management, and access
control can assist organizations in limiting what
Interagency responses often need to focus first on information is shared among groups and teams, so
the search and rescue of victims of human that sensitive information is protected both within
trafficking, retrieving trafficked persons when and outside the organizations. Application and use
possible and providing relocation and emergency of all forms of information management and
social services when needed in order to save and analysis systems must also contain mechanisms to
recover lives. In the transitional period between allow for compliance with current privacy and
the search for and the relocation of victims, security standards, policies and regulations.
Promoting best business practices and technology solutions, such as the Child
policies to ensure that Microsoft technology Exploitation Tracking System, the Computer
solutions and procedures are not Online Forensic Evidence Extractor, the
contributing to the exploitation of children or Guardian App, as well as Microsoft partner
facilitating human trafficking. This includes solutions that can help shift the cost-benefit
both Microsoft business operations and analysis fueling the trafficking trade.
those of its suppliers. To undertake this
effort, Microsoft invests heavily in supply- Microsoft is a member of the Global Business
chain social and environmental accountability Coalition Against Trafficking and is also working
programs for its packaging and hardware with the White House Office of Science and
manufacturers (which include independent Technology Policy, as well as with leading US State
third-party auditing) to help ensure that the Attorneys General, the UN, local police agencies,
Microsoft Supplier Code of Conduct and and others on a variety of PPP initiatives to
applicable local and national regulations are address human trafficking. By promoting these
met or exceeded. cooperative efforts and providing disruptive
Making available to these partners the Cyber technologies that raise the costs, risks, and
knowledge and techniques pioneered by the difficulty of doing business for traffickers,
Microsoft DCU. Microsoft believes it can assist the COI to make
Exploiting international technology initiatives human trafficking a less appealing trade.
such as PhotoDNA to help protect societies
against technology-facilitated sexual
exploitation with the help of partners such as
DCU
the National Center for Missing and The Microsoft Digital Crimes Unit (DCU) is part of
Exploited Children. the Microsoft Legal and Corporate Affairs (LCA)
Working with leaders in the antitrafficking office. The organization comprises attorneys,
community of interest to collaborate on investigators, forensic analysts, and business
creative approaches to disrupting human professionals located in 30 countries across the
trafficking with other advanced Microsoft globe. With cybercrime affecting millions of people
Figure 3. In essence, PhotoDNA creates a unique signature for a given image based on a mathematical algorithm.
Microsoft donated PhotoDNA to the National Center for Missing & Exploited Children in 2009, and today
PhotoDNA is licensed to over 50 organizations, including INTERPOL.
Figure 4. Deployment of the Child Exploitation Tracking System. Computer Online Forensic Evidence Extractor (COFEE)
Fusion Cloud
app alerts designated friends and families when
the user is feels threatened, and can be integrated
into existing solutions for Police or private security
agencies to monitor distress calls and provide help
through a cloud based portal. It also provides No simple answers to stopping human trafficking
directions to the nearest local help, such as police, exist. Efforts to combat this problem must address
hospitals and other agencies. Because the a multitude of economic, social, and cultural
Guardian ecosystem has a cloud based factors. Regardless of the approach, stopping
infrastructure, even if the phone is destroyed or human trafficking requires current, accurate
the GPRS connection gets lost, the system information as well as the tools to adequately
intelligently continues to relay its SOS alerts. With process this information. Antitrafficking
a real-time tracking and intelligent SOS alert information needs are similar to those required to
function, a call for help (and the subsequent combat any transnational asymmetric threat such
recording of related evidence associated with as terrorism. These needs are to gather, analyze,
suspected criminal activity), this application is disseminate, and archive information on human
exactly the type of “disruptive technology” which trafficking—the components of a standard
could alter the risk-reward calculation and serve as intelligence “life cycle.” Individuals and
a potential deterrent in the fight against traffickers organizations fighting this menace need to be
and other criminal enterprises (see Figure 5). equipped with the latest technology to meet and
manage these information needs. The balance of
this paper proposes such a solution.
for Integrated Analysis The tools used to accomplish text analysis and
entity extraction are sophisticated statistical
Integrated Federated Search Capability models of different languages—models that have
Intrinsic to the operation of nearly all analytical been trained to understand the grammar and
tools is the capability for federated searching— syntax of each language. Based on cost and
that is, the ability for one search entry to search all complexity issues, this paper proposes that initially
the data sources, internal and external, to which all requests and reports are captured and analyzed
the IMS has access. While initially limited to human in English. At a later date, the solution can be
trafficking data collected and managed by the IMS, expanded to encompass information reported and
this federated search capability can be readily requested in other languages.
expanded through Azure as new data sources
Summary
become available.
i ii
United Nations Office on Drugs and Crime. United International Labour Organization. A global alliance
Nations Convention Against Transnational Organized against forced labour, 2005.
Crime and the Protocols Thereto, 2004.