As the world has continued to transform digitally, so have traffickers who have kept pace by developing sophisticated systems and using technology to commit criminal activities, at every stage of the process, from recruiting, exploiting and controlling victims to transferring the profits of their criminal activities. Rapid technological change presents opportunities for traffickers to adapt their modus operandi, taking advantage of digital platforms to target their victims.

As one in every three victims of trafficking detected globally is a child, and one in five girls and one in 13 boys are reportedly sexually exploited or abused before reaching the age of 18, it is evident that children are vulnerable to exploitation by criminals, including traffickers. As a result of school closures and lockdown measures in response to the COVID-19 pandemic, in many parts of the world, children had extended periods of screen time and unsupervised Internet access, with more younger children than ever before being introduced to digital platforms. This has increased the risk of children being exposed to, among others, technology-facilitated child sexual exploitation and abuse.

Aware of the risks of detection, traffickers are using encrypted and anonymised online services to perpetrate crime in an environment of secrecy. Technology allows traffickers to operate across borders and in multiple locations simultaneously and can offer a single trafficker opportunities and channels to connect a victim with many potential buyers of exploitative services, gaining access to an increased pool of customers. This ability to transcend multiple jurisdictions makes detecting, investigating and prosecuting technology-facilitated trafficking in persons difficult.

ICAT Calls on States to Harness the Opportunities Presented by Technology to Counter Trafficking in Persons -The Inter-Agency Coordination Group Against Trafficking in Persons, 2022 DOWNLOAD

post

page

attachment

revision

nav_menu_item

custom_css

customize_changeset

oembed_cache

user_request

wp_block

wp_template

wp_template_part

wp_global_styles

wp_navigation

wp_font_family

wp_font_face

acf-taxonomy

acf-post-type

acf-field-group

acf-field

ai1ec_event

exactmetrics_note

RMI Report 2022
Guidance

The RMI Report 2022 assesses the ESG policies and practices of 40 of the largest mining companies in the world, and basic ESG actions at 250 of their mine sites. Analysts scrutinised over 6,500 documents for the evidence-based assessment (without re...Read More

Labor Lessons: Supply Chain Standards for Sustainable 21st Century Businesses
GuidanceGood Practices

Labor trafficking and slave labor are modern-day challenges that represent historic abuses, appearing in nearly every industry sector and across all populated continents today. However, the 21st century offers new tools to help corporations move bey...Read More

Anti-Human Trafficking Authentication Criteria Company-level and Site-Level
Guidance

The following criteria can be used by any organization to help it design an effective and transparent system for preventing human trafficking in its operations and those of its supply chain. It can also be used by an organization or an independent t...Read More

TAGS: Global
Protection From Sexual Exploitation and Abuse (PSEA) During COVID-19 Response
COVID-19 resourcesGuidance

The COVID-19 Pandemic is a public health, social and economic crisis that is global in scale. With restrictions on travel and movement, civil society and humanitarian organizations play a critical role in supporting governments to respond. All peopl...Read More