Current Research on Technology and Trafficking
The CCLP 2011 report reviewed the existing research on the role of the Internet and technology in facilitating human trafficking and recommended a number of research questions to consider. Since then, the literature in this area has grown substantially from various multi-sector approaches. Technology and human trafficking have also garnered more attention from government agencies, nongovernmental organizations, the private sector, and academics. Studies on the use of landline phones, computer devices, and handheld and other mobile devices have provided a view of sex trafficking in modern-day society. The following review of current research, while not exhaustive, provides highlights of the spectrum of research under way on technology and sex trafficking.
U.S. government-issued reports are only beginning to include discussions on the role of technology in human trafficking. The 2012 Trafficking in Persons Report released by the U.S. Department of State includes some brief mentions of technologies used both to facilitate and combat trafficking.  Two reports by the National Institute of Justice (NIJ) released in 2011 do focus on technologies related issues. The first, entitled, “National Overview of Prostitution and Sex Trafficking Demand Reduction Efforts,” examines law enforcement efforts to address sex trafficking demand. The second study, “Identifying Challenges to Improve the Investigation and Prosecution of State and Local Human Trafficking Cases,” discusses various difficulties law enforcement faces, including technology-related challenges. NIJ found that technology-facilitated reverse stings are the third most commonly used tactic nationwide, having been piloted as early as 1995. Researchers analyzed a set of 140 closed cases from across the U.S. and found that 85% were sex trafficking cases, 27% of which used the Internet as a trafficking tool. NIJ also found that state laws on sex trafficking positively impacted the rate at which sex trafficking victims were identified via the Internet.
In August 2010, the Department of Justice’s Project Safe Childhood released its National Strategy for Child Exploitation Prevention and Interdiction. The threat assessment portion of the report showed increases over the past decade in cyber crimes involving the sexual exploitation of children, including child pornography, online enticement of children for sexual purposes, commercial sexual exploitation of children, and child sex tourism. The report also outlined the Department of Justice’s strategy for addressing the cyber threat of child sexual exploitation. A new national strategy is due for submission to Congress this year.
Evidence-based academic research on technology and human trafficking is also growing. Researchers at CCLP and the USC Information Sciences Institute (2012) have published research on the collection and analysis of digital data on the open Internet in order to identify potential cases of human trafficking, specifically the sex trafficking of minors.
Through their work at Microsoft Research, boyd, Casteel, Thakor, and Johnson (2011) have provided a framework for research into the role of technology in human trafficking, specifically the domestic demand for commercial sexual exploitation of minors in the United States. This framework recognizes the dearth of empirical research on human trafficking and technology’s role, but notes that “technology makes many aspects of human trafficking more visible and more traceable, for better or for worse. … We do not know if there are more human trafficking victims as a result of technology, nor do we know if law enforcement can identify perpetrators better as a result of the traces that they leave.” The researchers also caution against technological solutions without full understanding of the potential unintended consequences, “[a]s a result, new interventions and policies are being driven by intuition, speculation, and extrapolation from highly publicized incidents.” The framework examines the ways in which technology has impacted the human trafficking ecosystem, identifying 15 facets of the problem and a set of potential issues associated with each. The present report explores several of the facets listed in the framework, including Prevention and Education; Identification and Reporting of Victims and Perpetrators; Advertising and Selling of Victims; Searching for and Purchasing Victims by “Johns”; and Political and Policy Activities.
Researchers at the Crimes Against Children Research Center at the University of New Hampshire have led several research initiatives on DMST, commercial sexual exploitation of children, and Internet-facilitated juvenile prostitution over the last decade. Finkelhor and Ormond (2004) mined data from the National Incident-Based Reporting System (NIBRS) to present findings that suggest important insights into DMST, including information on age ranges, gender disparities, treatment by police as offenders and/or victims, and independent or group structures. In a 2010 study, Mitchell, Finkelhor, and Wolak found that 54% of juveniles who were sexually exploited by a third party found clients through the Internet (20%), through an escort or call service (26%), or at an establishment (9%). Of the cases involving a third-party exploiter, 100% of third parties were pimps or other controlling persons. In 54% of the cases, law enforcement viewed the juveniles as victims, and in 16% as both delinquents and victims. In 2011, Mitchell, Jones, Finkelhor, and Wolak found that an estimated 569 arrests for Internet-facilitated commercial sexual exploitation of children occurred in the United States in 2006. Of those cases, 36% involved those who used the Internet to purchase or sell access to identified children for sexual purposes.
Wells, Mitchell, and Ji (2012) have examined how Internet facilitation influences law enforcement perspectives on juvenile prostitution cases and characteristics and found that Internet-facilitated juvenile prostitution cases were more likely to involve younger juveniles and an exploiter that was a family member or acquaintance, in contrast with juvenile prostitution cases that did not involve Internet facilitation.
Foot and Vanek (2012) have examined the effects of technology-facilitated observations and reporting of suspected human trafficking. They note that “Suspicious Activity Reporting (SAR) programs [and] new formats for relaying potential crime information to police (via social media tools)” necessitate that “law enforcement leaders must be aware of this changing landscape and the breadth of new potential reporters of crime.” Foot also collaborated on research with a team at Georgia Tech regarding the ways in which community-based organizations respond to human trafficking by utilizing technologies to strengthen and expand their networks. Stoll, Foot, and Edwards identified three categories of technology-supported activities that assist these networks in combating sex trafficking. They also found “that while different technologies are suited toward supporting different aspects of connectedness, gaps may exist in how social media tools support connectedness in civic networks.” These gaps, they say, are due to the individual nature of technologies such as email, Facebook, and Twitter, and, the authors suggest, “more group-centric technologies can be leveraged to create connectedness in civic networks.”
Although greater attention has focused on technology-facilitated sex trafficking, gaps in legal responses are increasingly evident. Kunze (2010) conducted an assessment of laws, international agreements, and other policies relating to Internet-facilitated sex trafficking. She found that the methods and means of online trafficking are developing at much faster rates than laws that seek to protect trafficking victims. Kunze argues for international laws prohibiting the use of the Internet for advertising and selling sex trafficking victims and for locating traffickers who utilize the Internet for victimization, “[I]t is vital that the international community adopt both domestic legislation and international treaty provisions to target sexual predators and human traffickers who use technology and the Internet to enslave minors and adults alike.”
We found little research on the role of technology in labor trafficking. Recent reports from the Asia Pacific Migration Network and Business for Social Responsibility highlighted the use of technology in dubious recruiting practices for migrant labor, yet did not investigate human trafficking claims per se. Todres (2012) examines the private sector’s role in combating human trafficking in light of California’s Transparency in Supply Chains Act. This law, which passed in 2011 and obligated compliance by January 2012, requires qualifying corporations to display prominently on their websites the measures they are taking to eliminate human trafficking from their supply chains. Todres notes:
Anti-trafficking advocates can capitalize on the private sector’s skill set and its own incentives to innovate to improve initiatives to combat human trafficking. That might include innovations in technology or other improvements in safety or efficiency that reduce the pressure to exploit vulnerable individuals.
This review of current literature suggests that researchers are beginning to pay closer attention to the role of technology in sex trafficking; however, further investigation into technology and labor trafficking is clearly needed.
 Ibid., 14.
 The President’s Interagency Task Force on Human Trafficking has embarked on an initiative to provide a variety of online anti-trafficking tools, including online training modules for law enforcement, technology-based components for the National Human Trafficking Hotline, and technological capacity building for various intersecting industries. Annual Meeting of the President’s Interagency Task Force to Monitor and Combat Trafficking in Persons (March 15, 2012) U.S. Department of State. Retrieved August 10, 2012, from www.state.gov/secretary/rm/2012/03/185905.htm.
 Mekong Club and Motherapp have partnered with the UN Inter-Agency Partnership on Human Trafficking to develop a mobile phone application that will address law enforcement’s heavily documented inability to identify human trafficking victims due to language barriers. Boyd, Z. Personal communication with Matthew Friedman, July 18, 2012.
 For example, both Microsoft Research and Google Ideas held conferences in July 2012 that highlighted the role of technology-facilitated sex trafficking.
 Academic research teams such as the Crimes Against Children Research Center at University of New Hampshire, Scott Cunningham and Todd Kendall at Baylor University, and students such as Emily Kennedy at Carnegie Mellon University, are leading this exploratory field.
 See 2012 Trafficking in Persons Report. In addition, at the March 15, 2012, Annual Meeting of the President’s Interagency Task Force to Monitor and Combat Trafficking in Persons, Raj Shah said that USAID has developed “a new counter-trafficking policy … [that] prioritizes investments in technologies, like mapping platforms, mobile applications, and other innovations.” See www.state.gov/secretary/rm/2012/03/185905.htm.
 Shively, M., Kliorys, K., Wheeler, K., & Hunt, D. (2012) National Overview of Prostitution and Sex Trafficking Demand Reduction Efforts. Washington, DC: National Institute of Justice.
 Farrell, A., McDevitt, J., Pfeffer, R., Fahy, S., Owens, C., Dank, M., et al. (2012) Identifying Challenges to Improve the Investigation and Prosecution of State and Local Human Trafficking Cases. Washington, DC: National Institute of Justice.
 Shively et al. (2012), p. 19. An interesting observation on reverse stings suggests that during traditional street reverse stings, johns post warnings in online forums, often with descriptions of the decoy and officers involved.
 The majority of victims are identified via tips from family members, community members, NGOs, or hotlines. Farrell et al. (2012), p. 43.
 Thirty % of sex trafficking cases in states that lack trafficking legislation were identified via the Internet, as opposed to 20% of cases in states with basic legislation on human trafficking. Farley et al. (2012), p. 46.
 The Providing Resources, Officers, and Technology to Eradicate Cyber Threats to Our Children Act of 2008 (the “PROTECT Our Children Act”) mandates that the department complete a threat assessment of the magnitude of technology-facilitated child exploitation.
 Department of Justice (2010) National Strategy for Child Exploitation Prevention and Interdiction. Washington, DC: U.S. Department of Justice. Retrieved from www.justice.gov/psc/publications.html.
 Ibid., 2–5.
 “The [Providing Resources, Officers, and Technology to Eradicate Cyber Threats to Our Children Act of 2008 (the ‘PROTECT Our Children Act’] also requires the Department to submit a report on the National Strategy (the ‘National Strategy’ or ‘Report’) to Congress every other year,” Ibid., 1.
 Wang, H., Philpot, A., Hovy, E., Congxing, C., Latonero, M., & Metzler, D. (2012) Data integration from open Internet sources to combat sex trafficking of minors. Proceedings of the Association for Computing Machinery – Digital Government Conference, College Park, Maryland.
 boyd et al. (2011).
 Ibid., 1, 3.
 Ibid., 1.
 The identified facets include Prevention and Education; Recruitment and Abduction of Victims; Transit, Housing and Everyday Control of Victims by “Pimps”; Retention of Victims by “Pimps”; Advertising and Selling of Victims; Searching for and Purchasing Victims by “Johns”; Money Exchange, Money Laundering; Underground Partnerships and Organized Crime Syndicates; Identification and Reporting of Victims and Perpetrators; Investigation of Illegal Activities; Rehabilitation and Recovery for Survivors; Prosecution of Perpetrators; Rehabilitation for and Control of Perpetrators; Political and Policy Activities; Anti-Trafficking Partnerships. Ibid., 3.
 The study was based on data from “a limited number of cases from the 76 agencies in 13 states that are represented in NIBRS.” Finkelhor, D. and Ormrod, R. K., Crimes Against Children Resource Center (2004) Prostitution of juveniles: Patterns from NIBRS. Juvenile Justice Bulletin – NCJ203946 (pp. 1–12). Washington, DC: U.S. Government Printing Office. Retrieved from www.unh.edu/ccrc/pdf/jvq/CV67.pdf, p. 9.
 Mitchell, K. J., Finkelhor, D., & Wolak, J., Crimes Against Children Resource Center (2010) Conceptualizing juvenile prostitution as child maltreatment: Findings from the national juvenile prostitution survey. Child Maltreatment, 15(1): 18–36. p. 26. Retrieved from www.unh.edu/ccrc/pdf/CV186.pdf.
 Ibid., 28.
 Ibid., 29.
 Mitchell, K. J., Jones, L. M., Finkelhor, D., & Wolak, J., Crimes Against Children Resource Center (2011) Internet-facilitated commercial sexual exploitation of children: Findings from a nationally representative sample of law-enforcement agencies in the U.S. Sexual Abuse: A Journal of Research and Treatment, 23(1): 43–71. Retrieved from www.unh.edu/ccrc/pdf/CV201.pdf.
 Wells, M. Mitchell, K. J., & Ji, K. (2012): Exploring the Role of the Internet in Juvenile Prostitution Cases Coming to the Attention of Law Enforcement, Journal of Child Sexual Abuse, 21:3, 327–42.
 According to Foot & Vanek, “The growth of anti-trafficking MANGOs (mobilizing/advocacy NGOs) across the U.S. is attributable [in part to] the growth of cause-promoting social media platforms such as Change.org, and issue-oriented uses of general social networking sites such as Facebook.”
 Foot, K. & Vanek, J. (2012) Toward Constructive Engagement Between Local Law Enforcement and Mobilization and Advocacy Nongovernmental Organizations About Human Trafficking: Recommendations for Law Enforcement Executives. Law Enforcement Executive Forum, 12(1), 1–11.
 Stoll, J., Foot, K., & Edwards, W. K. (2012) Between Us and Them: Building Connectedness Within Civic Networks. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, 1, 237–40.
 The three activities are raising basic awareness, enabling connections, and reinforcing connections. The information communication technologies (ICTs) that support these activities include mobile phones, email, custom websites, and social media such as Twitter and Facebook.
 Stoll et al. (2012), p. 240.
 Kunze, E. I. “Sex trafficking via the Internet: How international agreements address the problem and fail to go far enough.” The Journal of High Technology Law, July 2010: 241+. Academic OneFile. Web. July 25, 2012. p. 253.
 Asia Pacific Migration Network (2012) AP-Magnet Discussion Paper, based on an online discussion – Improving and Regulating Recruitment Practices in Asia and the Pacific, Bangkok: International Labour Organization. Morgan, G., Nolan, C., & Ediger, L. (2011) Step Up: Improving Migrant Worker Recruitment in Indonesia, San Francisco: Business for Social Responsibility, p. 19. Migration for Development (2011) E-discussion on: Migrant Workers and Recruitment Processes. Retrieved July 29, 2012, from www.migration4development.org/content/e-discussion-migrant-workers-and-recruitment-processes.
 Todres, J. (2012) The Private Sector’s Pivotal Role in Combating Human Trafficking, California Law Review Circuit, 3: 190–208.
 Cal. Civ. Code § 1714.43; Cal. Tax Code § 19547.5(S.B. 657).
 Todres (2012).