Human trafficking is a crime against humanity and a violation of the most fundamental human rights. No attempt to build a more resilient society can ignore the systemic issues that allow trafficking to take hold, since the ongoing existence of modern slavery, servitude, and exploitation challenge the very foundations of what we seek to protect. Nor can our efforts to protect the most vulnerable people in times of crisis fail to acknowledge the role of crisis events in fueling the systematic exploitation of such groups:

“Human traffickers are almost always the first responders to crisis zones around the world. Whether an environmental catastrophe or a military conflict or a sudden economic collapse, whenever crisis strikes, women, children, the poor, and outcastes are disproportionately affected, exploited, and recruited by traffickers” — Siddharth Kara, Modern Slavery: A Global Perspective, 2017

To tackle human trafficking in both its chronic and acute forms, we must recognize that the fight against trafficking is itself a complex societal activity that requires resilience to succeed. It needs investment in the core “3 Ps” of anti-trafficking work – prevention, prosecution, and protection – supported by the critical and cross-cutting role of partnerships. Only through the proper coordination of partners spanning the public and private sector, coupled with the mutual evolution of technology and policy, can the human effort to combat trafficking be most effective.

It is within this context that Microsoft jointly founded the Tech Against Trafficking (TAT) coalition in 2018. Through our work on the TAT steering committee and across initiatives including an accelerator program, we have formed long-term partnerships and projects tackling this most urgent societal problem. With TAT, we recognized the fact that there is only so much that any one organization can achieve alone. The more that different organizations can share with one another, the better placed the community will be to deliver an effective and coordinated response.

However, the nature of trafficking complicates sharing in multiple ways. Different tools tackling the same problems are developed in different contexts, missing out on the benefits that come from shared tools and practices. This is compounded by the lack of shared information on the availability and effectiveness of existing tools, encouraging reinvention and fragmentation. Where data on the same phenomena are collected by different parties, the lack of data standards means that such data cannot be easily compared or combined. And perhaps most importantly, where collected data relate to individual victims, the need to protect the privacy and safety of these victims means that the data cannot be shared or published without expert analysis of the statistical disclosure risk. All of these factors undermine the timely sharing of information within the community, and shaped our selection of TAT initiatives that could transform the development of evidence-based policy for anti-trafficking efforts worldwide.

Interactive map of anti-trafficking tools

The first such initiative led to the development of the TAT Interactive Map in Power BI, encompassing 300 counter-trafficking technology tools and designed to enable tool discovery, gap identification, and technology advocacy. The interactive map and corresponding tool survey have been jointly published with the Organization for Security and Co-operation in Europe (OSCE) and shared via testimony to a US Congressional Hearing on the role of technology in countering trafficking in persons.Tech Against Trafficking Interactive Map of Anti-Trafficking Tools

Tech Against Trafficking Interactive Map of Anti-Trafficking Tools. Shows how 111 tools in Tool Category “Victim/Trafficker Identification” (shown as orange nodes in the graph and cards below) form clusters based on their Trafficking Type and Technology. Cards may be expanded for further details, including links to external content. Different pages of the map show tool clusterings for different pairs of attributes (e.g., Target Sector – Target Users).

The second such initiative was developed through the inaugural TAT Accelerator Program with the Counter-Trafficking Data Collaborative (CTDC). This collaborative, managed by the UN Migration agency, IOM, pools data from IOMPolaris, and Liberty Shared to create the world’s largest database on identified victims of trafficking. The CTDC data hub makes derivatives of this data openly available via anonymized datasets, interactive dashboards, interactive maps, and topical data narratives.

However, while such data is essential evidence as to the existence and nature of trafficking, publishing it directly risks revealing the presence of individual victims to their traffickers, even if the data are de-identified and anonymized using standard approaches. This is not just a privacy risk, but also a safety risk: if traffickers believe a victim has received assistance, they may assume that this implies collaboration with law enforcement and hence the need for retaliation against the victim, or their friends, family, or community.

Privacy-preserving data platform

Our solution to this problem, described in this paper and available open-source on GitHub at microsoft/synthetic-data-showcase, is to generate synthetic data and aggregate data for sharing in place of actual sensitive data. These datasets are brought together in an automatically generated Power BI interface that enables data access and exploration under an absolute guarantee of group-level privacy. In other words, no user of this interface or the underlying datasets should be able to identify combinations of attributes that describe groups of individuals below a specified minimum size.chart: CTDC global dataset on victims of trafficking

An example “synthetic data showcase” for the CTDC global dataset on identified victims of trafficking. Shows the distributions of attribute values in the synthetic data for the selections Gender=Male and Age=30–38. The chart to the right compares these estimated values (in light green) to the actual precomputed values (in dark green), revealing only minor differences between the two datasets.

Such group-level protection is especially important in contexts where the safety of data subjects is at risk. For example, imagine that a trafficker has exclusive control of a trafficking route between two countries, and has full knowledge of all the victims they have trafficked on this route. It would be easy for them to use this background knowledge to identify any of their victims in a sensitive dataset if it were to be published directly. Even if only the count of victims for that route were published, the closer the published count to the trafficker’s known number of victims, the stronger the inference the trafficker could make that each of their victims was present in the dataset.

However, if we only report combinations of attributes that are common in the sensitive dataset, and only disclose their approximate frequency, we restrict the extent to which a trafficker could make inferences about the presence of any given individual: smaller groups cannot be detected at all, larger groups offer “safety in numbers”, and differences in approximate counts over time cannot be used to detect small or precise changes.

In general, as the sizes of detected groups increase, the likelihood that adversaries have complete and exclusive knowledge of all group members diminishes. The policy challenge is therefore to set the minimum detectable group size above the level at which an adversary could have complete knowledge about, or take retaliatory action against, all individual members of such a group. The technical challenge is creating an anonymization method that enables such group-level disclosure control.

Our algorithm for generating synthetic data achieves such control through what we call k-synthetic anonymity: the records of the synthetic dataset are constructed such that all combinations of attribute values are common in the sensitive dataset – appearing k or more times – and therefore cannot be linked with groups of individuals below the specified privacy resolution k. Aggregate counts of records for all combinations of attributes up to a specified length are also precomputed and rounded down to the closest k to ensure that groups of individuals smaller than k cannot be identified in either of the two datasets. To ensure that the synthetic data preserves the high-level statistics of the sensitive dataset, the counts of individual attributes in the records of the synthetic dataset are also controlled such that they are the closest multiple of k not exceeding the actual aggregate value. The structure of the synthetic data, in terms of the distribution of attribute combinations, also preserves the structure of the sensitive data to the extent that is possible while respecting the absolute privacy guarantee of a minimum detectable group size k.

Outcomes

This solution is currently being adopted by IOM to transform how victim data is made available to the counter-trafficking community via the CTDC data hub and other channels. The open-source microsoft/synthetic-data-showcase solution for privacy-preserving data publishing is complemented by a second outcome from the first TAT accelerator – the Human Trafficking Case Data Standard – also available on GitHub at UNMigration/HTCDS.

Both projects have been incorporated by IOM, in collaboration with the United Nations Office on Drugs and Crime (UNODC), into a guidance manual providing guidance to government agencies, law enforcement, and other stakeholders on the collection, storage, management, and sharing of human trafficking administrative data. An expert and stakeholder workshop in May 2021 provided final validation of the materials, supporting the international launch of training and capacity-building activities. The goal is to facilitate the production of consistent, high quality data that will strengthen the shared evidence base for anti-trafficking policy around the world.

Our work with Tech Against Trafficking, CTDC, and IOM is ongoing, as are collaborations with other organizations and stakeholders in the anti-trafficking community. These efforts build on and complement a wide range of additional activities and partnerships that Microsoft participates in to combat forced labor in its supply chain, and tackle the issues of human trafficking, exploitation, and child abuse more broadly. For more information, see Microsoft’s Modern Slavery and Human Trafficking Statement.

The need for safe representation of at-risk populations is not limited to victims of human trafficking, and can support assistance and advocacy activities for any marginalized, exploited, or otherwise vulnerable populations. Similarly, in times of crisis we need tools not just for publishing anonymous datasets, but for providing privacy-preserving views onto private databases – potentially operated by distinct parties who cannot pool their data for privacy, trust, or regulatory reasons. Supporting federated and accessible forms of data exploration, analytics, machine learning, and causal inference is essential for real-world evidence development at scale, and forms the basis of ongoing work to be presented in future case studies.

Resilience principles in action

  1. Tackle the causes and consequences of systemic vulnerability
    • Human trafficking is both a cause and consequence of vulnerability, with substantial harm.
  2. Convene and participate in broad coalitions with a bias for action
    • Microsoft is a founding and active member of the Tech Against Trafficking (TAT) coalition.
  3. Contribute a “resilience toolbox” of open tools and technologies
  4. Understand the links between people, practices, and outcomes
    • Both tools are in support of evidence-based practice towards better real-world outcomes.
  5. Democratize expert workflows and real-world evidence development
    • Interactive dashboards enable rich, code-free analysis of real-world data by non–data-scientists.
  6. Build trust through transparency and value-sensitive design
    • We fill collaboration gaps for both data and tools through interfaces that promote transparency.
  7. Design for transformation at the mesoscale of activity
    • We focus on making data and tools relevant and targeted to policymakers at the national level.

This was initially posted on Microsoft’s Societal Resilience series of case studies here.

post

page

attachment

revision

nav_menu_item

custom_css

customize_changeset

oembed_cache

user_request

wp_block

acf-field-group

acf-field

ai1ec_event

International Labor Migration: The Responsible Role of Business – BSR, 2008
GuidanceStandards & Codes of ConductGood Practices

In today’s globalized economy, the issue of international labor migration in supply chains is one of the most critical – yet largely unexplored – issues for our member companies and all businesses operating globally. Labor migrants now repr...Read More

Labor Lessons: Supply Chain Standards for Sustainable 21st Century Businesses
GuidanceGood Practices

Labor trafficking and slave labor are modern-day challenges that represent historic abuses, appearing in nearly every industry sector and across all populated continents today. However, the 21st century offers new tools to help corporations move bey...Read More

Exploited in plain sight: An assessment of commercial sexual exploitation of children and child protection responses in the Western Balkans
News & AnalysisPublications

This report assesses children’s vulnerability to CSEC across the WB6 and focuses specifically on online sexual exploitation of children and sexual exploitation of children in travel and tourism (SECTT). It also provides an overview of what law enf...Read More

Behind the Screens: A Compilation of Case Studies and Learning about the Online Sexual Exploitation of Children
News & Analysis

End online sexual exploitation of children. Online sexual exploitation of children (OSEC) includes a range of in-person and online harms that were unimaginable before the digital age. In fact, the trafficking of children to create new child sexual e...Read More