Written by Julia García Álvarez

Introduction

Modern slavery is considered as an umbrella term that includes multiple forms of exploitation. Some of the most frequent forms are trafficking of human beings (including sexual and reproductive trafficking), forced labour and slavery of children for terrorism and other purposes. Nowadays, perpetrators of these forms of exploitation are using new digital tools to recruit, advertise and exercise control over the victims, particularly over women and children living in extreme poverty. For example, the report made by Thorn in 2015 in which 115 victims of sex-trafficking participated, found that the 63% were advertised online, mainly in Backpage, Craigslist and Facebook websites (V. Bouché, 2015).

The Internet and mobile phone technology have improved our lives in many ways, but they have raised many other ethical challenges. These are technologies that keep people accessible and connected everywhere at every time. This type of accessibility drives an exposure of everyone’s privacy that may also lead to dangerous consequences. In human trafficking, this means that traffickers have incorporated Information and Communication Tecnologies (ICTs) in their modus operandis, transforming and modernising  the trafficking process. Yet, no regulation is directly enacted that addresses  the nexus between sexual exploitation and these digital tools. 

At EU level, eradicating human trafficking is one of the main goals of the EU and the Europol. And still, Europe is one of the world’s leading regions in human trafficking. The emergence of the digital age and subsequent development of ICTs have transformed the crimes of sexual exploitation and women trafficking, and yet human trafficking is not mentioned in EU cybersecurity policies (European Commission, 2018).

This article aims to explore the impact of ICTs technology by perpetrators on human trafficking, and the need to elaborate international and regional privacy legislative frameworks that address the new phenomenon of cybertrafficking, by investigating the current international legal framework, but especially, the EU framework. In addition, this article aims to emphasize the compelling necessity to ensure a gender-sensitive and children’s perspective approach in these ICTs-supported anti-trafficking efforts.

Legal Framework on Human Trafficking at International and EU level

There are many international instruments that address the issue of human trafficking regardless its technological dimension. One of the main instruments is the Palermo Protocol. The Protocol to Prevent, Suppress and Punish Trafficking in Persons Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime, which was adopted by the General Assembly the 12th of December 2000. This is the first universal instrument that tackles all elements of human trafficking. Palermo Protocol defines trafficking in an inclusive way, and it introduces a gender perspective. It recognizes the unequal power dynamics between victims and perpetrators, and it also mentions the non-absolute character of consent (K. Maltzahn, 2005).

The protocol defines and distinguishes trafficking and exploitation in the article 3, a). According to the Protocol, trafficking is “the recruitment, transportation, transfer, harboring or receipt of persons, by means of the threat or use of force or other forms of coercion, abduction, fraud, deception, the abuse of power or a position of vulnerability or the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation”. On the other hand, exploitation shall include, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery, or practices similar to slavery, servitude or the removal of organs; (Palermo Protocol, 2000, art 3. a).

Eventually, Palermo Protocol is the only treaty at UN level that focuses on human trafficking directly. However, two other international treaties need to also be  highlighted in the fight against human trafficking: on the one hand, the Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution and Child pornography, adopted the 25 May 2000, incriminates prostitution and sexual exploitation of children. On the other hand, the Convention for the Elimination of Discrimination of Women, which, through its Article 6, provides a ground for the incrimination of the trafficking of women and the exploitation for prostitution.

At the European level, the main instrument that directly tackles the issue of human trafficking is the Convention on Action Against Trafficking in Human Beings of the Council of Europe, adopted on 16 May 2005. This Convention goes beyond the Palermo Protocol because it focuses on the victim’s perspective, and it defines human trafficking as a violation of human rights. In fact, the preamble of this Convention holds that human trafficking “is a violation of human rights and an offence to the dignity and integrity of human beings” (V. Stoyanova, 2017). At EU level, the main legal instrument that should be highlighted is the Directive on preventing and combating trafficking in human beings and protecting its victims. This Directive also considers human trafficking as a violation of human rights and it focusses on prevention and protection of victims, and it establishes additional measures regarding the investigation and prosecution (A. Pérez Cepeda and D. Benito Sánchez, 2014).

On the technological side, although there is no regulation on the use of ICTs on human trafficking, there is a legislation related to cybercrime at European level that needs to  be considered. The Convention on cybercrime was adopted by the Council of Europe in 2001. This Convention specifically addresses child pornography. In this case, child pornography is considered a modern slavery form, and it also constitutes a form of children exploitation, and, in some circumstances, child trafficking. The substantive  effort to prosecute child pornography can also be considered as a great advancement towards the prosecution of computer-related crime, which includes cyber trafficking. Although the Convention has its limitation as it focuses only on children’s victims of sexual exploitation online (Schell, B. et al., 2007). The Convention on the Protection of Children Against Sexual Exploitation and Sexual Abuse is also relevant in this context, as well as the Istanbul Convention, which has been interpreted as the definition of sexual exploitation through the elements of physical, psychological and sexual violence, since different forms of gender abuse have the potential to form a chain of elements which can eventually amount to a case of trafficking (EIGE, 2018). In addition to regulations on human trafficking and cybercrime, privacy and data protection regulation is a strong legal mechanism that must be highlighted, considering the attention that is being developed through this issue, and the current legal and policy advancements in this field. 

Big Data is a term used to describe a type of technology, but it also represents a new era. It refers to the revolutionary technique of collecting, storing and analyzing enormous amounts of data, which turns into information encompassing transactions, social media, enterprise content, sensors, and even mobile devices. (K.-C. DESOUZA AND K.-L SMITH, ). But this technological advancement has also brought many ethical challenges and privacy concerns, hence the right to data protection is being consolidated as a fundamental right. In this regard, undoubtedly, the main instrument at EU level – but established as a reference worldwide – is the General Data Protection Regulation, that  introduces key concepts such as ‘transparency’, ‘data minimization’, ‘consent’, ‘data security’ or ‘rights of erasure’, which can now be enforced through economic sanctions and instruments of monitoring and control by EU Agencies (J. P. Albrecht, 2016).

The use of Information and Communication Technologies on Human Trafficking: cyber trafficking

21st century traffickers are employing modern communication technologies to support their criminal activities. The expansion of the ICTs technologies and the internet has driven a revolution, the digital revolution. It has affected numerous aspects of daily life around the globe, it has enabled people to connect and transfer their daily activities, including facilitating domestic and international trafficking in persons. Social Media is being used by traffickers in the whole process of recruitment, advertisement, and procurement of victims, however, it is unclear the extend to which ICTs are used in both sex trafficking and labor trafficking, and the role of the online environment in trafficking remains an open question (Latonero, 2011).

However, ICTs are not only being used as a tool for traffickers that support them to execute their crimes in the physical space, but it is also being used as a parallel space where a new form of exploitation is possible, for example, through the circulation of images and videos of sexual exploitation, which generates additional economic profit for traffickers, and a new dimension of human rights violations for victims (C. Dettmeijer-Vermeulen, 2012). Undoubtedly, the gender and children dimension appear as an important component, as well as it is important on human trafficking. Hence, it is crucial to consider the gender and children dimension when studying the ethical impact of ICTs, internet, and Big Data technologies (R. Tidwell, 2016).

As previously mentioned, traffickers use ICTs to recruit, advertise and control their victims. The specific tools can be found either in the surface web or in the dark web. On the one hand, the surface web is defined as the portion of the internet that is visible by all users, which, for traffickers, may serve as a platform for advertising and selling services, identifying, and recruiting victims, exercising control over them, and communicating with other trafficking actors. Therefore, this is the visible part of the phenomenon, where anti-trafficking agents can trace and analyze perpetrators’ ‘digital footprint’, which designates the information about trafficking actions that can be found on the Internet as a result of their online activity (O. Stockhem, 2020). On the surface web we can find many popular social media sites and messaging apps such as Facebook, Instagram, Snapchat, Tumblr, Viber, Skype, Facetime, and dating applications such as Elmaz, Twoo, Gepime, Tinder, Grindr or Okcupid are particularly used for international trafficking (Myria, 2017). They connect people and develop relationships, all for free. However, their unlimited potential is also exploited by human traffickers. For example, the report made by Thorn in 2015 in which 115 victims of sex-trafficking participated, found that the 63% were advertised online, mainly in Backpage, Craigslist and Facebook websites (V. Bouché, 2015). 

Social media networks are used at the recruitment phase to secure trust and cooperation of vulnerable people, particularly young girls and children, using fake accounts.In this context, the term “online grooming” has been used to refer to the process of building a relationship either in person or online to facilitate sexual contact with that person, either online or offline. Social media can also be used by perpetrators to blackmail their victims, once they have obtained material to use against them, this is, pictures or videos of explicit sexual content (J. Savirimuthu, 2019). Finally, perpetrators normally use social networks to control their victims through social media private chats, using applications such as Skype or Viber (O. Stockhem, 2020).

On the other hand, cyber trafficking takes place in the dark web. The dark web is formed by communication protocols, such as the network Tor, designed to exchange information sent through a vast number of relays around the world. The dark web is mainly used to remain anonymous on the activity performed online, however, this does not mean that all the activity associated with the dark web is malicious or criminal. For example, it can be used for education or research purposes. Although it is also the space for selling drugs and arms, false documents, or, it can even be the place to recruit, advertise and sell people, to offer sex trafficking and child pornography. As an example, Stop the Traffik, a British NGO focusing on intelligence prevention for fighting human trafficking, developed a study in 2018 on the basis of data collected from DeepPaste, a website allowing the posting of anonymous messages, requests, and offers. The study brought to light paste titles such as ‘girls for rent and sale’, ‘sale or rent’ and ‘child escorts’  (Stop the traffik, 2018).

Conclusion

Undoubtedly, the Internet and Information and Communication Technologies (ICTs) have completely changed the current trafficking landscape. The globalization of social media networks and wireless technologies have led to the adoption of global standards towards the production of mobile operators and telecom services that are accessible to everyone, everywhere. They keep people connected and it brings many benefits for society, however, they also raise significant ethical challenges.

Thorn, a NGO dedicated to combat child grooming and sexual abuses online elaborated a list of recommention on their report of 2015. For example, they proposed to develop advertisements that draw the attention of young people and send a clear message that meeting new people on the Internet is not always safe. They have also suggested to display helpline information in bold ads on strategic websites where victims post their advertisements. At a higher level, more recommendations are to  adopt comprehensive safe harbor legislation for domestic minor sex trafficking victims that not only provide immunity or diversion for victims, and improve services for domestic minor sex trafficking victims in juvenile detention (V. Bouché, 2015).

Digital vulnerability refers to the risk of exposure of internet users when they generate personal data online. This data is increasingly being collected, aggregated, retained, shared, trafficked and exploited through AI technologies and Big Data for public and private purposes. The collection of massive personal data affects key ethical topics. Besides the phenomenon of cybertrafficking, other related digital ethical issues can be highlighted, among others, the facial recognition system of the iPhone X which collects data to create saleable content (Poell, 2015; Stanley, 2017), or sex robots that mimic pornographic behaviour collected through big data used for sexual pleasure, including enacting fantasies of rape, paedophilia and prostitution (Jurkiewicz, 2018). These ethical concerns and behaviours cause the disempowerment of individuals, particularly women and children, since there is a clear disproportional impact on women and children as victims of human trafficking. Thus, they are a typical subject of digital vulnerability. Moreover, those who are exposed to socio-economic vulnerabilities, and are not educated in digital literacy and are not aware of privacy risks are more likely to suffer this exposure. 

References

Albrecht, J. P. (2016). ‘How the GDPR will change the world’. European Data Protection Law Review, (2)287.

Bouché, V. (2015). A report on the use of technology to recruit, groom and sell domestic minor sex trafficking victims.

Boyd D., Casteel H., Thakor M., and Johnson R., 2011. Human Trafficking and Technology. A Framework for Understanding the Role of Technology in the Commercial Sexual Exploitation of Children in the U.S., Microsoft Research Connection.

Chatterjee, P., 2014. Human Trafficking and Commercialization of Surrogacy in India, European Researcher, 85(10-2).

Dettmeijer-Vermeulen C. (2012) ‘Trafficking in Human Beings. Ten Years of Independent Monitoring by the Dutch Rapporteur on Trafficking in Human Beings’, European Journal on Criminal Policy and Research, 18.

EIGE (2018). ‘Gender-specific measures in anti-trafficking actions’, Report, Luxembourg.

European Commission. (2018). Data collection on trafficking in human beings in the EU. Lancaster University and European Commission.

Hackett E. J., Amsterdamska O., Lynch M. and Wajcman J., eds. 2008. The handbook of science and technology studies, MIT Press, Cambridge, USA.

Hirsch Ballin E. 2020. Advanced Introduction to Legal Research Methods, Edward Elgar Publishing.

Hughes D.M., 2014. Trafficking in Human Beings in The European Union. Gender, Sexual Exploitation, and Digital Communication Technologies, Rhode Island, Sage Open.

Jägers N. and Rijken C., 2014. “Prevention of Human Trafficking for Labour Exploitation: The Role of Corporations”, North western Journal of International Human Rights. 12(3).

Jurkiewicz C. 2018. Big Data, Big Concerns: Ethics in the Digital Age.

Latonero M., 2011. Human Trafficking Online. The Role of Social Networking Sites and Online Classifieds, University of Southern California, Center On Communication Leadership and Policy.

Maltzahn, K. (2005). Digital dangers: Information & communication technologies and trafficking in women. Association for Progressive Communications, Women’s Networking Support Programme MIMOS (undated) Our Partners.

Myria Federal Migration Centre (2017), ‘Trafficking and Smuggling of Human Beings Online’, 2017 annual report, Brussels.

Pérez Cepeda A. and Benito Sánchez D., 2014. Trafficking in Human Beings, A Comparative Study of the International Legal Documents, Europa Law Publishing, Groningen.

Piotrowicz R., Rijken C. and Heide Uhl B., 2017. Routledge Handbook of Human Trafficking, Routledge International Handbooks, New York.

Rhodes, Leanne Maree. 2017. Human Trafficking as Cybercrime, Agora International of Administration Sciences, 4, p. 23-29.

Schell, B. H., Martin, M. V., Hung, P. C., & Rueda, L. (2007). Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution. Aggression and violent behavior, 12(1), 45-63.

Stockhem, O. (2020). Improving the International Regulation of Cybersex Trafficking of Women and Children through the Use of Data Science and Artificial Intelligence (Doctoral dissertation, Global Campus of Human Rights).

Stop the traffik (2018) ‘Human Trafficking and the Darknet: insights on supply and demand. Centre for Intelligence Led Prevention’, London.

Stoyanova V., 2017. Human Trafficking and Slavery Reconsidered, Conceptual Limits and States’ Positive Obligations in European Law. Cambridge University Press.

Tidwell R., (2016). ‘Caught in The Web: The Importance of Ethical Computing Illustrated Via an Exploration of the Online Recruitment of Women and Girls into Sex Trafficking’. Western Oregon University, Honors Senior Theses/Projects.

Winterdyk J. and Jones J., (2020). The Palgrave International Handbook of Human Trafficking, Palgrave Macmillan, Switzerland.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may also like