The private sector routinely mines consumer behavior data from online sources in order to craft marketing and advertising campaigns; the next logical step for some technology companies is to mine the same data to craft solutions to social problems. A September 1, 2012, Miami Herald article states, “truly ending human trafficking is more complicated than shutting down one website. The entire ecosystem—from the recruitment to the grooming and the selling, almost all done via the Internet—must be addressed.”[1]
The private sector is becoming a source of innovation in counter-trafficking initiatives. In June 2012, Microsoft Digital Crimes Unit and Microsoft Research collaborated on an initiative to support researchers who have creative ideas for clarifying the role of technology in facilitating the commercial sexual exploitation of children.[2] The Microsoft groups awarded a total of $185,000 to six research teams studying a wide variety of angles on the issue, including the online behaviors of johns, the impact of technology on the demand for child sex trafficking victims, the ways in which judges and law enforcement officers understand the role of technology in sex trafficking cases, the clandestine language used in online advertising of child sex trafficking, and the role of technology in improving services for child sex trafficking victims.[3] When the research concludes, Microsoft Digital Crimes Unit and Microsoft Research intend to make the findings available to help develop tools for disrupting technology-facilitated sex trafficking.[4] Microsoft Digital Crimes public affairs coordinator Samantha Doerr notes, “[a]rmed with better data, I believe real breakthroughs are possible for helping disrupt the dynamics that fuel the child sex trade.”[5]
In December 2011, Google granted a total of $11.5 million to counter-trafficking organizations, part of which was allocated to support new initiatives utilizing technology to combat human trafficking.[6] This technology-focused initiative reportedly includes projects with Polaris Project, Slavery Footprint, and the International Justice Mission.[7] In July 2012, Google Ideas collaborated with the Council on Foreign Relations and Tribeca Enterprises to host the Illicit Networks, Forces in Opposition (INFO) Summit.[8] The summit brought together various actors whose work focuses on disrupting illicit activities, including drug trafficking, arms trafficking, human trafficking, and organ trafficking.[9] Workshops provided space for attendees to share ideas, offer solutions, and form new alliances with the resources to rival international criminal networks.[10] Google intends for several of the initiatives established at the summit to be launched in the upcoming year.[11]
Software company Palantir Technologies has worked with the National Center for Missing and Exploited Children (NCMEC) to improve NCMEC’s ability to make sense of all the data at its disposal.[12] NCMEC uses Palantir’s software to search for and analyze information relating to missing and exploited children and sex offenders. Analysts can diagram complex relationships, perform geospatial analysis, search multiple databases simultaneously, and share data and analysis with law enforcement and other partners.[13] In 2012, Palantir also initiated a partnership with Polaris Project to provide the analytical platform and engineering, training, and support resources to the NHTRC to enable the study and application of data derived from their call records.[14]
The counter-trafficking efforts of LexisNexis gained considerable notice this year, as it recently emerged with an array of technology-driven tools to assist both the public and private sectors in detecting, monitoring, and researching human trafficking. In collaboration with the NHTRC, LexisNexis developed a national database of social service providers.[15] LexisNexis also created an online resource center for attorneys who work with human trafficking victims and is working with the American Bar Association to establish a training institute on civil remedies for victims.[16] LexisNexis offers direct financial, legal, and technical advice to the counter-trafficking NGOs the Somaly Mam Foundation and Agir pour les Femmes en Situation Precaire.[17] It also established the Human Trafficking Awareness Index, a tool that tracks and analyzes the volume of news articles related to human trafficking produced by 6,000 of the most influential news sources from more than 120 countries.[18] Finally, LexisNexis packaged several of its tools into a Supply Chain Management Solutions toolkit to assist business owners and managers in monitoring supply chains and reviewing the practices of third-party suppliers.[19].
At JP Morgan Chase, Barry Koch has developed tools for applying anti-money-laundering regimes to human trafficking networks.[20] Because money-laundering schemes and human trafficking schemes both tend to involve hidden financial transactions, technological applications for detecting money laundering have proven useful in detecting other illicit transactions, as Koch discovered during an investigation of several credit card transactions at a nail salon during non-business hours.[21] This investigation uncovered a human trafficking operation, and Koch further developed a regime for detecting human trafficking through technologically-tracked financial footprints and other collectible data. The establishment of such new counter-trafficking methods can inform other corporations about the impact that human trafficking has on their businesses and how to utilize existing security programs to address the issue.
Communications Decency Act and Anti-trafficking Efforts
Section 230 of the Communications Decency Act of 1996 (CDA 230) limits the liability of interactive computer service providers for content created by third-party users. According to the CDA, section 230 was enacted to maximize the public’s benefit of Internet services by curbing government interference in interactive media and preserving the free flow of expression online.[22] However, CDA 230 has become a point of tension as it relates to technology-facilitated trafficking.
CDA 230 distinguishes the publishers of online content from those who provide the platform for hosting the content. It specifically prohibits providers and users of interactive computer services from being “treated as the publishers or speakers of any information provided by another information content provider,”[23] thereby creating a “federal immunity to any cause of action that would make service providers responsible for information originating with a third-party user of the service.”[24] This grant of immunity “applies only if the interactive computer service provider is not also an ‘information content provider,’ which is defined as someone who is ‘responsible, in whole or in part, for the creation or development of’ the offending content.”[25] An interactive computer service provider that invites third parties to post illegal materials or creates such postings, however, forfeits this immunity.[26]
Application of CDA 230 with regard to human trafficking is demonstrated in M.A. ex rel. P.K. v. Village Voice Media Holdings, LLC,[27] a 2011 case in which a minor plaintiff sought to hold website operator Backpage liable for her sex trafficking victimization. A trafficker posted sexually explicit images of the minor in advertisements on Backpage’s website.[28] Noting the distinction between a service provider and a content provider, the court held that CDA 230 immunity extended to Backpage, despite the fact that Backpage provided a search engine for filtering postings in adult categories and profited from users’ activities on the site.[29] The court found that Backpage was not responsible for developing the content of the advertisement, nor did it do anything to encourage content of that nature.[30]
As the case above demonstrates, some are concerned that the immunity CDA 230 provides removes the burden on service providers to responsibly police the content on their websites. CDA 230 provides an avenue through which providers can be shielded from liability as hosts of illegal content created by third parties. Additionally, subsection (e) expressly provides that CDA 230 is not to affect the enforcement of laws against obscenity[31] and the sexual exploitation of children.[32] Thus, CDA 230 would not preclude individual states from creating and enforcing laws to combat domestic minor sex trafficking, so long as these state laws do not directly conflict with the provisions of CDA 230.[33]
In what might be seen a direct challenge to CDA 230, on March 29, 2012, Washington Senate Bill 6521 (SB 6521) was signed into law,[34] requiring the hosts of online classified ad sites to verify the ages of people in advertisements for sex-related services, as it criminalizes the direct or indirect publication, dissemination, or display of “any advertisement for a commercial sexual act which is to take place in the state of Washington and that includes the depiction of a minor.”[35] Upon passage of the bill, Backpage filed a complaint on June 4, 2012 to declare the new law invalid and enjoin its enforcement.[36] Among its arguments, Backpage claims that CDA 230 preempts the new law because its enforcement “would treat Backpage.com, a provider of an interactive computer service, as the publisher or speaker of information provided by another information content provider.”[37] SB 6251 was originally scheduled to take effect on June 7, 2012; however, a federal court granted a preliminary injunction on July 29, 2012, blocking enforcement of the law until the court can make a determination as to whether the law conflicts with federal law or is otherwise unconstitutional.[38]
It is important to note that CDA 230 was also intended to remove disincentives that previously prevented Internet service providers from using blocking and filtering on their services. Whereas some service providers in the past might have refrained from screening material on its websites, fearing that such regulatory action would invite third parties to assert their First Amendment rights, CDA 230 protects providers from civil liability for their good faith screening of offensive material. Subsection (c)(2) provides for this shield, stating that providers and users of interactive computer services will not be held liable for action taken in “good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected.” How an Internet service provider would actively determine or identify content that might signal human trafficking behavior remains unresolved.
[1] Miller, C. M. & Moskovitz, D. (September 1, 2012) Young prostitutes off the streets and online, MiamiHerald.com. Retrieved September 12, 2012, from www.miamiherald.com/2012/07/28/v-fullstory/2980491/young-prostitutes-off-the-streets.html. The article quotes this report’s co-investigator, Dr. Mark Latonero: “The private sector capitalizes on the online visibility of Internet users by routinely collecting data on consumer behaviors for targeted marketing and advertising strategies, yet efforts to harness data and technological tools to address social problems lag behind.”
[2] The Role of Technology in Human Trafficking – RFP (n.d.) Microsoft Research. Retrieved August 16, 2012, from research.microsoft.com/en-us/collaboration/focus/education/human-trafficking-rfp.aspx.
[3] Johnson-Stempson, R. (June 13, 2012) New Research Grants Aim at Combating Human Trafficking, Microsoft Research Connections Blog. Retrieved August 23, 2012, from blogs.msdn.com/b/msr_er/archive/2012/06/13/new-research-grants-aim-at-combating-human-trafficking.aspx.
[4] The Role of Technology in Human Trafficking – RFP (n.d.) Microsoft Research.
[5] Shedding Light on the Role of Technology in Child Sex Trafficking (July 18, 2012) Microsoft News Center. Retrieved August 28, 2012, from www.microsoft.com/en-us/news/features/2012/jul12/07-18childsextraffickingresearch.aspx.
[6] Brown, S. (December 14, 2011) Giving Back in 2011, Official Google Blog. Retrieved August 29, 2012, from blog.google.org/2011/12/giving-back-in-2011.html.
[7] Polaris Project operates the National Human Trafficking Hotline, which is developing a text function. Slavery Footprint is an interactive website and mobile application that estimates how much of a user’s lifestyle relies on forced labor. Ibid.
[8] Cohen, J. (July 16, 2012) Google Ideas: joining the fight against drug cartels and other illicit networks. Retrieved August 16, 2012, from googleblog.blogspot.com/2012/07/google-ideas-joining-fight-against-drug.html.
[9] Our focus – Google Ideas (n.d.) Google. Retrieved August 23, 2012, from www.google.com/ideas/focus.html#ilicit-networks.
[10] Cohen, J. (July 16, 2012).
[11] Boyd, Z. Personal communication, July 18, 2012.
[12] Impact Study: Helping to Find and Rescue Missing and Exploited Children (n.d.) Palantir. Retrieved August 16, 2012, from www.palantir.com/wp-content/static/pg-analysis-blog/2011/11/ImpactStudy_NCMEC.pdf3.
[13] Ibid.
[14] Ibid.
[15] Polaris Project and LexisNexis Form Public-Private Partnership to Fight Human Trafficking (May 27, 2009) LexisNexis. Retrieved August 16, 2012, from .www.lexisnexis.com/media/press-release.aspx?id=1256843120963451.
[16] Trafficking in Persons Report (n.d.) LexisNexis. Retrieved August 16, 2012, from www.lexisnexis.com/en-us/about-us/corporate-responsibility/state-dept-report.page.
[17] Rule of Law (n.d.) LexisNexis. Retrieved August 16, 2012, from www.lexisnexis.com/en-us/about-us/rule-of-law.page.
[18] LexisNexis Introduces the Human Trafficking Awareness Index (June 13, 2012) PRWeb. Retrieved August 16, 2012, from www.prweb.com/releases/2012/6/prweb9597027.htm.
[19] Procurement & Supply Chain Management Organizations (n.d.) LexisNexis. Retrieved August 16, 2012, from www.lexisnexis.com/en-us/other-business-solutions/procurement-and-supply-chain-management.page.
[20] Koch, B. (Director) (October 4, 2012). Leveraging Anti-Money Laundering Regimes to Combat Human Trafficking. Alliance against Trafficking in Persons Expert Seminar. Lecture conducted from Organization for Security and Co-operation in Europe, Vienna.
[21] Ibid.
[22] 47 U.S.C. § 230(a).
[23] 47 U.S.C. § 230(c)(1).
[24] Zeran v. America Online, 129 F. 3d 327 (4th Cir. 1997).
[25] Fair Housing Council of San Fernando Valley v. Roommates.com, LLC, 521 F. 3d 1157 (9th Cir. 2008) (quoting 47 U.S.C. § 230(f)(3)).
[26] Jones v. Dirty World Entertainment Recordings, LLC, 766 F. Supp. 2d 828, 836 (E.D. Kentucky 2011) (website invited comments of third parties to which provider would respond with his own comments).
[27] 809 F. Supp. 2d 1041 (E.D. Missouri, 2011).
[28] Ibid., 1044.
[29] Ibid., 1053.
[30] Ibid.
[31] 18 U.S.C. § 1460 et seq.
[32] 18 U.S.C. § 2251 et seq.
[33] 47 U.S.C. § 230(e)(3).
[34] SB-6251 – 2011–12. (n.d.), Washington State Legislature. Retrieved August 21, 2012, from apps.leg.wa.gov/billinfo/summary.aspx?bill=6251.
[35] Washington Senate Bill 6521, § 2(1), available at apps.leg.wa.gov/billinfo/summary.aspx?bill=6251&year=2011.
[36] Backpage.com, LLC v. Rob McKenna et al., complaint (June 4, 2012), available at www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CFcQFjAB&url=http%3A%2F%2Fseattletimes.nwsource.com%2FABPub%2F2012%2F06%2F04%2F2018356250.pdf&ei=y7vPT93ZG8X42gX0vKDQDA&usg=AFQjCNGlp9Xp2hXom-tZyQLIFXRxgLoEuw.
[37] Ibid.
[38] U.S. judge grants injunction in Backpage.com lawsuit (July 27, 2012) NECN.com. Retrieved from www.necn.com/07/27/12/US-judge-grants-injunction-in-Backpageco/landing.html?&apID=8f3e6d19d9a54bfc84595957d182fb25.