skip to main content
10.1145/3290605.3300561acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Understanding Law Enforcement Strategies and Needs for Combating Human Trafficking

Published:02 May 2019Publication History

ABSTRACT

In working to rescue victims of human trafficking, law enforcement officers face a host of challenges. Working in complex, layered organizational structures, they face challenges of collaboration and communication. Online information is central to every phase of a human-trafficking investigation. With terabytes of available data such as sex work ads, policing is increasingly a big-data research problem. In this study, we interview sixteen law enforcement officers working to rescue victims of human trafficking to try to understand their computational needs. We highlight three major areas where future work in human-computer interaction can help. First, combating human trafficking requires advances in information visualization of large, complex, geospatial data, as victims are frequently forcibly moved across jurisdictions. Second, the need for unified information databases raises critical research issues of usable security and privacy. Finally, the archaic nature of information systems available to law enforcement raises policy issues regarding resource allocation for software development.

References

  1. 2000. United States of America: Victims of Trafficking and Violence Protection Act of 2000. Public Law 106--386 {H.R. 3244}.Google ScholarGoogle Scholar
  2. Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage.Google ScholarGoogle Scholar
  3. Sarah Brayne. 2017. Big data surveillance: The case of policing. American Sociological Review 82, 5 (2017), 977--1008.Google ScholarGoogle ScholarCross RefCross Ref
  4. Tara Burns. 2018. The Deadly Consequences of the Anti-Sex Trafficking Law. The Crime Report (Jun 2018). https://thecrimereport.org/2018/ 06/04/the-deadly-consequences-of-the-anti-sex-trafficking-law/Google ScholarGoogle Scholar
  5. Caliber. 2007. Evaluation of Comprehensive Services for Victims of Human Trafficking: Key Findings and Lessons Learned. Technical Report. US Department of Justice.Google ScholarGoogle Scholar
  6. Janet BL Chan. 2001. The technological game: How information technology is transforming police practice. Criminal Justice 1, 2 (2001), 139--159.Google ScholarGoogle ScholarCross RefCross Ref
  7. Heather Clawson, Nicole Dutch, and Megan Cummings. 2006. Law enforcement response to human trafficking and the implications for victims: Current practices and lessons learned. Washington, DC: US Department of Justice, National Institute of Justice (2006).Google ScholarGoogle Scholar
  8. Meredith Dank, Bilal Khan, John Jay College, P Mitchell Downey, Ric Curtis, Samantha Lowry, Meagan Cahill, Samuel Bieler, Juan Pedroza, Doug Gilchrist-Scott, Aaron Horvath, Pamela Lachman, Shebani Rao, Leah Ouellet, Sarah Trager, Leila Collins, Aqsa Ashai, and Bill Adams. 2014. Estimating the Size and Structure of the Underground Commercial Sex Economy in Eight Major US Cities. Technical Report. The Urban Institute.Google ScholarGoogle Scholar
  9. Artur Dubrawski, Kyle Miller, Matthew Barnes, Benedikt Boecking, and Emily Kennedy. 2015. Leveraging publicly available data to discern patterns of human-trafficking activity. Journal of Human Trafficking 1, 1 (2015), 65--85.Google ScholarGoogle ScholarCross RefCross Ref
  10. Amy Farrell, Jack McDevitt, and Stephanie Fahy. 2008. Understanding and Improving Law Enforcement Responses to Human Trafficking. (2008).Google ScholarGoogle Scholar
  11. Luis Garicano and Paul Heaton. 2010. Information technology, organization, and productivity in the public sector: Evidence from police departments. Journal of Labor Economics 28, 1 (2010), 167--201.Google ScholarGoogle ScholarCross RefCross Ref
  12. Sadie Gurman. 2016. Across US, police officers abuse confidential databases. Associated Press (28 September 2016).Google ScholarGoogle Scholar
  13. Kathryn Herr and Gary L Anderson. 2014. The action research dissertation: A guide for students and faculty. Sage publications.Google ScholarGoogle Scholar
  14. John S Hollywood, John E Boon Jr, Richard Silberglitt, Brian G Chow, and Brian A Jackson. 2015. High-priority information technology needs for law enforcement. Rand Corporation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. John S Hollywood and Zev Winkelman. 2015. Improving InformationSharing Across Law Enforcement: Why Can't We Know? JSTOR.Google ScholarGoogle Scholar
  16. John S Hollywood, Dulani Woods, Sean E Goodison, Andrew Lauland, Lisa Wagner, Thomas J Wilson, and Brian A Jackson. 2017. Fostering Innovation in US Law Enforcement. Rand Corporation.Google ScholarGoogle Scholar
  17. John S Hollywood, Dulani Woods, Andrew Lauland, Brian A Jackson, and Richard Silberglitt. 2018. Addressing Emerging Trends to Support the Future of Criminal Justice. RAND Corporation.Google ScholarGoogle Scholar
  18. International Labor Office. 2012. Profits and Poverty: The Economics of Forced Labor. Technical Report.Google ScholarGoogle Scholar
  19. International Labour Office. 2017. Global Estimates of Modern Slavery: Forced Labour and Forced Marriage. http://www.ilo.org/global/ publications/books/WCMS_575479/lang--en/index.htmGoogle ScholarGoogle Scholar
  20. Brian A Jackson, Victoria Greenfield, Andrew R Morral, and John S Hollywood. 2014. Police department investments in information technology systems. (2014).Google ScholarGoogle Scholar
  21. Elizabeth E Joh. 2014. Policing by numbers: big data and the Fourth Amendment. Wash. L. Rev. 89 (2014), 35.Google ScholarGoogle Scholar
  22. Emily Kennedy. 2012. Predictive patterns of sex trafficking online. Master's thesis. Carengie Mellon University.Google ScholarGoogle Scholar
  23. Renata A Konrad, Andrew C Trapp, Timothy M Palmbach, and Jeffrey S Blom. 2017. Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications. European Journal of Operational Research 259, 2 (2017), 733--745.Google ScholarGoogle ScholarCross RefCross Ref
  24. Mark Latonero. 2011. Human trafficking online: The role of social networking sites and online classifieds. Available at SSRN 2045851 (2011).Google ScholarGoogle Scholar
  25. Mark Latonero, Jennifer Musto, Zhaleh Boyd, Ev Boyle, Amber Bissel, Kari Gibson, and Joanne Kim. 2012. The rise of mobile and the diffusion of technology-facilitated trafficking. University of Southern California, Center on Communication Leadership & Policy Los Angeles, CA.Google ScholarGoogle Scholar
  26. Mark Latonero, Bronwyn Wex, and Meredith Dank. 2015. Technology and Labor Trafficking in a Network Society: General Overview, Emerging Innovations, and Philippines Case Study. (2015).Google ScholarGoogle Scholar
  27. Zachary Lipton. 2016. The Mythos of Model Interpretability. In ICML Workshop on Human Interpretability in Machine Learning (WHI 2016). New York, NY, USA.Google ScholarGoogle Scholar
  28. Martin N Marshall. 1996. Sampling for qualitative research. Family practice 13, 6 (1996), 522--526.Google ScholarGoogle Scholar
  29. Maureen Q. McGough. 2013. Ending Modern-Day Slavery: Using Research to Inform U.S. Anti-Human Trafficking Efforts. National Institute of Justice Journal 271 (2013).Google ScholarGoogle Scholar
  30. Kimberly J Mitchell and Dana Boyd. 2014. Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement. (2014).Google ScholarGoogle Scholar
  31. Andrea J Nichols. 2016. Sex trafficking in the United States: Theory, Research, Policy, and Practice. Columbia University Press.Google ScholarGoogle Scholar
  32. Andrea J Nichols and Erin C Heil. 2015. Challenges to identifying and prosecuting sex trafficking cases in the Midwest United States. Feminist criminology 10, 1 (2015), 7--35.Google ScholarGoogle Scholar
  33. Samuel Nunn. 2001. Police information technology: Assessing the effects of computerization on urban police functions. Public Administration Review 61, 2 (2001), 221--234.Google ScholarGoogle ScholarCross RefCross Ref
  34. Polaris. 2015. Sex Trafficking in the U.S.: A Closer Look at U.S. Citizen Victims. Technical Report. Polaris.Google ScholarGoogle Scholar
  35. Rebecca S Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy. 2017. Backpage and bitcoin: Uncovering human traffickers. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1595--1604. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Felicity Gerry QC, Julia Muraszkiewicz, and Niovi Vavoula. 2016. The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns. Computer Law & Security Review 32, 2 (2016), 205--217.Google ScholarGoogle ScholarCross RefCross Ref
  37. Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. Why should i trust you?: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, 1135--1144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Daniel Ribeiro Silva, Andrew Philpot, Abhishek Sundararajan, Nicole Marie Bryan, and Eduard Hovy. 2014. Data integration from open internet sources and network detection to combat underage sex trafficking. In Proceedings of the 15th Annual International Conference on Digital Government Research. ACM, 86--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Kevin Strom. 2017. Research on the impact of technology on policing strategy in the 21st century, final report.Google ScholarGoogle Scholar
  40. President's Interagency Task Force to Monitor and Combat Trafficking in Persons. 2013. Coordination, Collaboration, Capacity: Federal Strategic Action Plan on Services for Victims of Human Trafficking, 2013--2017. Technical Report.Google ScholarGoogle Scholar
  41. United Nations Office on Drugs and Crime. 2016. Global Report on Trafficking in Persons. Technical Report.Google ScholarGoogle Scholar
  42. US Department of Justice. 2017. National Strategy to Combat Human Trafficking. Technical Report.Google ScholarGoogle Scholar
  43. US Department of State. 2017. Trafficking in Persons Report. Technical Report.Google ScholarGoogle Scholar
  44. Nitya Verma and Lynn Dombrowski. 2018. Confronting Social Criticisms: Challenges when Adopting Data-Driven Policing Strategies. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Deborah G Wilson, William F Walsh, and Sherilyn Kleuber. 2006. Trafficking in human beings: Training and services among US law enforcement agencies. Police Practice and Research 7, 02 (2006), 149--160.Google ScholarGoogle ScholarCross RefCross Ref
  46. Jennifer Xu and Hsinchun Chen. 2005. Criminal network analysis and visualization. Commun. ACM 48, 6 (2005), 100--107. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Understanding Law Enforcement Strategies and Needs for Combating Human Trafficking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
      May 2019
      9077 pages
      ISBN:9781450359702
      DOI:10.1145/3290605

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 May 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '19 Paper Acceptance Rate703of2,958submissions,24%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format